Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W2285923621', 'doi': 'https://doi.org/10.15394/jdfsl.2015.1213', 'title': 'Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems', 'display_name': 'Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems', 'publication_year': 2015, 'publication_date': '2015-01-01', 'ids': {'openalex': 'https://openalex.org/W2285923621', 'doi': 'https://doi.org/10.15394/jdfsl.2015.1213', 'mag': '2285923621'}, 'language': 'en', 'primary_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.15394/jdfsl.2015.1213', 'pdf_url': 'https://commons.erau.edu/cgi/viewcontent.cgi?article=1213&context=jdfsl', 'source': {'id': 'https://openalex.org/S2764592663', 'display_name': '\x98The \x9cjournal of digital forensics, security and law', 'issn_l': '1558-7215', 'issn': ['1558-7215', '1558-7223'], 'is_oa': True, 'is_in_doaj': True, 'is_core': True, 'host_organization': 'https://openalex.org/P4310316352', 'host_organization_name': 'Association of Digital Forensics, Security and Law', 'host_organization_lineage': ['https://openalex.org/P4310316352'], 'host_organization_lineage_names': ['Association of Digital Forensics, Security and Law'], 'type': 'journal'}, 'license': 'cc-by-nc', 'license_id': 'https://openalex.org/licenses/cc-by-nc', 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'type': 'article', 'type_crossref': 'journal-article', 'indexed_in': ['crossref'], 'open_access': {'is_oa': True, 'oa_status': 'diamond', 'oa_url': 'https://commons.erau.edu/cgi/viewcontent.cgi?article=1213&context=jdfsl', 'any_repository_has_fulltext': True}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5029731147', 'display_name': 'Tina Wu', 'orcid': None}, 'institutions': [{'id': 'https://openalex.org/I40120149', 'display_name': 'University of Oxford', 'ror': 'https://ror.org/052gg0110', 'country_code': 'GB', 'type': 'education', 'lineage': ['https://openalex.org/I40120149']}], 'countries': ['GB'], 'is_corresponding': False, 'raw_author_name': 'Tina Wu', 'raw_affiliation_strings': ['Cyber Security Centre Department of Computer Science University of Oxford Oxford, United Kingdom'], 'affiliations': [{'raw_affiliation_string': 'Cyber Security Centre Department of Computer Science University of Oxford Oxford, United Kingdom', 'institution_ids': ['https://openalex.org/I40120149']}]}, {'author_position': 'last', 'author': {'id': 'https://openalex.org/A5075453550', 'display_name': 'Jason R. C. Nurse', 'orcid': 'https://orcid.org/0000-0003-4118-1680'}, 'institutions': [{'id': 'https://openalex.org/I40120149', 'display_name': 'University of Oxford', 'ror': 'https://ror.org/052gg0110', 'country_code': 'GB', 'type': 'education', 'lineage': ['https://openalex.org/I40120149']}], 'countries': ['GB'], 'is_corresponding': False, 'raw_author_name': 'Jason Nurse', 'raw_affiliation_strings': ['Cyber Security Centre Department of Computer Science University of Oxford Oxford, United Kingdom'], 'affiliations': [{'raw_affiliation_string': 'Cyber Security Centre Department of Computer Science University of Oxford Oxford, United Kingdom', 'institution_ids': ['https://openalex.org/I40120149']}]}], 'institution_assertions': [], 'countries_distinct_count': 1, 'institutions_distinct_count': 1, 'corresponding_author_ids': [], 'corresponding_institution_ids': [], 'apc_list': {'value': 0, 'currency': 'USD', 'value_usd': 0, 'provenance': 'doaj'}, 'apc_paid': None, 'fwci': 3.584, 'has_fulltext': True, 'fulltext_origin': 'pdf', 'cited_by_count': 20, 'citation_normalized_percentile': {'value': 0.958012, 'is_in_top_1_percent': False, 'is_in_top_10_percent': True}, 'cited_by_percentile_year': {'min': 90, 'max': 91}, 'biblio': {'volume': None, 'issue': None, 'first_page': None, 'last_page': None}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T12034', 'display_name': 'Digital and Cyber Forensics', 'score': 0.9999, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, 'topics': [{'id': 'https://openalex.org/T12034', 'display_name': 'Digital and Cyber Forensics', 'score': 0.9999, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T11241', 'display_name': 'Advanced Malware Detection Techniques', 'score': 0.9999, 'subfield': {'id': 'https://openalex.org/subfields/1711', 'display_name': 'Signal Processing'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T11424', 'display_name': 'Security and Verification in Computing', 'score': 0.9974, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/scada', 'display_name': 'SCADA', 'score': 0.5348678}, {'id': 'https://openalex.org/keywords/computer-forensics', 'display_name': 'Computer forensics', 'score': 0.443861}], 'concepts': [{'id': 'https://openalex.org/C168065819', 'wikidata': 'https://www.wikidata.org/wiki/Q845566', 'display_name': 'Debugging', 'level': 2, 'score': 0.82949686}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.7259918}, {'id': 'https://openalex.org/C84418412', 'wikidata': 'https://www.wikidata.org/wiki/Q3246940', 'display_name': 'Digital forensics', 'level': 2, 'score': 0.6252739}, {'id': 'https://openalex.org/C113863187', 'wikidata': 'https://www.wikidata.org/wiki/Q17498', 'display_name': 'SCADA', 'level': 2, 'score': 0.5348678}, {'id': 'https://openalex.org/C112968700', 'wikidata': 'https://www.wikidata.org/wiki/Q11368', 'display_name': 'Unix', 'level': 3, 'score': 0.51577353}, {'id': 'https://openalex.org/C2777338717', 'wikidata': 'https://www.wikidata.org/wiki/Q1762621', 'display_name': 'Vendor', 'level': 2, 'score': 0.4774809}, {'id': 'https://openalex.org/C556601545', 'wikidata': 'https://www.wikidata.org/wiki/Q878553', 'display_name': 'Computer forensics', 'level': 3, 'score': 0.443861}, {'id': 'https://openalex.org/C149635348', 'wikidata': 'https://www.wikidata.org/wiki/Q193040', 'display_name': 'Embedded system', 'level': 1, 'score': 0.4039778}, {'id': 'https://openalex.org/C115903868', 'wikidata': 'https://www.wikidata.org/wiki/Q80993', 'display_name': 'Software engineering', 'level': 1, 'score': 0.39501706}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.3887148}, {'id': 'https://openalex.org/C2777904410', 'wikidata': 'https://www.wikidata.org/wiki/Q7397', 'display_name': 'Software', 'level': 2, 'score': 0.3876797}, {'id': 'https://openalex.org/C111919701', 'wikidata': 'https://www.wikidata.org/wiki/Q9135', 'display_name': 'Operating system', 'level': 1, 'score': 0.3621416}, {'id': 'https://openalex.org/C127413603', 'wikidata': 'https://www.wikidata.org/wiki/Q11023', 'display_name': 'Engineering', 'level': 0, 'score': 0.18005934}, {'id': 'https://openalex.org/C162853370', 'wikidata': 'https://www.wikidata.org/wiki/Q39809', 'display_name': 'Marketing', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C144133560', 'wikidata': 'https://www.wikidata.org/wiki/Q4830453', 'display_name': 'Business', 'level': 0, 'score': 0.0}, {'id': 'https://openalex.org/C119599485', 'wikidata': 'https://www.wikidata.org/wiki/Q43035', 'display_name': 'Electrical engineering', 'level': 1, 'score': 0.0}], 'mesh': [], 'locations_count': 5, 'locations': [{'is_oa': True, 'landing_page_url': 'https://doi.org/10.15394/jdfsl.2015.1213', 'pdf_url': 'https://commons.erau.edu/cgi/viewcontent.cgi?article=1213&context=jdfsl', 'source': {'id': 'https://openalex.org/S2764592663', 'display_name': '\x98The \x9cjournal of digital forensics, security and law', 'issn_l': '1558-7215', 'issn': ['1558-7215', '1558-7223'], 'is_oa': True, 'is_in_doaj': True, 'is_core': True, 'host_organization': 'https://openalex.org/P4310316352', 'host_organization_name': 'Association of Digital Forensics, Security and Law', 'host_organization_lineage': ['https://openalex.org/P4310316352'], 'host_organization_lineage_names': ['Association of Digital Forensics, Security and Law'], 'type': 'journal'}, 'license': 'cc-by-nc', 'license_id': 'https://openalex.org/licenses/cc-by-nc', 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, {'is_oa': True, 'landing_page_url': 'https://kar.kent.ac.uk/67499/1/349-1324-1-PB.pdf', 'pdf_url': 'https://kar.kent.ac.uk/67499/1/349-1324-1-PB.pdf', 'source': None, 'license': 'cc-by-nc-nd', 'license_id': 'https://openalex.org/licenses/cc-by-nc-nd', 'version': 'acceptedVersion', 'is_accepted': True, 'is_published': False}, {'is_oa': True, 'landing_page_url': 'https://ora.ox.ac.uk/objects/uuid:86e8c80c-5d32-4bd9-bf8a-9ce006878e1e', 'pdf_url': 'https://ora.ox.ac.uk/objects/uuid:86e8c80c-5d32-4bd9-bf8a-9ce006878e1e/files/mb007121182a192467a3d3a68494cad39', 'source': {'id': 'https://openalex.org/S4306402636', 'display_name': 'Oxford University Research Archive (ORA) (University of Oxford)', 'issn_l': None, 'issn': None, 'is_oa': True, 'is_in_doaj': False, 'is_core': False, 'host_organization': 'https://openalex.org/I40120149', 'host_organization_name': 'University of Oxford', 'host_organization_lineage': ['https://openalex.org/I40120149'], 'host_organization_lineage_names': ['University of Oxford'], 'type': 'repository'}, 'license': 'cc-by', 'license_id': 'https://openalex.org/licenses/cc-by', 'version': 'submittedVersion', 'is_accepted': False, 'is_published': False}, {'is_oa': True, 'landing_page_url': 'https://commons.erau.edu/jdfsl/vol10/iss4/7', 'pdf_url': None, 'source': {'id': 'https://openalex.org/S4377196356', 'display_name': 'Scholarly Commons (Embry–Riddle Aeronautical University)', 'issn_l': None, 'issn': None, 'is_oa': False, 'is_in_doaj': False, 'is_core': False, 'host_organization': 'https://openalex.org/I84475105', 'host_organization_name': 'Embry–Riddle Aeronautical University', 'host_organization_lineage': ['https://openalex.org/I84475105'], 'host_organization_lineage_names': ['Embry–Riddle Aeronautical University'], 'type': 'repository'}, 'license': 'cc-by-nc', 'license_id': 'https://openalex.org/licenses/cc-by-nc', 'version': 'submittedVersion', 'is_accepted': False, 'is_published': False}, {'is_oa': True, 'landing_page_url': 'https://ora.ox.ac.uk/objects/uuid:db3f1934-f6b4-4b5b-8c83-b2d0055b97b1', 'pdf_url': 'https://ora.ox.ac.uk/objects/uuid:db3f1934-f6b4-4b5b-8c83-b2d0055b97b1/files/mc13eed98a2dde282a3786adb6066d280', 'source': {'id': 'https://openalex.org/S4306402636', 'display_name': 'Oxford University Research Archive (ORA) (University of Oxford)', 'issn_l': None, 'issn': None, 'is_oa': True, 'is_in_doaj': False, 'is_core': False, 'host_organization': 'https://openalex.org/I40120149', 'host_organization_name': 'University of Oxford', 'host_organization_lineage': ['https://openalex.org/I40120149'], 'host_organization_lineage_names': ['University of Oxford'], 'type': 'repository'}, 'license': None, 'license_id': None, 'version': 'submittedVersion', 'is_accepted': False, 'is_published': False}], 'best_oa_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.15394/jdfsl.2015.1213', 'pdf_url': 'https://commons.erau.edu/cgi/viewcontent.cgi?article=1213&context=jdfsl', 'source': {'id': 'https://openalex.org/S2764592663', 'display_name': '\x98The \x9cjournal of digital forensics, security and law', 'issn_l': '1558-7215', 'issn': ['1558-7215', '1558-7223'], 'is_oa': True, 'is_in_doaj': True, 'is_core': True, 'host_organization': 'https://openalex.org/P4310316352', 'host_organization_name': 'Association of Digital Forensics, Security and Law', 'host_organization_lineage': ['https://openalex.org/P4310316352'], 'host_organization_lineage_names': ['Association of Digital Forensics, Security and Law'], 'type': 'journal'}, 'license': 'cc-by-nc', 'license_id': 'https://openalex.org/licenses/cc-by-nc', 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'sustainable_development_goals': [{'score': 0.48, 'display_name': 'Peace, justice, and strong institutions', 'id': 'https://metadata.un.org/sdg/16'}], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 15, 'referenced_works': ['https://openalex.org/W152620456', 'https://openalex.org/W1545599162', 'https://openalex.org/W1550805152', 'https://openalex.org/W1948366613', 'https://openalex.org/W2009166708', 'https://openalex.org/W2012446724', 'https://openalex.org/W2041078517', 'https://openalex.org/W2048168101', 'https://openalex.org/W2096224818', 'https://openalex.org/W2116666322', 'https://openalex.org/W2116820421', 'https://openalex.org/W2285617549', 'https://openalex.org/W2716664989', 'https://openalex.org/W4285719527', 'https://openalex.org/W47302799'], 'related_works': ['https://openalex.org/W4283205458', 'https://openalex.org/W4247205791', 'https://openalex.org/W4238452393', 'https://openalex.org/W3002268218', 'https://openalex.org/W3001565613', 'https://openalex.org/W2558079263', 'https://openalex.org/W2489557937', 'https://openalex.org/W2385667210', 'https://openalex.org/W2181728705', 'https://openalex.org/W2167366752'], 'abstract_inverted_index': {'The': [0, 219], 'Stuxnet': [1], 'malware': [2], 'attack': [3], 'has': [4, 309], 'provided': [5, 224], 'strong': [6], 'evidence': [7, 225], 'for': [8, 69, 130], 'the': [9, 79, 102, 134, 139, 148, 152, 166, 177, 181, 205, 234, 243, 279, 284, 298, 317], 'development': [10, 74], 'of': [11, 63, 75, 138, 151, 180, 297], 'a': [12, 60, 161, 188, 198, 209, 272, 313], 'forensic': [13, 23, 108, 162, 199, 273, 314], 'capability': [14], 'to': [15, 28, 77, 114, 132, 147, 172, 201, 226, 232, 241, 266, 275], 'aid': [16], 'in': [17, 95, 305], 'thorough': [18], 'post-incident': [19], 'investigations.': [20], 'Current': [21], 'live': [22], 'tools': [24, 65, 76, 126, 156], 'are': [25, 319], 'typically': [26], 'used': [27, 113, 129, 255], 'acquire': [29, 78, 202, 233, 278], 'and': [30, 136, 203, 240, 277], 'examine': [31], 'memory': [32, 149, 178], 'from': [33, 82, 142, 176, 221], 'computers': [34], 'running': [35], 'either': [36], 'Windows': [37], 'or': [38], 'Unix.': [39], 'This': [40, 300], 'makes': [41], 'them': [42], 'incompatible': [43], 'with': [44, 72, 91], 'embedded': [45], 'devices': [46], 'found': [47], 'on': [48, 194, 208, 283], 'SCADA': [49, 70], 'systems': [50], 'that': [51, 101, 110, 123, 169, 228, 302], 'have': [52, 66, 157], 'their': [53], 'own': [54], 'bespoke': [55], 'operating': [56], 'system.': [57], 'Currently,': [58], 'only': [59], 'limited': [61, 310], 'number': [62], 'forensics': [64, 131], 'been': [67], 'developed': [68, 216], 'systems,': [71], 'no': [73], 'program': [80, 103, 140, 206, 235, 280], 'code': [81, 104, 141, 207, 236], 'PLCs.': [83, 143], 'In': [84, 251], 'this': [85, 89, 287], 'paper,': [86], 'we': [87, 191, 215, 254], 'explore': [88], 'problem': [90], 'two': [92, 213, 217], 'main': [93], 'hypotheses': [94, 214], 'mind.': [96], 'Our': [97, 119], 'first': [98], 'hypothesis': [99, 121, 248, 288], 'was': [100, 122, 249, 289], 'is': [105, 230], 'an': [106, 116, 256], 'important': [107], 'artefact': [109], 'can': [111, 127], 'be': [112, 128], 'determine': [115], "attacker's": [117, 244], 'intentions.': [118], 'second': [120], 'PLC': [124, 154, 195, 238, 268, 292, 303], 'debugging': [125, 155], 'facilitate': [133], 'acquisition': [135], 'analysis': [137], 'With': [144], 'direct': [145], 'access': [146], 'addresses': [150, 179], 'PLC,': [153, 182], 'promising': [158], 'functionalities': [159], 'as': [160, 165, 197, 271, 291, 312], 'tool,': [163, 315], 'such': [164], '"Snapshot"': [167], 'function': [168], 'allows': [170], 'users': [171], 'directly': [173], 'take': [174], 'values': [175], 'without': [183], 'vendor': [184], 'specific': [185], 'software.': [186], 'As': [187], 'case': [189], 'example': [190], 'will': [192], 'focus': [193], 'Logger': [196, 239, 293, 304], 'tool': [200, 274], 'analyse': [204, 276], 'PLC.': [210], 'Using': [211], 'these': [212], 'experiments.': [218], 'results': [220], 'Experiment': [222, 252], '1': [223], 'indicate': [227], 'it': [229], 'possible': [231], 'using': [237], 'identify': [242], 'intention,': [245], 'therefore': [246], 'our': [247], 'accepted.': [250], '2,': [253], 'existing': [257], 'Computer': [258], 'Forensics': [259], 'Tool': [260], 'Testing': [261], '(CFTT)': [262], 'framework': [263], 'by': [264], 'NIST': [265], 'test': [267], "Logger's": [269], 'suitability': [270, 311], 'code.': [281], 'Based': [282], "experiment's": [285], 'results,': [286], 'rejected': [290], 'had': [294], 'failed': [295], 'half': [296], 'tests.': [299], 'suggests': [301], 'its': [306], 'current': [307], 'state': [308], 'unless': [316], 'shortcomings': [318], 'addressed.': [320]}, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W2285923621', 'counts_by_year': [{'year': 2023, 'cited_by_count': 6}, {'year': 2022, 'cited_by_count': 5}, {'year': 2021, 'cited_by_count': 2}, {'year': 2020, 'cited_by_count': 1}, {'year': 2019, 'cited_by_count': 2}, {'year': 2018, 'cited_by_count': 2}, {'year': 2017, 'cited_by_count': 2}], 'updated_date': '2025-01-08T05:59:05.859857', 'created_date': '2016-06-24'}