Search dblp for Publications

export results for "toc:db/journals/di/di40.bht:"

 download as .bib file

@article{DBLP:journals/di/AkilalK22,
  author       = {Abdellah Akilal and
                  M. Tahar Kechadi},
  title        = {An improved forensic-by-design framework for cloud computing with
                  systems engineering standard compliance},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301315},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301315},
  doi          = {10.1016/J.FSIDI.2021.301315},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AkilalK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BahamazavaN22,
  author       = {Katsiaryna Bahamazava and
                  Rohan Nanda},
  title        = {The shift of DarkNet illegal drug trade preferences in cryptocurrency:
                  The question of traceability and deterrence},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301377},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301377},
  doi          = {10.1016/J.FSIDI.2022.301377},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BahamazavaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BangPL22,
  author       = {Jewan Bang and
                  Jungheum Park and
                  Sangjin Lee},
  title        = {Vision: An empirical framework for examiners to accessing password-protected
                  resources for on-the-scene digital investigations},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301376},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301376},
  doi          = {10.1016/J.FSIDI.2022.301376},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BangPL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CalderoniM22,
  author       = {Luca Calderoni and
                  Antonio Magnani},
  title        = {The impact of face image compression in future generation electronic
                  identity documents},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301345},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301345},
  doi          = {10.1016/J.FSIDI.2022.301345},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CalderoniM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChamotGH22,
  author       = {Frederic Chamot and
                  Zeno J. M. H. Geradts and
                  Evert Haasdijk},
  title        = {Deepfake forensics: Cross-manipulation robustness of feedforward-
                  and recurrent convolutional forgery detection methods},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301374},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301374},
  doi          = {10.1016/J.FSIDI.2022.301374},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChamotGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ClosserB22,
  author       = {Dayton Closser and
                  Elias Bou{-}Harb},
  title        = {A live digital forensics approach for quantum mechanical computers},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301341},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301341},
  doi          = {10.1016/J.FSIDI.2022.301341},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ClosserB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DaviesMB22,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {NapierOne: {A} modern mixed file data set alternative to Govdocs1},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301330},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301330},
  doi          = {10.1016/J.FSIDI.2021.301330},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DaviesMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Fernandez-Alvarez22,
  author       = {Pedro Fern{\'{a}}ndez{-}{\'{A}}lvarez and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Extraction and analysis of retrievable memory artifacts from Windows
                  Telegram Desktop application},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301342},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301342},
  doi          = {10.1016/J.FSIDI.2022.301342},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Fernandez-Alvarez22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GobelMTBM22,
  author       = {Thomas G{\"{o}}bel and
                  Stephan Maltan and
                  Jan T{\"{u}}rr and
                  Harald Baier and
                  Florian Mann},
  title        = {ForTrace - {A} holistic forensic data set synthesis framework},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301344},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301344},
  doi          = {10.1016/J.FSIDI.2022.301344},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GobelMTBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HiranoHK22,
  author       = {Manabu Hirano and
                  Ryo Hodota and
                  Ryotaro Kobayashi},
  title        = {RanSAP: An open dataset of ransomware storage access patterns for
                  training machine learning models},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301314},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301314},
  doi          = {10.1016/J.FSIDI.2021.301314},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HiranoHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman22,
  author       = {Graeme Horsman},
  title        = {Conducting a 'manual examination' of a device as part of a digital
                  investigation},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301331},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301331},
  doi          = {10.1016/J.FSIDI.2021.301331},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman22a,
  author       = {Graeme Horsman},
  title        = {Defining principles for preserving privacy in digital forensic examinations},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301350},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301350},
  doi          = {10.1016/J.FSIDI.2022.301350},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Jaquet-Chiffelle22,
  author       = {David{-}Olivier Jaquet{-}Chiffelle and
                  Eoghan Casey and
                  Jonathan Bourquenoud},
  title        = {Corrigendum to "Tamperproof timestamped provenance ledger using blockchain
                  technology{\({_\ast}\)}" [Forens. Sci. Int.: Digit. Invest. 33 {(2020)}
                  300977]},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301332},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301332},
  doi          = {10.1016/J.FSIDI.2022.301332},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Jaquet-Chiffelle22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhaireK22,
  author       = {Pushpajit Khaire and
                  Praveen Kumar},
  title        = {A semi-supervised deep learning based video anomaly detection framework
                  using {RGB-D} for surveillance of real-world critical environments},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301346},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301346},
  doi          = {10.1016/J.FSIDI.2022.301346},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KhaireK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimKSYSLK22,
  author       = {Soram Kim and
                  Giyoon Kim and
                  Sumin Shin and
                  Byungchul Youn and
                  Jian Song and
                  Insoo Lee and
                  Jongsung Kim},
  title        = {Methods for recovering deleted data from the Realm database: Case
                  study on Minitalk and Xabber},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301353},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301353},
  doi          = {10.1016/J.FSIDI.2022.301353},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KimKSYSLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LamshoftNHVD22,
  author       = {Kevin Lamsh{\"{o}}ft and
                  Tom Neubert and
                  Jonas Hielscher and
                  Claus Vielhauer and
                  Jana Dittmann},
  title        = {Knock, knock, log: Threat analysis, detection {\&} mitigation
                  of covert channels in syslog using port scans as cover},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301335},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301335},
  doi          = {10.1016/J.FSIDI.2022.301335},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LamshoftNHVD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Marshall22,
  author       = {Angus M. Marshall},
  title        = {The unwanted effects of imprecise language in forensic science standards},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301349},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301349},
  doi          = {10.1016/J.FSIDI.2022.301349},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Marshall22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NealeKPYN22,
  author       = {Christopher Neale and
                  Ian Kennedy and
                  Blaine A. Price and
                  Yijun Yu and
                  Bashar Nuseibeh},
  title        = {The case for Zero Trust Digital Forensics},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301352},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301352},
  doi          = {10.1016/J.FSIDI.2022.301352},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NealeKPYN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nikkel22,
  author       = {Bruce J. Nikkel},
  title        = {Editorial},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301388},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301388},
  doi          = {10.1016/J.FSIDI.2022.301388},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Nikkel22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ProfTC22,
  author       = {Felix Olu Bankole and
                  Ayankunle A. Taiwo and
                  Ivan Claims},
  title        = {An extended digital forensic readiness and maturity model},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301348},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301348},
  doi          = {10.1016/J.FSIDI.2022.301348},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ProfTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RaisALA22,
  author       = {Muhammad Haris Rais and
                  Rima Asmar Awad and
                  Juan Lopez Jr. and
                  Irfan Ahmed},
  title        = {Memory forensic analysis of a programmable logic controller in industrial
                  control systems},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301339},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301339},
  doi          = {10.1016/J.FSIDI.2022.301339},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RaisALA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SandvikFAA22,
  author       = {Jens{-}Petter Sandvik and
                  Katrin Franke and
                  Habtamu Abie and
                  Andr{\'{e}} {\AA}rnes},
  title        = {Quantifying data volatility for IoT forensics with examples from Contiki
                  {OS}},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301343},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301343},
  doi          = {10.1016/J.FSIDI.2022.301343},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SandvikFAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderDLDF22,
  author       = {Janine Schneider and
                  Linus D{\"{u}}sel and
                  Benedikt Lorch and
                  Julia Drafz and
                  Felix C. Freiling},
  title        = {Prudent design principles for digital tampering experiments},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301334},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301334},
  doi          = {10.1016/J.FSIDI.2022.301334},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderDLDF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SentanoeR22,
  author       = {Stewart Sentanoe and
                  Hans P. Reiser},
  title        = {\emph{SSHkex}: Leveraging virtual machine introspection for extracting
                  {SSH} keys and decrypting {SSH} network traffic},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301337},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301337},
  doi          = {10.1016/J.FSIDI.2022.301337},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SentanoeR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShinCS22,
  author       = {Jiho Shin and
                  Hyunpyo Choi and
                  Jung{-}Taek Seo},
  title        = {A study on command block collection and restoration techniques through
                  detection of project file manipulation on engineering workstation
                  of industrial control system},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301354},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301354},
  doi          = {10.1016/J.FSIDI.2022.301354},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShinCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShinKKK22,
  author       = {Sumin Shin and
                  Giyoon Kim and
                  Soram Kim and
                  Jongsung Kim},
  title        = {Forensic analysis of note and journal applications},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301355},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301355},
  doi          = {10.1016/J.FSIDI.2022.301355},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShinKKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sommer22,
  author       = {Peter Sommer},
  title        = {Evidence from hacking: {A} few tiresome problems},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301333},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301333},
  doi          = {10.1016/J.FSIDI.2022.301333},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sommer22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SonKOK22,
  author       = {Jihun Son and
                  Yeong Woong Kim and
                  Dong Bin Oh and
                  Kyounggon Kim},
  title        = {Forensic analysis of instant messengers: Decrypt Signal, Wickr, and
                  Threema},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301347},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301347},
  doi          = {10.1016/J.FSIDI.2022.301347},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SonKOK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StoykovaAFA22,
  author       = {Radina Stoykova and
                  Stig Andersen and
                  Katrin Franke and
                  Stefan Axelsson},
  title        = {Reliability assessment of digital forensic investigations in the Norwegian
                  police},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301351},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301351},
  doi          = {10.1016/J.FSIDI.2022.301351},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/StoykovaAFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sunde22,
  author       = {Nina Sunde},
  title        = {Strategies for safeguarding examiner objectivity and evidence reliability
                  during digital forensic investigations},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301317},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301317},
  doi          = {10.1016/J.FSIDI.2021.301317},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sunde22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThierryM22,
  author       = {Aur{\'{e}}lien Thierry and
                  Tilo M{\"{u}}ller},
  title        = {A systematic approach to understanding {MACB} timestamps on Unix-like
                  systems},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301338},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301338},
  doi          = {10.1016/J.FSIDI.2022.301338},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ThierryM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThomasEB22,
  author       = {Tyler Thomas and
                  Tiffanie Edwards and
                  Ibrahim M. Baggili},
  title        = {BlockQuery: Toward forensically sound cryptocurrency investigation},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301340},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301340},
  doi          = {10.1016/J.FSIDI.2022.301340},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ThomasEB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZubairAYA22,
  author       = {Nauman Zubair and
                  Adeen Ayub and
                  Hyunguk Yoo and
                  Irfan Ahmed},
  title        = {{PEM:} Remote forensic acquisition of {PLC} memory in industrial control
                  systems},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301336},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301336},
  doi          = {10.1016/J.FSIDI.2022.301336},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZubairAYA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}