-
1
-
-
84864628454
-
Forensic analysis of social networking applications on mobile devices
-
Al Mutawa N., Baggili I., Marrington A. Forensic analysis of social networking applications on mobile devices. Digit. Investig. 2012, 9:24-33.
-
(2012)
Digit. Investig.
, vol.9
, pp. 24-33
-
-
Al Mutawa, N.1
Baggili, I.2
Marrington, A.3
-
3
-
-
84874435442
-
AppGuard-enforcing user requirements on Android apps
-
Springer-Verlag, Berlin, Heidelberg
-
Backes M., Gerling S., Hammer C., Maffei M., von Styp-Rekowsky P. AppGuard-enforcing user requirements on Android apps. Tools and Algorithms for the Construction and Analysis of Systems 2013, 543-548. Springer-Verlag, Berlin, Heidelberg.
-
(2013)
Tools and Algorithms for the Construction and Analysis of Systems
, pp. 543-548
-
-
Backes, M.1
Gerling, S.2
Hammer, C.3
Maffei, M.4
von Styp-Rekowsky, P.5
-
5
-
-
84887671310
-
iPhone data protection in depth
-
July 18, 2014
-
Bédrune, J.-B., Sigwald, J., 2011. iPhone data protection in depth, July 18, 2014. http://esec-lab.sogeti.com/dotclear/public/publications/11-hitbamsterdam-iphonedataprotection.pdf.
-
(2011)
-
-
Bédrune, J.-B.1
Sigwald, J.2
-
6
-
-
84870254680
-
Digital forensic investigation of cloud storage services
-
Chung H., Park J., Lee S., Kang C. Digital forensic investigation of cloud storage services. Digit. Investig. 2012, 9(2):81-95.
-
(2012)
Digit. Investig.
, vol.9
, Issue.2
, pp. 81-95
-
-
Chung, H.1
Park, J.2
Lee, S.3
Kang, C.4
-
9
-
-
84867049200
-
Forensic analysis of Android phone using Ext4 file system journal log
-
Springer, Netherlands, J.J. Park, V.C.M. Leung, C.-L. Wang, T. Shon (Eds.) Future Information Technology, Application, and Service
-
Kim D., Park J., Lee K.-g., Lee S. Forensic analysis of Android phone using Ext4 file system journal log. Lecture Notes in Electrical Engineering 2012, Vol. 164:435-446. Springer, Netherlands. J.J. Park, V.C.M. Leung, C.-L. Wang, T. Shon (Eds.).
-
(2012)
Lecture Notes in Electrical Engineering
, vol.164
, pp. 435-446
-
-
Kim, D.1
Park, J.2
Lee, K.-G.3
Lee, S.4
-
10
-
-
80052355977
-
Android forensics: simplifying cell phone examinations
-
Lessard J., Kessler G. Android forensics: simplifying cell phone examinations. Digit. Device Forensics J. 2010, 4(1):1-12.
-
(2010)
Digit. Device Forensics J.
, vol.4
, Issue.1
, pp. 1-12
-
-
Lessard, J.1
Kessler, G.2
-
11
-
-
84924726971
-
Android Still Growing Market Share By Winning First Time Smartphone Users
-
July 18, 2014
-
Lomas, N., 2014. Android Still Growing Market Share By Winning First Time Smartphone Users, July 18, 2014. http://techcrunch.com/2014/05/06/android-still-growing-market-share-by-winning-first-time-smartphone-users/.
-
(2014)
-
-
Lomas, N.1
-
12
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Martini B., Choo K.-K.R. An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 2012, 9(2):71-80.
-
(2012)
Digit. Investig.
, vol.9
, Issue.2
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
13
-
-
85018181307
-
Mobile cloud forensics: An analysis of seven popular Android apps
-
Syngress Publishing, Waltham, MA, R. Ko, K.-K.R. Choo (Eds.)
-
Martini B., Do Q., Choo K.-K.R. Mobile cloud forensics: An analysis of seven popular Android apps. Cloud Security Ecosystem 2015, Syngress Publishing, Waltham, MA. R. Ko, K.-K.R. Choo (Eds.).
-
(2015)
Cloud Security Ecosystem
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
16
-
-
85054241111
-
Announcing the Android 1.0 SDK, release 1
-
July 18, 2014
-
Morrill, D., 2008. Announcing the Android 1.0 SDK, release 1, July 18, 2014. http://android-developers.blogspot.com.au/2008/09/announcing-android-10-sdk-release-1.html.
-
(2008)
-
-
Morrill, D.1
-
17
-
-
84881296322
-
A study of user data integrity during acquisition of Android devices
-
Son N., Lee Y., Kim D., James J.I., Lee S., Lee K. A study of user data integrity during acquisition of Android devices. Digit. Investig. 2013, 10:3-11.
-
(2013)
Digit. Investig.
, vol.10
, pp. 3-11
-
-
Son, N.1
Lee, Y.2
Kim, D.3
James, J.I.4
Lee, S.5
Lee, K.6
-
18
-
-
84872700510
-
Comparing sources of location data from Android smartphones
-
Springer, Berlin Heidelberg, G. Peterson, S. Shenoi (Eds.)
-
Spreitzenbarth M., Schmitt S., Freiling F. Comparing sources of location data from Android smartphones. Advances in Digital Forensics VIII. IFIP Advances in Information and Communication Technology 2012, 143-157. Springer, Berlin Heidelberg. G. Peterson, S. Shenoi (Eds.).
-
(2012)
Advances in Digital Forensics VIII. IFIP Advances in Information and Communication Technology
, pp. 143-157
-
-
Spreitzenbarth, M.1
Schmitt, S.2
Freiling, F.3
-
20
-
-
84857917909
-
Acquisition and analysis of volatile memory from Android devices
-
Sylve J., Case A., Marziale L., Richard G.G. Acquisition and analysis of volatile memory from Android devices. Digit. Investig. 2012, 8(3):175-184.
-
(2012)
Digit. Investig.
, vol.8
, Issue.3
, pp. 175-184
-
-
Sylve, J.1
Case, A.2
Marziale, L.3
Richard, G.G.4
-
22
-
-
79961091178
-
Toward a general collection methodology for Android devices
-
Vidas T., Zhang C., Christin N. Toward a general collection methodology for Android devices. Digit. Investig. 2011, 8:14-24.
-
(2011)
Digit. Investig.
, vol.8
, pp. 14-24
-
-
Vidas, T.1
Zhang, C.2
Christin, N.3
-
23
-
-
84888117876
-
Passe-partout: a general collection methodology for Android devices
-
Votipka D., Vidas T., Christin N. Passe-partout: a general collection methodology for Android devices. IEEE Trans. Inf. Forensics Secur. 2013, 8(12):1937-1946.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.12
, pp. 1937-1946
-
-
Votipka, D.1
Vidas, T.2
Christin, N.3
-
25
-
-
85054251076
-
[MOD][HOW-TO]To disable signature checks
-
May 29, 2014
-
XDA Developers, 2012. [MOD][HOW-TO]To disable signature checks, May 29, 2014. http://forum.xda-developers.com/showthread.php?t=1698352.
-
(2012)
-
-
-
27
-
-
84893446426
-
-
Zheng M., Sun M., Lui J. Droid analytics: a signature based analytic system to collect, extract, analyze and associate Android malware 2013, 163-171.
-
(2013)
Droid analytics: a signature based analytic system to collect, extract, analyze and associate Android malware
, pp. 163-171
-
-
Zheng, M.1
Sun, M.2
Lui, J.3
|