{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:24:43Z","timestamp":1766298283755,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T00:00:00Z","timestamp":1684886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,24]]},"DOI":"10.1145\/3607720.3607739","type":"proceedings-article","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T17:14:08Z","timestamp":1699895648000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards an Open-Source Based E-Mail Forensic Tool that uses Headers in Digital Investigation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9124-1722","authenticated-orcid":false,"given":"Remilekun","family":"Adeopatoye","sequence":"first","affiliation":[{"name":"Cyber Security Science, Federal University of Technology, Minna, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7355-2314","authenticated-orcid":false,"given":"Richard Adeyemi","family":"Ikuesan","sequence":"additional","affiliation":[{"name":"CAT Department, College of Technological Innovation, Zayed University, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2719-0839","authenticated-orcid":false,"given":"Taurai","family":"Hungwe","sequence":"additional","affiliation":[{"name":"Department of Computer Science and IT, Sefako Makgatho University of Health Sciences, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4071-4596","authenticated-orcid":false,"given":"Victor","family":"Kebande","sequence":"additional","affiliation":[{"name":"Blekinge institute of Technology, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5822-3432","authenticated-orcid":false,"given":"Mehdi","family":"Sookhak","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Texas A&amp;M University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2013010101"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0166930"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000747"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008696"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3124262"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3617"},{"key":"e_1_3_2_1_7_1","unstructured":"Brian Carrier. 2002. Open source digital forensics tools: The legal argument.  Brian Carrier. 2002. Open source digital forensics tools: The legal argument."},{"key":"e_1_3_2_1_8_1","article-title":"Email forensic tools: A roadmap to email header analysis through a cybercrime use case","volume":"7","author":"Charalambou E","year":"2016","unstructured":"E Charalambou , R Bratskas , G Karkas , and A Anastasiades . 2016 . Email forensic tools: A roadmap to email header analysis through a cybercrime use case . Journal of Polish Safety and Reliability Association 7 , 1 (2016). E Charalambou, R Bratskas, G Karkas, and A Anastasiades. 2016. Email forensic tools: A roadmap to email header analysis through a cybercrime use case. Journal of Polish Safety and Reliability Association 7, 1 (2016).","journal-title":"Journal of Polish Safety and Reliability Association"},{"volume-title":"Forensic analysis of email on android volatile memory. In 2016 IEEE Trustcom\/BigDataSE\/ISPA","author":"Chen Long","key":"e_1_3_2_1_9_1","unstructured":"Long Chen and Yue Mao . 2016. Forensic analysis of email on android volatile memory. In 2016 IEEE Trustcom\/BigDataSE\/ISPA . IEEE , 945\u2013951. Long Chen and Yue Mao. 2016. Forensic analysis of email on android volatile memory. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. IEEE, 945\u2013951."},{"key":"e_1_3_2_1_10_1","first-page":"201","article-title":"Review of e-mail system, security protocols and email forensics","volume":"5","author":"Chhabra Gurpal\u00a0Singh","year":"2015","unstructured":"Gurpal\u00a0Singh Chhabra and Dilpreet\u00a0Singh Bajwa . 2015 . Review of e-mail system, security protocols and email forensics . International Journal of Computer Science & Communication Networks 5 , 3 (2015), 201 \u2013 211 . Gurpal\u00a0Singh Chhabra and Dilpreet\u00a0Singh Bajwa. 2015. Review of e-mail system, security protocols and email forensics. International Journal of Computer Science & Communication Networks 5, 3 (2015), 201\u2013211.","journal-title":"International Journal of Computer Science & Communication Networks"},{"key":"e_1_3_2_1_11_1","volume-title":"Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22 nd International Information Security Conference (SEC 2007","author":"Grobler P","year":"2007","unstructured":"Cornelia\u00a0 P Grobler and CP Louwrens . 2007 . Digital forensic readiness as a component of information security best practice. In New Approaches for Security , Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22 nd International Information Security Conference (SEC 2007 ), 14\u201316 May 2007, Sandton, South Africa 22. Springer, 13\u201324. Cornelia\u00a0P Grobler and CP Louwrens. 2007. Digital forensic readiness as a component of information security best practice. In New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22 nd International Information Security Conference (SEC 2007), 14\u201316 May 2007, Sandton, South Africa 22. Springer, 13\u201324."},{"key":"e_1_3_2_1_12_1","article-title":"Email Header-A Forensic Key to Examine an Email","volume":"3","author":"Gupta Swapnil","year":"2016","unstructured":"Swapnil Gupta , K Gupta , and Anu Singla . 2016 . Email Header-A Forensic Key to Examine an Email . International Research Journal of Engineering and Technology 3 , 2 (2016). Swapnil Gupta, K Gupta, and Anu Singla. 2016. Email Header-A Forensic Key to Examine an Email. International Research Journal of Engineering and Technology 3, 2 (2016).","journal-title":"International Research Journal of Engineering and Technology"},{"volume-title":"Computer and Information Security Handbook","author":"Gurkok Cem","key":"e_1_3_2_1_13_1","unstructured":"Cem Gurkok . 2017. Cyber Forensics and Incidence Response . In Computer and Information Security Handbook . Elsevier , 603\u2013628. Cem Gurkok. 2017. Cyber Forensics and Incidence Response. In Computer and Information Security Handbook. Elsevier, 603\u2013628."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270424"},{"key":"e_1_3_2_1_15_1","volume-title":"Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?Digital Investigation 30","author":"Ikuesan R","year":"2019","unstructured":"Adeyemi\u00a0 R Ikuesan and Hein\u00a0 S Venter . 2019. Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?Digital Investigation 30 ( 2019 ), 73\u201389. Adeyemi\u00a0R Ikuesan and Hein\u00a0S Venter. 2019. Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?Digital Investigation 30 (2019), 73\u201389."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228692"},{"key":"e_1_3_2_1_17_1","volume-title":"European Conference on Cyber Warfare and Security. Academic Conferences International Limited, 373","author":"Kebande Victor","year":"2015","unstructured":"Victor Kebande and HS Venter . 2015 . A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis . In European Conference on Cyber Warfare and Security. Academic Conferences International Limited, 373 . Victor Kebande and HS Venter. 2015. A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis. In European Conference on Cyber Warfare and Security. Academic Conferences International Limited, 373."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/wfs2.1372"},{"volume-title":"Adding event reconstruction to a Cloud Forensic Readiness model. In 2015 Information Security for South Africa (ISSA)","author":"Kebande R","key":"e_1_3_2_1_20_1","unstructured":"Victor\u00a0 R Kebande and Hein\u00a0 S Venter . 2015. Adding event reconstruction to a Cloud Forensic Readiness model. In 2015 Information Security for South Africa (ISSA) . IEEE , 1\u20139. Victor\u00a0R Kebande and Hein\u00a0S Venter. 2015. Adding event reconstruction to a Cloud Forensic Readiness model. In 2015 Information Security for South Africa (ISSA). IEEE, 1\u20139."},{"key":"e_1_3_2_1_21_1","volume-title":"International Journal of Engineering Research & Technology (IJERT), Special Issue","author":"Mrityunjay U\u00a0Chauhan","year":"2017","unstructured":"U\u00a0Chauhan Mrityunjay and S Gupta . 2017. Novel approach for email forensics . International Journal of Engineering Research & Technology (IJERT), Special Issue ( 2017 ). U\u00a0Chauhan Mrityunjay and S Gupta. 2017. Novel approach for email forensics. International Journal of Engineering Research & Technology (IJERT), Special Issue (2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355371"},{"key":"e_1_3_2_1_23_1","first-page":"1","article-title":"A ten step process for forensic readiness","volume":"2","author":"Rowlingson Robert","year":"2004","unstructured":"Robert Rowlingson 2004 . A ten step process for forensic readiness . International Journal of Digital Evidence 2 , 3 (2004), 1 \u2013 28 . Robert Rowlingson 2004. A ten step process for forensic readiness. International Journal of Digital Evidence 2, 3 (2004), 1\u201328.","journal-title":"International Journal of Digital Evidence"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70090-2"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05487-8_5"},{"key":"e_1_3_2_1_26_1","first-page":"6","article-title":"A forensic email analysis tool using dynamic visualization","volume":"12","author":"Stadlinger Johannes","year":"2017","unstructured":"Johannes Stadlinger and Andreas Dewald . 2017 . A forensic email analysis tool using dynamic visualization . Journal of Digital Forensics, Security and Law 12 , 1 (2017), 6 . Johannes Stadlinger and Andreas Dewald. 2017. A forensic email analysis tool using dynamic visualization. Journal of Digital Forensics, Security and Law 12, 1 (2017), 6.","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_3_2_1_27_1","volume-title":"Forensic readiness","author":"Tan John","year":"2001","unstructured":"John Tan . 2001. Forensic readiness . Cambridge, MA :@ Stake 1 ( 2001 ). John Tan. 2001. Forensic readiness. Cambridge, MA:@ Stake 1 (2001)."},{"key":"e_1_3_2_1_28_1","first-page":"104","article-title":"Legalistic Evaluation of E-Mail Headers Based on Address Spoofing","volume":"5","author":"Upadhyay Rishabh","year":"2018","unstructured":"Rishabh Upadhyay and Chandresh Kumar . 2018 . Legalistic Evaluation of E-Mail Headers Based on Address Spoofing . International Journal of Advanced Engineering Research and Development 5 , 1 (2018), 104 \u2013 113 . Rishabh Upadhyay and Chandresh Kumar. 2018. Legalistic Evaluation of E-Mail Headers Based on Address Spoofing. International Journal of Advanced Engineering Research and Development 5, 1 (2018), 104\u2013113.","journal-title":"International Journal of Advanced Engineering Research and Development"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2015.7382186"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/infrastructures6040054"}],"event":{"name":"NISS 2023: The 6th International Conference on Networking, Intelligent Systems & Security","acronym":"NISS 2023","location":"Larache Morocco"},"container-title":["Proceedings of the 6th International Conference on Networking, Intelligent Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607720.3607739","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607720.3607739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:29Z","timestamp":1750178189000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607720.3607739"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,24]]},"references-count":29,"alternative-id":["10.1145\/3607720.3607739","10.1145\/3607720"],"URL":"https:\/\/doi.org\/10.1145\/3607720.3607739","relation":{},"subject":[],"published":{"date-parts":[[2023,5,24]]},"assertion":[{"value":"2023-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}