Exploring user requirements of network forensic tools Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1016/j.gltp.2021.08.043
Network forensic tools enable security professionals to monitor network performance and compromises. These tools are used to monitor internal and external network attacks. Technological improvements have enabled criminals to wipe out tracks of cybercrime to elude alterations. Network forensics procedures use processes to expedite investigation by tracking each original packet and event that is generated in the network. There are many network forensic tools, both open source and commercial versions available in the market. In this work, the result of a survey participated by different experts in open source network forensic tools have been presented. The advantages, challenges, and necessities have been identified for network forensic investigation of such tools. A few open source network forensic tools have been studied and performed a comparative analysis based on six key parameters. Further, two malware datasets are analyzed using open source tools to perform investigation and present a comprehensive network forensic analysis comprising IO graphs, Flow graphs, TCP stream, UDP multicast stream, mac-based analysis, and operating system analysis.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.gltp.2021.08.043
- OA Status
- diamond
- Cited By
- 8
- References
- 28
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3194424907
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3194424907Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.gltp.2021.08.043Digital Object Identifier
- Title
-
Exploring user requirements of network forensic toolsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-08-13Full publication date if available
- Authors
-
Kousik Barik, Saptarshi Das, Karabi Konar, Bipasha Chakrabarti Banik, Archita BanerjeeList of authors in order
- Landing page
-
https://doi.org/10.1016/j.gltp.2021.08.043Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.gltp.2021.08.043Direct OA link when available
- Concepts
-
Network forensics, Computer science, Cybercrime, Digital forensics, Network security, Malware, Open source, Computer security, Network packet, Key (lock), Network monitoring, Network management, The Internet, Data science, World Wide Web, Computer network, Operating system, SoftwareTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
8Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 3, 2022: 4Per-year citation counts (last 5 years)
- References (count)
-
28Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3194424907 |
|---|---|
| doi | https://doi.org/10.1016/j.gltp.2021.08.043 |
| ids.doi | https://doi.org/10.1016/j.gltp.2021.08.043 |
| ids.mag | 3194424907 |
| ids.openalex | https://openalex.org/W3194424907 |
| fwci | 1.00785668 |
| type | article |
| title | Exploring user requirements of network forensic tools |
| biblio.issue | 2 |
| biblio.volume | 2 |
| biblio.last_page | 354 |
| biblio.first_page | 350 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T12034 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9998000264167786 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Digital and Cyber Forensics |
| topics[2].id | https://openalex.org/T10400 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9997000098228455 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C50747538 |
| concepts[0].level | 3 |
| concepts[0].score | 0.7951420545578003 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q7001032 |
| concepts[0].display_name | Network forensics |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7357712388038635 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C2779390178 |
| concepts[2].level | 3 |
| concepts[2].score | 0.5726191401481628 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q29137 |
| concepts[2].display_name | Cybercrime |
| concepts[3].id | https://openalex.org/C84418412 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5620823502540588 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3246940 |
| concepts[3].display_name | Digital forensics |
| concepts[4].id | https://openalex.org/C182590292 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5603574514389038 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[4].display_name | Network security |
| concepts[5].id | https://openalex.org/C541664917 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5387265682220459 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q14001 |
| concepts[5].display_name | Malware |
| concepts[6].id | https://openalex.org/C3018397939 |
| concepts[6].level | 3 |
| concepts[6].score | 0.5103039741516113 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3644502 |
| concepts[6].display_name | Open source |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.48902544379234314 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C158379750 |
| concepts[8].level | 2 |
| concepts[8].score | 0.48107004165649414 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[8].display_name | Network packet |
| concepts[9].id | https://openalex.org/C26517878 |
| concepts[9].level | 2 |
| concepts[9].score | 0.46983620524406433 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[9].display_name | Key (lock) |
| concepts[10].id | https://openalex.org/C81877898 |
| concepts[10].level | 2 |
| concepts[10].score | 0.45031216740608215 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1965787 |
| concepts[10].display_name | Network monitoring |
| concepts[11].id | https://openalex.org/C129763632 |
| concepts[11].level | 2 |
| concepts[11].score | 0.44921213388442993 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q1454667 |
| concepts[11].display_name | Network management |
| concepts[12].id | https://openalex.org/C110875604 |
| concepts[12].level | 2 |
| concepts[12].score | 0.35683682560920715 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[12].display_name | The Internet |
| concepts[13].id | https://openalex.org/C2522767166 |
| concepts[13].level | 1 |
| concepts[13].score | 0.34596601128578186 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q2374463 |
| concepts[13].display_name | Data science |
| concepts[14].id | https://openalex.org/C136764020 |
| concepts[14].level | 1 |
| concepts[14].score | 0.3370886743068695 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[14].display_name | World Wide Web |
| concepts[15].id | https://openalex.org/C31258907 |
| concepts[15].level | 1 |
| concepts[15].score | 0.2485215663909912 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[15].display_name | Computer network |
| concepts[16].id | https://openalex.org/C111919701 |
| concepts[16].level | 1 |
| concepts[16].score | 0.10123768448829651 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[16].display_name | Operating system |
| concepts[17].id | https://openalex.org/C2777904410 |
| concepts[17].level | 2 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[17].display_name | Software |
| keywords[0].id | https://openalex.org/keywords/network-forensics |
| keywords[0].score | 0.7951420545578003 |
| keywords[0].display_name | Network forensics |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7357712388038635 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/cybercrime |
| keywords[2].score | 0.5726191401481628 |
| keywords[2].display_name | Cybercrime |
| keywords[3].id | https://openalex.org/keywords/digital-forensics |
| keywords[3].score | 0.5620823502540588 |
| keywords[3].display_name | Digital forensics |
| keywords[4].id | https://openalex.org/keywords/network-security |
| keywords[4].score | 0.5603574514389038 |
| keywords[4].display_name | Network security |
| keywords[5].id | https://openalex.org/keywords/malware |
| keywords[5].score | 0.5387265682220459 |
| keywords[5].display_name | Malware |
| keywords[6].id | https://openalex.org/keywords/open-source |
| keywords[6].score | 0.5103039741516113 |
| keywords[6].display_name | Open source |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.48902544379234314 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/network-packet |
| keywords[8].score | 0.48107004165649414 |
| keywords[8].display_name | Network packet |
| keywords[9].id | https://openalex.org/keywords/key |
| keywords[9].score | 0.46983620524406433 |
| keywords[9].display_name | Key (lock) |
| keywords[10].id | https://openalex.org/keywords/network-monitoring |
| keywords[10].score | 0.45031216740608215 |
| keywords[10].display_name | Network monitoring |
| keywords[11].id | https://openalex.org/keywords/network-management |
| keywords[11].score | 0.44921213388442993 |
| keywords[11].display_name | Network management |
| keywords[12].id | https://openalex.org/keywords/the-internet |
| keywords[12].score | 0.35683682560920715 |
| keywords[12].display_name | The Internet |
| keywords[13].id | https://openalex.org/keywords/data-science |
| keywords[13].score | 0.34596601128578186 |
| keywords[13].display_name | Data science |
| keywords[14].id | https://openalex.org/keywords/world-wide-web |
| keywords[14].score | 0.3370886743068695 |
| keywords[14].display_name | World Wide Web |
| keywords[15].id | https://openalex.org/keywords/computer-network |
| keywords[15].score | 0.2485215663909912 |
| keywords[15].display_name | Computer network |
| keywords[16].id | https://openalex.org/keywords/operating-system |
| keywords[16].score | 0.10123768448829651 |
| keywords[16].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.1016/j.gltp.2021.08.043 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210211553 |
| locations[0].source.issn | 2666-285X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2666-285X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Global Transitions Proceedings |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Global Transitions Proceedings |
| locations[0].landing_page_url | https://doi.org/10.1016/j.gltp.2021.08.043 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5010619713 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9296-9561 |
| authorships[0].author.display_name | Kousik Barik |
| authorships[0].affiliations[0].raw_affiliation_string | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Kousik Barik |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| authorships[1].author.id | https://openalex.org/A5074019305 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-8394-5303 |
| authorships[1].author.display_name | Saptarshi Das |
| authorships[1].affiliations[0].raw_affiliation_string | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Saptarshi Das |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| authorships[2].author.id | https://openalex.org/A5060146080 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Karabi Konar |
| authorships[2].affiliations[0].raw_affiliation_string | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Karabi Konar |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| authorships[3].author.id | https://openalex.org/A5017404905 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Bipasha Chakrabarti Banik |
| authorships[3].affiliations[0].raw_affiliation_string | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Bipasha Chakrabarti Banik |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| authorships[4].author.id | https://openalex.org/A5112447135 |
| authorships[4].author.orcid | https://orcid.org/0009-0004-8197-1163 |
| authorships[4].author.display_name | Archita Banerjee |
| authorships[4].affiliations[0].raw_affiliation_string | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Archita Banerjee |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | JIS Institute of Advanced Studies and Research, JIS University, Kolkata, India |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.gltp.2021.08.043 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Exploring user requirements of network forensic tools |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W2121070677, https://openalex.org/W2972427363, https://openalex.org/W4238452393, https://openalex.org/W2161391695, https://openalex.org/W188028618, https://openalex.org/W4385257722, https://openalex.org/W1500698787, https://openalex.org/W2489557937, https://openalex.org/W1970399788, https://openalex.org/W4316659022 |
| cited_by_count | 8 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 3 |
| counts_by_year[2].year | 2022 |
| counts_by_year[2].cited_by_count | 4 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1016/j.gltp.2021.08.043 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210211553 |
| best_oa_location.source.issn | 2666-285X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2666-285X |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Global Transitions Proceedings |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Global Transitions Proceedings |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.gltp.2021.08.043 |
| primary_location.id | doi:10.1016/j.gltp.2021.08.043 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210211553 |
| primary_location.source.issn | 2666-285X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2666-285X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Global Transitions Proceedings |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Global Transitions Proceedings |
| primary_location.landing_page_url | https://doi.org/10.1016/j.gltp.2021.08.043 |
| publication_date | 2021-08-13 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2113147897, https://openalex.org/W6668653937, https://openalex.org/W2061428944, https://openalex.org/W2894588580, https://openalex.org/W6761959837, https://openalex.org/W6774500411, https://openalex.org/W6783556926, https://openalex.org/W3142098412, https://openalex.org/W6674488040, https://openalex.org/W6762013660, https://openalex.org/W6789149970, https://openalex.org/W3201727296, https://openalex.org/W6795963767, https://openalex.org/W3130123506, https://openalex.org/W6788506739, https://openalex.org/W3121510293, https://openalex.org/W3124756206, https://openalex.org/W3008603700, https://openalex.org/W4236765470, https://openalex.org/W1565141760, https://openalex.org/W2940335366, https://openalex.org/W3087648322, https://openalex.org/W2095767446, https://openalex.org/W4240031521, https://openalex.org/W2940828040, https://openalex.org/W4231761965, https://openalex.org/W4253598149, https://openalex.org/W4246246172 |
| referenced_works_count | 28 |
| abstract_inverted_index.A | 110 |
| abstract_inverted_index.a | 80, 122, 145 |
| abstract_inverted_index.IO | 151 |
| abstract_inverted_index.In | 74 |
| abstract_inverted_index.by | 45, 83 |
| abstract_inverted_index.in | 55, 71, 86 |
| abstract_inverted_index.is | 53 |
| abstract_inverted_index.of | 32, 79, 107 |
| abstract_inverted_index.on | 126 |
| abstract_inverted_index.to | 6, 16, 28, 34, 42, 140 |
| abstract_inverted_index.TCP | 155 |
| abstract_inverted_index.The | 95 |
| abstract_inverted_index.UDP | 157 |
| abstract_inverted_index.and | 10, 19, 50, 67, 98, 120, 143, 162 |
| abstract_inverted_index.are | 14, 59, 134 |
| abstract_inverted_index.few | 111 |
| abstract_inverted_index.for | 103 |
| abstract_inverted_index.key | 128 |
| abstract_inverted_index.out | 30 |
| abstract_inverted_index.six | 127 |
| abstract_inverted_index.the | 56, 72, 77 |
| abstract_inverted_index.two | 131 |
| abstract_inverted_index.use | 40 |
| abstract_inverted_index.Flow | 153 |
| abstract_inverted_index.been | 93, 101, 118 |
| abstract_inverted_index.both | 64 |
| abstract_inverted_index.each | 47 |
| abstract_inverted_index.have | 25, 92, 100, 117 |
| abstract_inverted_index.many | 60 |
| abstract_inverted_index.open | 65, 87, 112, 137 |
| abstract_inverted_index.such | 108 |
| abstract_inverted_index.that | 52 |
| abstract_inverted_index.this | 75 |
| abstract_inverted_index.used | 15 |
| abstract_inverted_index.wipe | 29 |
| abstract_inverted_index.There | 58 |
| abstract_inverted_index.These | 12 |
| abstract_inverted_index.based | 125 |
| abstract_inverted_index.elude | 35 |
| abstract_inverted_index.event | 51 |
| abstract_inverted_index.tools | 2, 13, 91, 116, 139 |
| abstract_inverted_index.using | 136 |
| abstract_inverted_index.work, | 76 |
| abstract_inverted_index.enable | 3 |
| abstract_inverted_index.packet | 49 |
| abstract_inverted_index.result | 78 |
| abstract_inverted_index.source | 66, 88, 113, 138 |
| abstract_inverted_index.survey | 81 |
| abstract_inverted_index.system | 164 |
| abstract_inverted_index.tools, | 63 |
| abstract_inverted_index.tools. | 109 |
| abstract_inverted_index.tracks | 31 |
| abstract_inverted_index.Network | 0, 37 |
| abstract_inverted_index.enabled | 26 |
| abstract_inverted_index.experts | 85 |
| abstract_inverted_index.graphs, | 152, 154 |
| abstract_inverted_index.malware | 132 |
| abstract_inverted_index.market. | 73 |
| abstract_inverted_index.monitor | 7, 17 |
| abstract_inverted_index.network | 8, 21, 61, 89, 104, 114, 147 |
| abstract_inverted_index.perform | 141 |
| abstract_inverted_index.present | 144 |
| abstract_inverted_index.stream, | 156, 159 |
| abstract_inverted_index.studied | 119 |
| abstract_inverted_index.Further, | 130 |
| abstract_inverted_index.analysis | 124, 149 |
| abstract_inverted_index.analyzed | 135 |
| abstract_inverted_index.attacks. | 22 |
| abstract_inverted_index.datasets | 133 |
| abstract_inverted_index.expedite | 43 |
| abstract_inverted_index.external | 20 |
| abstract_inverted_index.forensic | 1, 62, 90, 105, 115, 148 |
| abstract_inverted_index.internal | 18 |
| abstract_inverted_index.network. | 57 |
| abstract_inverted_index.original | 48 |
| abstract_inverted_index.security | 4 |
| abstract_inverted_index.tracking | 46 |
| abstract_inverted_index.versions | 69 |
| abstract_inverted_index.analysis, | 161 |
| abstract_inverted_index.analysis. | 165 |
| abstract_inverted_index.available | 70 |
| abstract_inverted_index.criminals | 27 |
| abstract_inverted_index.different | 84 |
| abstract_inverted_index.forensics | 38 |
| abstract_inverted_index.generated | 54 |
| abstract_inverted_index.mac-based | 160 |
| abstract_inverted_index.multicast | 158 |
| abstract_inverted_index.operating | 163 |
| abstract_inverted_index.performed | 121 |
| abstract_inverted_index.processes | 41 |
| abstract_inverted_index.commercial | 68 |
| abstract_inverted_index.comprising | 150 |
| abstract_inverted_index.cybercrime | 33 |
| abstract_inverted_index.identified | 102 |
| abstract_inverted_index.presented. | 94 |
| abstract_inverted_index.procedures | 39 |
| abstract_inverted_index.advantages, | 96 |
| abstract_inverted_index.challenges, | 97 |
| abstract_inverted_index.comparative | 123 |
| abstract_inverted_index.necessities | 99 |
| abstract_inverted_index.parameters. | 129 |
| abstract_inverted_index.performance | 9 |
| abstract_inverted_index.alterations. | 36 |
| abstract_inverted_index.compromises. | 11 |
| abstract_inverted_index.improvements | 24 |
| abstract_inverted_index.participated | 82 |
| abstract_inverted_index.Technological | 23 |
| abstract_inverted_index.comprehensive | 146 |
| abstract_inverted_index.investigation | 44, 106, 142 |
| abstract_inverted_index.professionals | 5 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 91 |
| corresponding_author_ids | https://openalex.org/A5010619713 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 5 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.6299999952316284 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.77744371 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |