{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:44:27Z","timestamp":1763102667199,"version":"3.45.0"},"reference-count":22,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063687","type":"journal-article","created":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T04:19:16Z","timestamp":1742185156000},"page":"661-683","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["A Common Architecture-Based Smart Home Tools and Applications Forensics for Scalable Investigations"],"prefix":"10.32604","volume":"83","author":[{"given":"Sungbum","family":"Kim","sequence":"first","affiliation":[]},{"given":"Gwangsik","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Song","sequence":"additional","affiliation":[]},{"given":"Insoo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Taeshik","family":"Shon","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"19324","DOI":"10.1007\/s11227-024-06210-w","article-title":"QoS-aware edge server placement for collaborative predictive maintenance in industrial Internet of Things","volume":"80","author":"Mehta","year":"2024","journal-title":"J Supercomput"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"100257","DOI":"10.1016\/j.fsir.2022.100257","article-title":"Industrial Internet of Things (IIoT) forensics: the forgotten concept in the race towards Industry 4.0","volume":"5","author":"Kebande","year":"2022","journal-title":"Forensic Sci Int Rep"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3392","DOI":"10.1007\/s11227-022-04783-y","article-title":"An improved anomaly detection model for IoT security using decision tree and gradient boosting","volume":"79","author":"Douiba","year":"2023","journal-title":"J Supercomput"},{"key":"ref4","first-page":"300922","article-title":"A scalable platform for enabling the forensic investigation of exploited IoT devices and their generated unsolicited activities","volume":"32","author":"Torabi","year":"2020","journal-title":"Forensic Sci Int Digit Investig"},{"key":"ref5","series-title":"2020 IEEE International Conference on Big Data (Big Data)","first-page":"2283","article-title":"Smart home forensics: an exploratory study on smart plug forensic analysis","author":"Iqbal","year":"2020 Dec 10\u201313"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.46386\/ijcfati.v1i1-3.16","article-title":"A forensic analysis of home automation devices (FAHAD) model: Kasa smart light bulb and eufy floodlight camera as case studies","volume":"1","author":"Salamh","year":"2021","journal-title":"Int J Cyber Forensics Adv Threat Investig"},{"key":"ref7","series-title":"2023 International Conference on Information Technology (ICIT)","first-page":"373","article-title":"A survey of Internet of Things (IoT) forensics frameworks and challenges","author":"Abdel-Fattah","year":"2023 Aug 9\u201310"},{"key":"ref8","series-title":"2023 4th International Conference for Emerging Technology (INCET)","first-page":"1","article-title":"Forensics in the internet of things: application specific investigation model, challenges and future directions","author":"Alam","year":"2023"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","article-title":"A survey on the Internet of Things (IoT) forensics: challenges, approaches, and open issues","volume":"22","author":"Stoyanova","year":"2020","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref10","first-page":"301499","article-title":"An improved IoT forensic model to identify interconnectivity between things","volume":"44","author":"Kim","year":"2023","journal-title":"Forensic Sci Int Digit Investig"},{"key":"ref11","series-title":"2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","first-page":"1","article-title":"IoT Forensic A digital investigation framework for IoT systems","author":"Sathwara","year":"2018 Jun 28\u201330"},{"key":"ref12","first-page":"301451","article-title":"Forensic analysis of the xiaomi mi smart sensor set","volume":"42\u201343","author":"Castelo G\u00f3mez","year":"2022","journal-title":"Forensic Sci Int Digit Investig"},{"key":"ref13","series-title":"2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)","first-page":"115","article-title":"Forensic analysis of IoT ecosystem","author":"Bouchaud","year":"2021 Aug 23\u201325"},{"key":"ref14","series-title":"2021 IEEE Global Communications Conference (GLOBECOM)","first-page":"1","article-title":"A common but flexible method for IoT device forensics","author":"Li","year":"2021 Dec 7\u201311"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.3390\/electronics9081215","article-title":"Smart home forensics\u2014data analysis of IoT devices","volume":"9","author":"Kim","year":"2020","journal-title":"Electronics"},{"key":"ref16","series-title":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","first-page":"1","article-title":"Forensic analysis of the August smart device ecosystem","author":"Hutchinson","year":"2020 Oct 20\u201322"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"2827","DOI":"10.3390\/electronics13142827","article-title":"Forensic analysis for cybersecurity of smart home environments with smart wallpads","volume":"13","author":"Kim","year":"2024","journal-title":"Electronics"},{"key":"ref18","first-page":"301130","article-title":"Forensic analysis for AI speaker with display Echo Show 2nd generation as a case study","volume":"38","author":"Youn","year":"2021","journal-title":"Forensic Sci Int Digit Investig"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1007\/s11227-022-04639-5","article-title":"Digital forensic analysis of intelligent and smart IoT devices","volume":"79","author":"Kim","year":"2023","journal-title":"J Supercomput"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"3029","DOI":"10.1007\/s11227-021-03992-1","article-title":"AI-enabled device digital forensics for smart cities","volume":"78","author":"Kim","year":"2022","journal-title":"J Supercomput"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"6487","DOI":"10.1109\/JIOT.2019.2906946","article-title":"IoT forensics: amazon echo as a use case","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"S22","DOI":"10.1016\/j.diin.2019.01.012","article-title":"IoT forensic challenges and opportunities for digital traces","volume":"28","author":"Servida","year":"2019","journal-title":"Digit Investig"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_63687\/TSP_CMC_63687.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:41:43Z","timestamp":1763102503000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":22,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063687","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-01-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-21","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}