Network Forensic Process Models Article Swipe
R. C. Joshi
,
Emmanuel S. Pilli
·
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1007/978-1-4471-7299-4_2
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1007/978-1-4471-7299-4_2
In this chapter, various process models along with their various phases in the field of digital forensics and network forensics are discussed. The discussion in the field of processing digital forensics and network forensics is also given. Models based on hierarchy are discussed. The process models in the field of network forensics are given more emphasis in discussion. A generic process model for network forensics is given with detailed discussion.
Related Topics
Concepts
Metadata
- Type
- book-chapter
- Language
- en
- Landing Page
- https://doi.org/10.1007/978-1-4471-7299-4_2
- OA Status
- hybrid
- References
- 23
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2557623191
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2557623191Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/978-1-4471-7299-4_2Digital Object Identifier
- Title
-
Network Forensic Process ModelsWork title
- Type
-
book-chapterOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-01-01Full publication date if available
- Authors
-
R. C. Joshi, Emmanuel S. PilliList of authors in order
- Landing page
-
https://doi.org/10.1007/978-1-4471-7299-4_2Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1007/978-1-4471-7299-4_2Direct OA link when available
- Concepts
-
Network forensics, Digital forensics, Computer forensics, Computer science, Process (computing), Field (mathematics), Data science, Computer security, Pure mathematics, Operating system, MathematicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
23Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2557623191 |
|---|---|
| doi | https://doi.org/10.1007/978-1-4471-7299-4_2 |
| ids.doi | https://doi.org/10.1007/978-1-4471-7299-4_2 |
| ids.mag | 2557623191 |
| ids.openalex | https://openalex.org/W2557623191 |
| fwci | 0.0 |
| type | book-chapter |
| title | Network Forensic Process Models |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 45 |
| biblio.first_page | 17 |
| topics[0].id | https://openalex.org/T12034 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Digital and Cyber Forensics |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9988999962806702 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T12519 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9786999821662903 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Cybercrime and Law Enforcement Studies |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C50747538 |
| concepts[0].level | 3 |
| concepts[0].score | 0.8814150094985962 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q7001032 |
| concepts[0].display_name | Network forensics |
| concepts[1].id | https://openalex.org/C84418412 |
| concepts[1].level | 2 |
| concepts[1].score | 0.801337718963623 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3246940 |
| concepts[1].display_name | Digital forensics |
| concepts[2].id | https://openalex.org/C556601545 |
| concepts[2].level | 3 |
| concepts[2].score | 0.7801824808120728 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q878553 |
| concepts[2].display_name | Computer forensics |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.6557550430297852 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C98045186 |
| concepts[4].level | 2 |
| concepts[4].score | 0.6293855905532837 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q205663 |
| concepts[4].display_name | Process (computing) |
| concepts[5].id | https://openalex.org/C9652623 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5951545834541321 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q190109 |
| concepts[5].display_name | Field (mathematics) |
| concepts[6].id | https://openalex.org/C2522767166 |
| concepts[6].level | 1 |
| concepts[6].score | 0.37439191341400146 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2374463 |
| concepts[6].display_name | Data science |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.24031659960746765 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C202444582 |
| concepts[8].level | 1 |
| concepts[8].score | 0.0 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q837863 |
| concepts[8].display_name | Pure mathematics |
| concepts[9].id | https://openalex.org/C111919701 |
| concepts[9].level | 1 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[9].display_name | Operating system |
| concepts[10].id | https://openalex.org/C33923547 |
| concepts[10].level | 0 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[10].display_name | Mathematics |
| keywords[0].id | https://openalex.org/keywords/network-forensics |
| keywords[0].score | 0.8814150094985962 |
| keywords[0].display_name | Network forensics |
| keywords[1].id | https://openalex.org/keywords/digital-forensics |
| keywords[1].score | 0.801337718963623 |
| keywords[1].display_name | Digital forensics |
| keywords[2].id | https://openalex.org/keywords/computer-forensics |
| keywords[2].score | 0.7801824808120728 |
| keywords[2].display_name | Computer forensics |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.6557550430297852 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/process |
| keywords[4].score | 0.6293855905532837 |
| keywords[4].display_name | Process (computing) |
| keywords[5].id | https://openalex.org/keywords/field |
| keywords[5].score | 0.5951545834541321 |
| keywords[5].display_name | Field (mathematics) |
| keywords[6].id | https://openalex.org/keywords/data-science |
| keywords[6].score | 0.37439191341400146 |
| keywords[6].display_name | Data science |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.24031659960746765 |
| keywords[7].display_name | Computer security |
| language | en |
| locations[0].id | doi:10.1007/978-1-4471-7299-4_2 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210175725 |
| locations[0].source.issn | 1617-7975, 2197-8433 |
| locations[0].source.type | book series |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1617-7975 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Computer communications and networks |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Computer Communications and Networks |
| locations[0].landing_page_url | https://doi.org/10.1007/978-1-4471-7299-4_2 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101884639 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9612-2691 |
| authorships[0].author.display_name | R. C. Joshi |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I60054993 |
| authorships[0].affiliations[0].raw_affiliation_string | Graphic Era University, Dehradun, Uttarakhand, India |
| authorships[0].institutions[0].id | https://openalex.org/I60054993 |
| authorships[0].institutions[0].ror | https://ror.org/03wqgqd89 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I60054993 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Graphic Era University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | R. C. Joshi |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Graphic Era University, Dehradun, Uttarakhand, India |
| authorships[1].author.id | https://openalex.org/A5040360984 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-6056-1147 |
| authorships[1].author.display_name | Emmanuel S. Pilli |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I83205935 |
| authorships[1].affiliations[0].raw_affiliation_string | Malaviya National Institute of Technology, Jaipur, Rajasthan, India |
| authorships[1].institutions[0].id | https://openalex.org/I83205935 |
| authorships[1].institutions[0].ror | https://ror.org/0077k1j32 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I83205935 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Malaviya National Institute of Technology Jaipur |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Emmanuel S. Pilli |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Malaviya National Institute of Technology, Jaipur, Rajasthan, India |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1007/978-1-4471-7299-4_2 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Network Forensic Process Models |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T12034 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Digital and Cyber Forensics |
| related_works | https://openalex.org/W4238452393, https://openalex.org/W2489557937, https://openalex.org/W2161391695, https://openalex.org/W3018602826, https://openalex.org/W2480188389, https://openalex.org/W4240498326, https://openalex.org/W4283205458, https://openalex.org/W4385257722, https://openalex.org/W2972427363, https://openalex.org/W2067681493 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/978-1-4471-7299-4_2 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210175725 |
| best_oa_location.source.issn | 1617-7975, 2197-8433 |
| best_oa_location.source.type | book series |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1617-7975 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Computer communications and networks |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Computer Communications and Networks |
| best_oa_location.landing_page_url | https://doi.org/10.1007/978-1-4471-7299-4_2 |
| primary_location.id | doi:10.1007/978-1-4471-7299-4_2 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210175725 |
| primary_location.source.issn | 1617-7975, 2197-8433 |
| primary_location.source.type | book series |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1617-7975 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Computer communications and networks |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Computer Communications and Networks |
| primary_location.landing_page_url | https://doi.org/10.1007/978-1-4471-7299-4_2 |
| publication_date | 2016-01-01 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W6601519416, https://openalex.org/W2031533739, https://openalex.org/W2030681840, https://openalex.org/W2000577549, https://openalex.org/W2058085704, https://openalex.org/W2110760901, https://openalex.org/W2136135923, https://openalex.org/W2053819965, https://openalex.org/W2099196057, https://openalex.org/W2109019522, https://openalex.org/W2545369399, https://openalex.org/W2532563258, https://openalex.org/W2085047345, https://openalex.org/W1975734025, https://openalex.org/W1970399788, https://openalex.org/W2532390034, https://openalex.org/W2170873916, https://openalex.org/W2156849122, https://openalex.org/W2144142225, https://openalex.org/W1968022119, https://openalex.org/W159069299, https://openalex.org/W2261973985, https://openalex.org/W4285719527 |
| referenced_works_count | 23 |
| abstract_inverted_index.A | 58 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.in | 11, 24, 46, 56 |
| abstract_inverted_index.is | 34, 65 |
| abstract_inverted_index.of | 14, 27, 49 |
| abstract_inverted_index.on | 39 |
| abstract_inverted_index.The | 22, 43 |
| abstract_inverted_index.and | 17, 31 |
| abstract_inverted_index.are | 20, 41, 52 |
| abstract_inverted_index.for | 62 |
| abstract_inverted_index.the | 12, 25, 47 |
| abstract_inverted_index.also | 35 |
| abstract_inverted_index.more | 54 |
| abstract_inverted_index.this | 1 |
| abstract_inverted_index.with | 7, 67 |
| abstract_inverted_index.along | 6 |
| abstract_inverted_index.based | 38 |
| abstract_inverted_index.field | 13, 26, 48 |
| abstract_inverted_index.given | 53, 66 |
| abstract_inverted_index.model | 61 |
| abstract_inverted_index.their | 8 |
| abstract_inverted_index.Models | 37 |
| abstract_inverted_index.given. | 36 |
| abstract_inverted_index.models | 5, 45 |
| abstract_inverted_index.phases | 10 |
| abstract_inverted_index.digital | 15, 29 |
| abstract_inverted_index.generic | 59 |
| abstract_inverted_index.network | 18, 32, 50, 63 |
| abstract_inverted_index.process | 4, 44, 60 |
| abstract_inverted_index.various | 3, 9 |
| abstract_inverted_index.chapter, | 2 |
| abstract_inverted_index.detailed | 68 |
| abstract_inverted_index.emphasis | 55 |
| abstract_inverted_index.forensics | 16, 19, 30, 33, 51, 64 |
| abstract_inverted_index.hierarchy | 40 |
| abstract_inverted_index.discussed. | 21, 42 |
| abstract_inverted_index.discussion | 23 |
| abstract_inverted_index.processing | 28 |
| abstract_inverted_index.discussion. | 57, 69 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.47999998927116394 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.29135873 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |