-
1
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
B.Martini, K.-K.R.Choo. An integrated conceptual digital forensic framework for cloud computing. Digit Invest. 2012;9(2):71–80.10.1016/j.diin.2012.07.001
-
(2012)
Digit Invest
, vol.9
, Issue.2
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
2
-
-
84902429611
-
-
Rockland, MA: Syngress, an Imprint of Elsevier
-
D.Quick, B.Martini, R.Choo. Cloud storage forensics. Rockland, MA:Syngress, an Imprint of Elsevier; 2014. p. 208.
-
(2014)
Cloud storage forensics
, pp. 208
-
-
Quick, D.1
Martini, B.2
Choo, R.3
-
3
-
-
84884590254
-
Amazon cloud drive forensic analysis
-
J.S.Hale. Amazon cloud drive forensic analysis. Digit Invest. 2013;10(3):259–265.10.1016/j.diin.2013.04.006
-
(2013)
Digit Invest
, vol.10
, Issue.3
, pp. 259-265
-
-
Hale, J.S.1
-
4
-
-
84949175431
-
Secure mobile cloud computing and security issues
-
Springer
-
Q.Gu, M.Guirguis. High performance cloud auditing and applications. Springer; 2014. Secure mobile cloud computing and security issues; 65–90. Available from:http://link.springer.com/chapter/10.1007/978-1-4614-3296-8_3
-
(2014)
High performance cloud auditing and applications
, pp. 65-90
-
-
Gu, Q.1
Guirguis, M.2
-
5
-
-
84938850824
-
Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
-
F.Norouzizadeh Dezfouli, A.Dehghantanha, B.Eterovic-Soric, K.K.R.Choo. Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Aust. J. Forensic Sci. 2015:1–20. Available from:doi:10.1080/00450618.2015.1066854
-
(2015)
Aust. J. Forensic Sci
, pp. 1-20
-
-
Norouzizadeh Dezfouli, F.1
Dehghantanha, A.2
Eterovic-Soric, B.3
Choo, K.K.R.4
-
6
-
-
84963541600
-
Chapter 14 - Conceptual evidence collection and analysis methodology for Android devices
-
Choo R.K.-K.R., (ed), Boston, MA: Syngress
-
B.Martini, Q.Do, K.-K.R.Choo. The cloud security ecosystem. Boston, MA:Syngress; 2015. R.K.-K.R.Choo, editor. Chapter 14 - Conceptual evidence collection and analysis methodology for Android devices; p. 285–307. Available from:http://www.sciencedirect.com/science/article/pii/B978012801595700014810.1016/B978-0-12-801595-7.00014-8
-
(2015)
The cloud security ecosystem
, pp. 285-307
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
7
-
-
85018181307
-
Chapter 15 - Mobile cloud forensics: an analysis of seven popular Android apps
-
Choo R.K.-K.R., (ed), Boston, MA: Syngress
-
B.Martini, Q.Do, K.-K.R.Choo. The cloud security ecosystem. Boston, MA:Syngress; 2015. R.K.-K.R.Choo, editor. Chapter 15 - Mobile cloud forensics:an analysis of seven popular Android apps; p. 309–345. Available from:http://www.sciencedirect.com/science/article/pii/B978012801595700015X10.1016/B978-0-12-801595-7.00015-X
-
(2015)
The cloud security ecosystem
, pp. 309-345
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
9
-
-
84964322400
-
Chapter 19 - Ubuntu one investigation: detecting evidences on client machines
-
Choo R.K.-K.R., (ed), Boston, MA: Syngress
-
M.Shariati, A.Dehghantanha, B.Martini, K.-K.R.Choo. The cloud security ecosystem. Boston, MA:Syngress; 2015. R.K.-K.R.Choo, editor. Chapter 19 - Ubuntu one investigation:detecting evidences on client machines; p. 429–446. Available from:http://www.sciencedirect.com/science/article/pii/B978012801595700019710.1016/B978-0-12-801595-7.00019-7
-
(2015)
The cloud security ecosystem
, pp. 429-446
-
-
Shariati, M.1
Dehghantanha, A.2
Martini, B.3
Choo, K.-K.R.4
-
11
-
-
84870254680
-
Digital forensic investigation of cloud storage services
-
H.Chung, J.Park, S.Lee, C.Kang. Digital forensic investigation of cloud storage services. Digit Invest. 2012;9(2):81–95.10.1016/j.diin.2012.05.015
-
(2012)
Digit Invest
, vol.9
, Issue.2
, pp. 81-95
-
-
Chung, H.1
Park, J.2
Lee, S.3
Kang, C.4
-
12
-
-
84872349700
-
-
2012 International conference on cyber-enabled distributed computing and knowledge discovery (CyberC)
-
F.Marturana, G.Me, S.Tacconi. A case study on digital forensics in the cloud. 2012 International conference on cyber-enabled distributed computing and knowledge discovery (CyberC). 2012:111–116.10.1109/CyberC.2012.26
-
(2012)
A case study on digital forensics in the cloud
, pp. 111-116
-
-
Marturana, F.1
Me, G.2
Tacconi, S.3
-
13
-
-
84864596423
-
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques
-
J.Dykstra, A.T.Sherman. Acquiring forensic evidence from infrastructure-as-a-service cloud computing:exploring and evaluating tools, trust, and techniques. Digit Invest. 2012;9(SUPPL.):S90–S98.10.1016/j.diin.2012.05.001
-
(2012)
Digit Invest
, vol.9
, pp. S90-S98
-
-
Dykstra, J.1
Sherman, A.T.2
-
14
-
-
84875493689
-
Using smartphones as a proxy for forensic evidence contained in cloud storage services
-
G.Grispos, W.B.Glisson, T.Storer. Using smartphones as a proxy for forensic evidence contained in cloud storage services. IEEE. 2013:4910–4919. Available from:http://ezproxy.upm.edu.my:2078/xpl/articleDetails.jsp?tp=&arnumber=6480436&matchBoolean%3Dtrue%26searchField%3DSearch_All%26queryText%3D%28%28p_Abstract%3Aforensics%29+AND+p_Abstract%3Aios%29
-
(2013)
IEEE
, pp. 4910-4919
-
-
Grispos, G.1
Glisson, W.B.2
Storer, T.3
-
15
-
-
84889083567
-
Cloud storage forensics: owncloud as a case study
-
B.Martini, K.-K.R.Choo. Cloud storage forensics:owncloud as a case study. Digit Invest. 2013;10(4):287–299.10.1016/j.diin.2013.08.005
-
(2013)
Digit Invest
, vol.10
, Issue.4
, pp. 287-299
-
-
Martini, B.1
Choo, K.-K.R.2
-
19
-
-
84898004587
-
Cloud data imager: a unified answer to remote acquisition of cloud storage areas
-
C.Federici. Cloud data imager:a unified answer to remote acquisition of cloud storage areas. Digit Invest. 2014;11(1):30–42.10.1016/j.diin.2014.02.002
-
(2014)
Digit Invest
, vol.11
, Issue.1
, pp. 30-42
-
-
Federici, C.1
-
20
-
-
84896319180
-
Google drive: forensic analysis of data remnants
-
D.Quick, K.-K.R.Choo. Google drive:forensic analysis of data remnants. J Netw Comput Appl. 2014;40:179–193.10.1016/j.jnca.2013.09.016
-
(2014)
J Netw Comput Appl
, vol.40
, pp. 179-193
-
-
Quick, D.1
Choo, K.-K.R.2
-
21
-
-
84875147433
-
Digital droplets: Microsoft SkyDrive forensic data remnants
-
(Including Special sections: High Performance Computing in the Cloud & Resource Discovery Mechanisms for P2P Systems)
-
D.Quick, K.-K.R.Choo. Digital droplets:Microsoft SkyDrive forensic data remnants. Future Gener Comput Syst. 2013;29(6):1378–1394. (Including Special sections:High Performance Computing in the Cloud & Resource Discovery Mechanisms for P2P Systems).10.1016/j.future.2013.02.001
-
(2013)
Future Gener Comput Syst
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
22
-
-
84877809583
-
Dropbox analysis: data remnants on user machines
-
D.Quick, K.-K.R.Choo. Dropbox analysis:data remnants on user machines. Digit Invest. 2013;10(1):3–18.10.1016/j.diin.2013.02.003
-
(2013)
Digit Invest
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
23
-
-
84963541600
-
Conceptual evidence collection and analysis methodology for Android devices
-
B.Martini, Q.Do, K.K.R.Choo. Conceptual evidence collection and analysis methodology for Android devices. Cloud Secur. Ecosyst. 2015:285–307. doi:10.1016/B978-0-12-801595-7.00014-8
-
(2015)
Cloud Secur. Ecosyst
, pp. 285-307
-
-
Martini, B.1
Do, Q.2
Choo, K.K.R.3
-
24
-
-
77957695303
-
Organised crime groups in cyberspace: a typology
-
K.-K.R.Choo. Organised crime groups in cyberspace:a typology. Trends in Organized Crime. 2008;11(3):270–295.10.1007/s12117-008-9038-9
-
(2008)
Trends in Organized Crime
, vol.11
, Issue.3
, pp. 270-295
-
-
Choo, K.-K.R.1
-
25
-
-
77957695303
-
Criminal exploitation of online systems by organised crime groups
-
K.-K.R.Choo, R.G.Smith. Criminal exploitation of online systems by organised crime groups. Trends in Organized Crime. 2008;11(3):270–295.10.1007/s12117-008-9038-9
-
(2008)
Trends in Organized Crime
, vol.11
, Issue.3
, pp. 270-295
-
-
Choo, K.-K.R.1
Smith, R.G.2
-
26
-
-
84989325260
-
-
EDRM File Format Data Set 1.0.1. [cited 2015 Jan 17]. Available from:http://www.edrm.net/resources/data-sets/edrm-file-format-data-set
-
-
-
-
27
-
-
85013170297
-
Towards a unified forensic investigation framework of smartphones
-
S.H.Mohtasebi, A.Dehghantanha. Towards a unified forensic investigation framework of smartphones. Int J Comput Theory Eng. 2013;5(2):351.10.7763/IJCTE.2013.V5.708
-
(2013)
Int J Comput Theory Eng
, vol.5
, Issue.2
, pp. 351
-
-
Mohtasebi, S.H.1
Dehghantanha, A.2
-
28
-
-
84856645731
-
-
Information Assurance and Security (IAS), 2011 7th International Conference on. IEEE
-
F.Daryabar, A.Dehghantanha, N.I.Udzir. Investigation of bypassing malware defences and malware detections. Information Assurance and Security (IAS), 2011 7th International Conference on. IEEE; 2011. p. 173–178. Available from:http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=612281510.1109/ISIAS.2011.6122815
-
(2011)
Investigation of bypassing malware defences and malware detections
, pp. 173-178
-
-
Daryabar, F.1
Dehghantanha, A.2
Udzir, N.I.3
-
30
-
-
85013162609
-
Cloud computing and conflicts with digital forensic investigation
-
M.Damshenas, A.Dehghantanha, R.Mahmoud, S.bin Shamsuddin. Cloud computing and conflicts with digital forensic investigation. Int J Digit Content Technol Appl. 2013;7(9):543.
-
(2013)
Int J Digit Content Technol Appl
, vol.7
, Issue.9
, pp. 543
-
-
Damshenas, M.1
Dehghantanha, A.2
Mahmoud, R.3
bin Shamsuddin, S.4
-
31
-
-
84978399590
-
M0Droid: an Android behavioral-based malware detection model
-
M.Damshenas, A.Dehghantanha, K.-K.R.Choo, R.Mahmud. M0Droid:an Android behavioral-based malware detection model. J Inf Privacy Secur. 2015;11(3):141–157.10.1080/15536548.2015.1073510
-
(2015)
J Inf Privacy Secur
, vol.11
, Issue.3
, pp. 141-157
-
-
Damshenas, M.1
Dehghantanha, A.2
Choo, K.-K.R.3
Mahmud, R.4
-
32
-
-
85013185678
-
A survey on privacy impacts of digital investigation
-
F.Daryabar, A.Dehghantanha, N.I.Udzir, N.F.Sani, S.Shamsuddin. A survey on privacy impacts of digital investigation. JNIT. 2013;4(8):57.
-
(2013)
JNIT
, vol.4
, Issue.8
, pp. 57
-
-
Daryabar, F.1
Dehghantanha, A.2
Udzir, N.I.3
Sani, N.F.4
Shamsuddin, S.5
-
33
-
-
84910046949
-
-
Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on. IEEE
-
A.Dehghantanha, K.Franke. Privacy-respecting digital investigation. Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on. IEEE; 2014. p. 129–138. Available from:http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=689093210.1109/PST.2014.6890932
-
(2014)
Privacy-respecting digital investigation
, pp. 129-138
-
-
Dehghantanha, A.1
Franke, K.2
|