-
3
-
-
79952172417
-
-
Apple inc.: Apple - MobileMe, http://www.apple.com/mobileme/
-
Apple - MobileMe
-
-
-
4
-
-
79952268904
-
-
ScientificWorking Groups on Digital Evidence and Imaging Technology (retrieved on July 2)
-
ScientificWorking Groups on Digital Evidence and Imaging Technology: Combined Master Glossary of Terms (retrieved on July 2, 2010)
-
Combined Master Glossary of Terms
, pp. 2010
-
-
-
6
-
-
48749111433
-
-
NIST Special Publication 800-101 (retrieved on July 2, 2010)
-
Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics. NIST Special Publication 800-101 (2007), http://csrc.nist.gov/publications/nistpubs/800-101/ SP800-101.pdf (retrieved on July 2, 2010)
-
(2007)
Guidelines on Cell Phone Forensics
-
-
Jansen, W.1
Ayers, R.2
-
7
-
-
65549113068
-
Data acquisition from cell phone using logical approach
-
Kim, K., Hong, D., Chung, K., Ryou, J.: Data Acquisition from Cell Phone using Logical Approach. Proceedings of the World Academy of Science, Engineering and Technology 26 (2007)
-
(2007)
Proceedings of the World Academy of Science, Engineering and Technology
, vol.26
-
-
Kim, K.1
Hong, D.2
Chung, K.3
Ryou, J.4
-
8
-
-
79952255623
-
-
retrieved on July 2, 2010
-
Rizwan, A., Dharaskar, R.V.: Mobile Forensics: an Overview, Tools, Future trendsand Challenges from Law Enforcement perspective, http://www.iceg.net/ 2008/books/2/34-312-323.pdf (retrieved on July 2, 2010)
-
Mobile Forensics: An Overview, Tools, Future Trendsand Challenges from Law Enforcement Perspective
-
-
Rizwan, A.1
Dharaskar, R.V.2
-
9
-
-
33745203225
-
Risks of live digital forensic analysis
-
Carrier, B.D.: Risks of live digital forensic analysis. Commun. ACM. 49, 56-61 (2006)
-
(2006)
Commun ACM
, vol.49
, pp. 56-61
-
-
Carrier, B.D.1
-
10
-
-
79952274221
-
-
retrieved on July 2, 2010
-
Open Handset Alliance: Android, http://www.openhandsetalliance.com/ android overview.html (retrieved on July 2, 2010)
-
Android
-
-
-
11
-
-
84872510669
-
-
retrieved on July 2, 2010
-
Android Community: What is Android?, http://developer.android.com/guide/ basics/what-is-android.html (retrieved on July 2, 2010)
-
What Is Android?
-
-
-
13
-
-
79251554765
-
-
June 21, published June 21, 2010
-
Vennon, T., Stroop, D.: Android Malware, A Study of Known and Potential Malware Threats, June 21 (2010), http://threatcenter.smobilesystems.com/wp- content/uploads/2010/06/ Android-Market-Threat-Analysis-6-22-10-v1.pdf (published June 21, 2010)
-
(2010)
Android Malware, A Study of Known and Potential Malware Threats
-
-
Vennon, T.1
Stroop, D.2
-
15
-
-
76749092270
-
The WEKA data mining software: An update
-
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. Newsl. 11, 110-118 (2009)
-
(2009)
SIGKDD Explor. Newsl.
, vol.11
, pp. 110-118
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
17
-
-
84958759493
-
Enhancing the apriori algorithm for frequent set counting
-
Data Warehousing and Knowledge Discovery
-
Orlando, S., Palmerini, P., Perego, R.: Enhancing the apriori algorithm for frequent set counting. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2001. LNCS, vol. 2114, pp. 71-82. Springer, Heidelberg (2001) (Pubitemid 33332755)
-
(2001)
Lecture Notes in Computer Science
, Issue.2114
, pp. 71-82
-
-
Orlando, S.1
Palmerini, P.2
Perego, R.3
-
20
-
-
57349133760
-
A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction
-
Moser, R., Pedrycz, W., et al.: A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In: Proceedings of the 30th International Conference on Software Engineering, pp. 181-190 (2008)
-
(2008)
Proceedings of the 30th International Conference on Software Engineering
, pp. 181-190
-
-
Moser, R.1
Pedrycz, W.2
|