Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis Article Swipe
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1109/access.2016.2631543
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/access.2016.2631543
- OA Status
- gold
- Cited By
- 18
- References
- 113
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2560435225
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2560435225Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/access.2016.2631543Digital Object Identifier
- Title
-
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT AnalysisWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-01-01Full publication date if available
- Authors
-
Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Salman Iqbal, Ahmed Abdelaziz, Omar Adil Mahdi, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Shiraz, Yusor Rafid Bahar Al‐Mayouf, Ziar Khan, Kwangman Ko, Muhammad Khurram Khan, Victor ChangList of authors in order
- Landing page
-
https://doi.org/10.1109/access.2016.2631543Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1109/access.2016.2631543Direct OA link when available
- Concepts
-
Cloud computing, SWOT analysis, Computer science, Network forensics, Computer security, Digital forensics, Business, Operating system, MarketingTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
18Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 1, 2023: 4, 2022: 1, 2021: 4, 2020: 3Per-year citation counts (last 5 years)
- References (count)
-
113Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2560435225 |
|---|---|
| doi | https://doi.org/10.1109/access.2016.2631543 |
| ids.doi | https://doi.org/10.1109/access.2016.2631543 |
| ids.mag | 2560435225 |
| ids.openalex | https://openalex.org/W2560435225 |
| fwci | 1.49267588 |
| type | article |
| title | Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis |
| awards[0].id | https://openalex.org/G4624354049 |
| awards[0].funder_id | https://openalex.org/F4320321145 |
| awards[0].display_name | |
| awards[0].funder_award_id | PRG-1436-16 |
| awards[0].funder_display_name | King Saud University |
| biblio.issue | |
| biblio.volume | 4 |
| biblio.last_page | 9820 |
| biblio.first_page | 9800 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9994000196456909 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9990000128746033 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T12034 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9976999759674072 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Digital and Cyber Forensics |
| funders[0].id | https://openalex.org/F4320321145 |
| funders[0].ror | https://ror.org/02f81g417 |
| funders[0].display_name | King Saud University |
| is_xpac | False |
| apc_list.value | 1850 |
| apc_list.currency | USD |
| apc_list.value_usd | 1850 |
| apc_paid.value | 1850 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 1850 |
| concepts[0].id | https://openalex.org/C79974875 |
| concepts[0].level | 2 |
| concepts[0].score | 0.9164918661117554 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[0].display_name | Cloud computing |
| concepts[1].id | https://openalex.org/C119059837 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7683274149894714 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q175096 |
| concepts[1].display_name | SWOT analysis |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.7123918533325195 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C50747538 |
| concepts[3].level | 3 |
| concepts[3].score | 0.4990537166595459 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q7001032 |
| concepts[3].display_name | Network forensics |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.42451778054237366 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C84418412 |
| concepts[5].level | 2 |
| concepts[5].score | 0.18985441327095032 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3246940 |
| concepts[5].display_name | Digital forensics |
| concepts[6].id | https://openalex.org/C144133560 |
| concepts[6].level | 0 |
| concepts[6].score | 0.05554389953613281 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[6].display_name | Business |
| concepts[7].id | https://openalex.org/C111919701 |
| concepts[7].level | 1 |
| concepts[7].score | 0.0 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[7].display_name | Operating system |
| concepts[8].id | https://openalex.org/C162853370 |
| concepts[8].level | 1 |
| concepts[8].score | 0.0 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q39809 |
| concepts[8].display_name | Marketing |
| keywords[0].id | https://openalex.org/keywords/cloud-computing |
| keywords[0].score | 0.9164918661117554 |
| keywords[0].display_name | Cloud computing |
| keywords[1].id | https://openalex.org/keywords/swot-analysis |
| keywords[1].score | 0.7683274149894714 |
| keywords[1].display_name | SWOT analysis |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.7123918533325195 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/network-forensics |
| keywords[3].score | 0.4990537166595459 |
| keywords[3].display_name | Network forensics |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.42451778054237366 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/digital-forensics |
| keywords[5].score | 0.18985441327095032 |
| keywords[5].display_name | Digital forensics |
| keywords[6].id | https://openalex.org/keywords/business |
| keywords[6].score | 0.05554389953613281 |
| keywords[6].display_name | Business |
| language | en |
| locations[0].id | doi:10.1109/access.2016.2631543 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2485537415 |
| locations[0].source.issn | 2169-3536 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2169-3536 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | IEEE Access |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Access |
| locations[0].landing_page_url | https://doi.org/10.1109/access.2016.2631543 |
| locations[1].id | pmh:oai:doaj.org/article:3d3049e1f5d942d782bf82d8057d05c0 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by-sa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | IEEE Access, Vol 4, Pp 9800-9820 (2016) |
| locations[1].landing_page_url | https://doaj.org/article/3d3049e1f5d942d782bf82d8057d05c0 |
| locations[2].id | pmh:oai:eprints.soton.ac.uk:403535 |
| locations[2].is_oa | False |
| locations[2].source.id | https://openalex.org/S4306401019 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | ePrints Soton (University of Southampton) |
| locations[2].source.host_organization | https://openalex.org/I43439940 |
| locations[2].source.host_organization_name | University of Southampton |
| locations[2].source.host_organization_lineage | https://openalex.org/I43439940 |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | PeerReviewed |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | |
| locations[2].landing_page_url | https://eprints.soton.ac.uk/403535/2/stamp.jsp_arnumber%253D7802631%2526tag%253D1 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5107964469 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-5725-6184 |
| authorships[0].author.display_name | Suleman Khan |
| authorships[0].countries | MY |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I33849332 |
| authorships[0].affiliations[0].raw_affiliation_string | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[0].institutions[0].id | https://openalex.org/I33849332 |
| authorships[0].institutions[0].ror | https://ror.org/00rzspn62 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I33849332 |
| authorships[0].institutions[0].country_code | MY |
| authorships[0].institutions[0].display_name | University of Malaya |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Suleman Khan |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[1].author.id | https://openalex.org/A5091401182 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-4388-020X |
| authorships[1].author.display_name | Abdullah Gani |
| authorships[1].countries | MY |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I33849332 |
| authorships[1].affiliations[0].raw_affiliation_string | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[1].institutions[0].id | https://openalex.org/I33849332 |
| authorships[1].institutions[0].ror | https://ror.org/00rzspn62 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I33849332 |
| authorships[1].institutions[0].country_code | MY |
| authorships[1].institutions[0].display_name | University of Malaya |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Abdullah Gani |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[2].author.id | https://openalex.org/A5004213577 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-1062-0329 |
| authorships[2].author.display_name | Ainuddin Wahid Abdul Wahab |
| authorships[2].countries | MY |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I33849332 |
| authorships[2].affiliations[0].raw_affiliation_string | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[2].institutions[0].id | https://openalex.org/I33849332 |
| authorships[2].institutions[0].ror | https://ror.org/00rzspn62 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I33849332 |
| authorships[2].institutions[0].country_code | MY |
| authorships[2].institutions[0].display_name | University of Malaya |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Ainuddin Wahid Abdul Wahab |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[3].author.id | https://openalex.org/A5103260015 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-8318-2679 |
| authorships[3].author.display_name | Salman Iqbal |
| authorships[3].countries | MY |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I33849332 |
| authorships[3].affiliations[0].raw_affiliation_string | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[3].institutions[0].id | https://openalex.org/I33849332 |
| authorships[3].institutions[0].ror | https://ror.org/00rzspn62 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I33849332 |
| authorships[3].institutions[0].country_code | MY |
| authorships[3].institutions[0].display_name | University of Malaya |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Salman Iqbal |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[4].author.id | https://openalex.org/A5070694324 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-3685-5997 |
| authorships[4].author.display_name | Ahmed Abdelaziz |
| authorships[4].countries | MY |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I33849332 |
| authorships[4].affiliations[0].raw_affiliation_string | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[4].institutions[0].id | https://openalex.org/I33849332 |
| authorships[4].institutions[0].ror | https://ror.org/00rzspn62 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I33849332 |
| authorships[4].institutions[0].country_code | MY |
| authorships[4].institutions[0].display_name | University of Malaya |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Ahmed Abdelaziz |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[5].author.id | https://openalex.org/A5040039201 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-7618-3155 |
| authorships[5].author.display_name | Omar Adil Mahdi |
| authorships[5].countries | MY |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I33849332 |
| authorships[5].affiliations[0].raw_affiliation_string | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[5].institutions[0].id | https://openalex.org/I33849332 |
| authorships[5].institutions[0].ror | https://ror.org/00rzspn62 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I33849332 |
| authorships[5].institutions[0].country_code | MY |
| authorships[5].institutions[0].display_name | University of Malaya |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Omar Adil Mahdi |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[6].author.id | https://openalex.org/A5084688088 |
| authorships[6].author.orcid | |
| authorships[6].author.display_name | Abdelmuttlib Ibrahim Abdallaahmed |
| authorships[6].countries | MY |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I33849332 |
| authorships[6].affiliations[0].raw_affiliation_string | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[6].institutions[0].id | https://openalex.org/I33849332 |
| authorships[6].institutions[0].ror | https://ror.org/00rzspn62 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I33849332 |
| authorships[6].institutions[0].country_code | MY |
| authorships[6].institutions[0].display_name | University of Malaya |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | Abdelmuttlib Ibrahim Abdallaahmed |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Center for Mobile Cloud Computing Research, University of Malaya, Kuala Lumpur, Malaysia |
| authorships[7].author.id | https://openalex.org/A5069957039 |
| authorships[7].author.orcid | https://orcid.org/0000-0002-0149-7413 |
| authorships[7].author.display_name | Muhammad Shiraz |
| authorships[7].countries | PK |
| authorships[7].affiliations[0].institution_ids | https://openalex.org/I40597779 |
| authorships[7].affiliations[0].raw_affiliation_string | Federal Urdu University of Arts, Science and Technology, Islamabad, Pakistan |
| authorships[7].institutions[0].id | https://openalex.org/I40597779 |
| authorships[7].institutions[0].ror | https://ror.org/02b52th27 |
| authorships[7].institutions[0].type | education |
| authorships[7].institutions[0].lineage | https://openalex.org/I40597779 |
| authorships[7].institutions[0].country_code | PK |
| authorships[7].institutions[0].display_name | Federal Urdu University |
| authorships[7].author_position | middle |
| authorships[7].raw_author_name | Muhammad Shiraz |
| authorships[7].is_corresponding | False |
| authorships[7].raw_affiliation_strings | Federal Urdu University of Arts, Science and Technology, Islamabad, Pakistan |
| authorships[8].author.id | https://openalex.org/A5083003641 |
| authorships[8].author.orcid | https://orcid.org/0000-0002-7369-6876 |
| authorships[8].author.display_name | Yusor Rafid Bahar Al‐Mayouf |
| authorships[8].countries | MY |
| authorships[8].affiliations[0].institution_ids | https://openalex.org/I885383172 |
| authorships[8].affiliations[0].raw_affiliation_string | Faculty of Engineering and Built Environment, Universiti Kebangssan Malaysia, Bangi, Selangor, Malaysia |
| authorships[8].institutions[0].id | https://openalex.org/I885383172 |
| authorships[8].institutions[0].ror | https://ror.org/00bw8d226 |
| authorships[8].institutions[0].type | education |
| authorships[8].institutions[0].lineage | https://openalex.org/I885383172 |
| authorships[8].institutions[0].country_code | MY |
| authorships[8].institutions[0].display_name | National University of Malaysia |
| authorships[8].author_position | middle |
| authorships[8].raw_author_name | Yusor Rafid Bahar Al-Mayouf |
| authorships[8].is_corresponding | False |
| authorships[8].raw_affiliation_strings | Faculty of Engineering and Built Environment, Universiti Kebangssan Malaysia, Bangi, Selangor, Malaysia |
| authorships[9].author.id | https://openalex.org/A5015846019 |
| authorships[9].author.orcid | |
| authorships[9].author.display_name | Ziar Khan |
| authorships[9].countries | PK |
| authorships[9].affiliations[0].institution_ids | https://openalex.org/I36001604 |
| authorships[9].affiliations[0].raw_affiliation_string | Department of Computer Science, University of Peshawar, Peshawar, Pakistan |
| authorships[9].institutions[0].id | https://openalex.org/I36001604 |
| authorships[9].institutions[0].ror | https://ror.org/02t2qwf81 |
| authorships[9].institutions[0].type | education |
| authorships[9].institutions[0].lineage | https://openalex.org/I36001604 |
| authorships[9].institutions[0].country_code | PK |
| authorships[9].institutions[0].display_name | University of Peshawar |
| authorships[9].author_position | middle |
| authorships[9].raw_author_name | Ziar Khan |
| authorships[9].is_corresponding | False |
| authorships[9].raw_affiliation_strings | Department of Computer Science, University of Peshawar, Peshawar, Pakistan |
| authorships[10].author.id | https://openalex.org/A5086680323 |
| authorships[10].author.orcid | https://orcid.org/0000-0002-7465-5400 |
| authorships[10].author.display_name | Kwangman Ko |
| authorships[10].countries | KR |
| authorships[10].affiliations[0].institution_ids | https://openalex.org/I9507 |
| authorships[10].affiliations[0].raw_affiliation_string | School of computer and information engineering, Sang-Ji University, Wonju, Kangwon, Korea |
| authorships[10].institutions[0].id | https://openalex.org/I9507 |
| authorships[10].institutions[0].ror | https://ror.org/01gqe3t73 |
| authorships[10].institutions[0].type | education |
| authorships[10].institutions[0].lineage | https://openalex.org/I9507 |
| authorships[10].institutions[0].country_code | KR |
| authorships[10].institutions[0].display_name | Sangji University |
| authorships[10].author_position | middle |
| authorships[10].raw_author_name | Kwangman Ko |
| authorships[10].is_corresponding | False |
| authorships[10].raw_affiliation_strings | School of computer and information engineering, Sang-Ji University, Wonju, Kangwon, Korea |
| authorships[11].author.id | https://openalex.org/A5072011650 |
| authorships[11].author.orcid | https://orcid.org/0000-0001-6636-0533 |
| authorships[11].author.display_name | Muhammad Khurram Khan |
| authorships[11].countries | SA |
| authorships[11].affiliations[0].institution_ids | https://openalex.org/I28022161 |
| authorships[11].affiliations[0].raw_affiliation_string | Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia |
| authorships[11].institutions[0].id | https://openalex.org/I28022161 |
| authorships[11].institutions[0].ror | https://ror.org/02f81g417 |
| authorships[11].institutions[0].type | education |
| authorships[11].institutions[0].lineage | https://openalex.org/I28022161 |
| authorships[11].institutions[0].country_code | SA |
| authorships[11].institutions[0].display_name | King Saud University |
| authorships[11].author_position | middle |
| authorships[11].raw_author_name | Muhammad Khurram Khan |
| authorships[11].is_corresponding | False |
| authorships[11].raw_affiliation_strings | Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia |
| authorships[12].author.id | https://openalex.org/A5064078720 |
| authorships[12].author.orcid | https://orcid.org/0000-0002-8012-5852 |
| authorships[12].author.display_name | Victor Chang |
| authorships[12].countries | CN |
| authorships[12].affiliations[0].institution_ids | https://openalex.org/I69356397 |
| authorships[12].affiliations[0].raw_affiliation_string | Xi'an Jiaotong Liverpool University, Suzhou, China |
| authorships[12].institutions[0].id | https://openalex.org/I69356397 |
| authorships[12].institutions[0].ror | https://ror.org/03zmrmn05 |
| authorships[12].institutions[0].type | education |
| authorships[12].institutions[0].lineage | https://openalex.org/I69356397 |
| authorships[12].institutions[0].country_code | CN |
| authorships[12].institutions[0].display_name | Xi’an Jiaotong-Liverpool University |
| authorships[12].author_position | last |
| authorships[12].raw_author_name | Victor Chang |
| authorships[12].is_corresponding | False |
| authorships[12].raw_affiliation_strings | Xi'an Jiaotong Liverpool University, Suzhou, China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1109/access.2016.2631543 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9994000196456909 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2807952359, https://openalex.org/W4205908667, https://openalex.org/W2264828925, https://openalex.org/W4312213642, https://openalex.org/W2378407273, https://openalex.org/W90157332, https://openalex.org/W2364866955 |
| cited_by_count | 18 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2023 |
| counts_by_year[1].cited_by_count | 4 |
| counts_by_year[2].year | 2022 |
| counts_by_year[2].cited_by_count | 1 |
| counts_by_year[3].year | 2021 |
| counts_by_year[3].cited_by_count | 4 |
| counts_by_year[4].year | 2020 |
| counts_by_year[4].cited_by_count | 3 |
| counts_by_year[5].year | 2019 |
| counts_by_year[5].cited_by_count | 3 |
| counts_by_year[6].year | 2018 |
| counts_by_year[6].cited_by_count | 1 |
| counts_by_year[7].year | 2017 |
| counts_by_year[7].cited_by_count | 1 |
| locations_count | 3 |
| best_oa_location.id | doi:10.1109/access.2016.2631543 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2485537415 |
| best_oa_location.source.issn | 2169-3536 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2169-3536 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | IEEE Access |
| best_oa_location.source.host_organization | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IEEE Access |
| best_oa_location.landing_page_url | https://doi.org/10.1109/access.2016.2631543 |
| primary_location.id | doi:10.1109/access.2016.2631543 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2485537415 |
| primary_location.source.issn | 2169-3536 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2169-3536 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | IEEE Access |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Access |
| primary_location.landing_page_url | https://doi.org/10.1109/access.2016.2631543 |
| publication_date | 2016-01-01 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W2153482885, https://openalex.org/W2079686265, https://openalex.org/W1599922864, https://openalex.org/W6675456623, https://openalex.org/W2147415954, https://openalex.org/W6632990461, https://openalex.org/W2126716674, https://openalex.org/W6686335198, https://openalex.org/W6771046537, https://openalex.org/W1867219652, https://openalex.org/W6724224223, https://openalex.org/W2499298135, https://openalex.org/W6734180663, https://openalex.org/W2136135923, https://openalex.org/W6674531144, https://openalex.org/W6601015418, https://openalex.org/W2229135539, https://openalex.org/W2146467316, https://openalex.org/W2104588447, https://openalex.org/W2628759714, https://openalex.org/W2094301398, https://openalex.org/W2103023445, https://openalex.org/W2149065007, https://openalex.org/W1996348431, https://openalex.org/W2102670341, https://openalex.org/W2146840150, https://openalex.org/W2110760901, https://openalex.org/W2133722186, https://openalex.org/W2114296561, https://openalex.org/W2094301408, https://openalex.org/W1977367431, https://openalex.org/W2107616676, https://openalex.org/W2232675679, https://openalex.org/W6631636096, https://openalex.org/W1970399788, https://openalex.org/W2507351359, https://openalex.org/W2094244365, https://openalex.org/W389131132, https://openalex.org/W2025529089, https://openalex.org/W2105167633, https://openalex.org/W6726776695, https://openalex.org/W1573086415, https://openalex.org/W4230507407, https://openalex.org/W2160458098, https://openalex.org/W2080391608, https://openalex.org/W2009495439, https://openalex.org/W6629494994, https://openalex.org/W2104593144, https://openalex.org/W2113005368, https://openalex.org/W1982844836, https://openalex.org/W2037889593, https://openalex.org/W2137093962, https://openalex.org/W1975922514, https://openalex.org/W2087433244, https://openalex.org/W4245089706, https://openalex.org/W152702795, https://openalex.org/W2106671073, https://openalex.org/W1999689146, https://openalex.org/W2295872724, https://openalex.org/W2071221494, https://openalex.org/W2496065351, https://openalex.org/W1973741123, https://openalex.org/W2085047345, https://openalex.org/W2532563258, https://openalex.org/W2000674713, https://openalex.org/W2144203801, https://openalex.org/W2073926476, https://openalex.org/W1986126834, https://openalex.org/W24131227, https://openalex.org/W4243452586, https://openalex.org/W6682095414, https://openalex.org/W6694821995, https://openalex.org/W6680426410, https://openalex.org/W1988356170, https://openalex.org/W6606788690, https://openalex.org/W2070164835, https://openalex.org/W2089217139, https://openalex.org/W2106017115, https://openalex.org/W2066159491, https://openalex.org/W2010563114, https://openalex.org/W2114369308, https://openalex.org/W2124365190, https://openalex.org/W2080715227, https://openalex.org/W2033124062, https://openalex.org/W1515052829, https://openalex.org/W1992122376, https://openalex.org/W2362941995, https://openalex.org/W1542195498, https://openalex.org/W2096127821, https://openalex.org/W1551089724, https://openalex.org/W4254371003, https://openalex.org/W1849243243, https://openalex.org/W24678375, https://openalex.org/W2183289549, https://openalex.org/W1976348146, https://openalex.org/W2084044852, https://openalex.org/W2522443889, https://openalex.org/W2495947746, https://openalex.org/W166227223, https://openalex.org/W1986808060, https://openalex.org/W2103612294, https://openalex.org/W2149903177, https://openalex.org/W2275530856, https://openalex.org/W1524866574, https://openalex.org/W1492454131, https://openalex.org/W1585527934, https://openalex.org/W2130329553, https://openalex.org/W2591909198, https://openalex.org/W2174837112, https://openalex.org/W3103395557, https://openalex.org/W2739088306, https://openalex.org/W2137754263, https://openalex.org/W2993178110 |
| referenced_works_count | 113 |
| abstract_inverted_index.a | 173 |
| abstract_inverted_index.In | 0, 68 |
| abstract_inverted_index.It | 168 |
| abstract_inverted_index.To | 109, 145 |
| abstract_inverted_index.an | 133 |
| abstract_inverted_index.by | 63, 75 |
| abstract_inverted_index.in | 31, 131, 142, 149, 188 |
| abstract_inverted_index.is | 73, 94 |
| abstract_inverted_index.no | 115 |
| abstract_inverted_index.of | 5, 26, 45, 82, 88, 112, 138 |
| abstract_inverted_index.on | 97, 160, 176 |
| abstract_inverted_index.to | 9, 15, 41, 53, 78, 104, 117, 122, 184 |
| abstract_inverted_index.NFM | 52 |
| abstract_inverted_index.The | 24, 92 |
| abstract_inverted_index.and | 17, 22, 101, 127, 148, 157 |
| abstract_inverted_index.are | 155 |
| abstract_inverted_index.end | 147 |
| abstract_inverted_index.for | 85, 136, 182 |
| abstract_inverted_index.has | 12, 119 |
| abstract_inverted_index.its | 186 |
| abstract_inverted_index.our | 113 |
| abstract_inverted_index.the | 3, 6, 32, 43, 46, 55, 71, 76, 80, 89, 106, 110, 152, 161 |
| abstract_inverted_index.SWOT | 166 |
| abstract_inverted_index.been | 120 |
| abstract_inverted_index.best | 111 |
| abstract_inverted_index.date | 118 |
| abstract_inverted_index.find | 79 |
| abstract_inverted_index.have | 172 |
| abstract_inverted_index.need | 77 |
| abstract_inverted_index.such | 27 |
| abstract_inverted_index.that | 58, 170 |
| abstract_inverted_index.this | 69, 146, 150 |
| abstract_inverted_index.(NFM) | 40 |
| abstract_inverted_index.based | 96, 159 |
| abstract_inverted_index.cloud | 19, 33, 49, 61, 66, 86, 90, 107, 128, 143, 162, 177, 189 |
| abstract_inverted_index.found | 141 |
| abstract_inverted_index.lacks | 51 |
| abstract_inverted_index.study | 72 |
| abstract_inverted_index.using | 165 |
| abstract_inverted_index.which | 179 |
| abstract_inverted_index.(SWOT) | 103 |
| abstract_inverted_index.C-NFMs | 154, 171 |
| abstract_inverted_index.affect | 59 |
| abstract_inverted_index.assist | 123 |
| abstract_inverted_index.clouds | 11 |
| abstract_inverted_index.ensure | 185 |
| abstract_inverted_index.impact | 175 |
| abstract_inverted_index.method | 135 |
| abstract_inverted_index.paper, | 70, 151 |
| abstract_inverted_index.recent | 1 |
| abstract_inverted_index.source | 44 |
| abstract_inverted_index.target | 16 |
| abstract_inverted_index.years, | 2 |
| abstract_inverted_index.attack. | 47 |
| abstract_inverted_index.attacks | 30, 57 |
| abstract_inverted_index.current | 83 |
| abstract_inverted_index.exploit | 18 |
| abstract_inverted_index.finding | 132 |
| abstract_inverted_index.further | 180 |
| abstract_inverted_index.implies | 169 |
| abstract_inverted_index.methods | 39 |
| abstract_inverted_index.network | 29, 34, 37, 56, 124, 139, 163 |
| abstract_inverted_index.optimal | 134 |
| abstract_inverted_index.outlook | 105 |
| abstract_inverted_index.service | 129 |
| abstract_inverted_index.threats | 102 |
| abstract_inverted_index.through | 65 |
| abstract_inverted_index.various | 60 |
| abstract_inverted_index.(C-NFMs) | 84 |
| abstract_inverted_index.However, | 48 |
| abstract_inverted_index.analyzed | 158 |
| abstract_inverted_index.identify | 42, 54 |
| abstract_inverted_index.network, | 178 |
| abstract_inverted_index.network. | 108 |
| abstract_inverted_index.networks | 20, 87 |
| abstract_inverted_index.requires | 35, 181 |
| abstract_inverted_index.research | 116 |
| abstract_inverted_index.suitable | 174 |
| abstract_inverted_index.workload | 8 |
| abstract_inverted_index.analysis. | 167 |
| abstract_inverted_index.attracted | 13 |
| abstract_inverted_index.computing | 50 |
| abstract_inverted_index.conducted | 121 |
| abstract_inverted_index.evaluated | 95 |
| abstract_inverted_index.forensics | 38, 125 |
| abstract_inverted_index.hazardous | 28 |
| abstract_inverted_index.intruders | 14 |
| abstract_inverted_index.migration | 4 |
| abstract_inverted_index.motivated | 74 |
| abstract_inverted_index.networks. | 67, 144, 190 |
| abstract_inverted_index.providers | 130 |
| abstract_inverted_index.resources | 62 |
| abstract_inverted_index.classified | 156 |
| abstract_inverted_index.computing. | 91 |
| abstract_inverted_index.internally | 21 |
| abstract_inverted_index.knowledge, | 114 |
| abstract_inverted_index.strengths, | 98 |
| abstract_inverted_index.externally. | 23 |
| abstract_inverted_index.perspective | 164 |
| abstract_inverted_index.reformation | 183 |
| abstract_inverted_index.weaknesses, | 99 |
| abstract_inverted_index.applicability | 81, 93, 187 |
| abstract_inverted_index.comprehensive | 36 |
| abstract_inverted_index.computational | 7, 10 |
| abstract_inverted_index.disseminating | 64 |
| abstract_inverted_index.investigation | 25, 137 |
| abstract_inverted_index.investigators | 126 |
| abstract_inverted_index.opportunities, | 100 |
| abstract_inverted_index.vulnerabilities | 140 |
| abstract_inverted_index.state-of-the-art | 153 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 5 |
| institutions_distinct_count | 13 |
| citation_normalized_percentile.value | 0.86017126 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |