-
1
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Martini B, Choo K-KR. An integrated conceptual digital forensic framework for cloud computing. Digit Investig. 2012;9:71–80.10.1016/j.diin.2012.07.001
-
(2012)
Digit Investig
, vol.9
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
2
-
-
84902429611
-
-
Boston: Syngress, an Imprint of Elsevier
-
Quick, D, Martini, B, Choo, R. Cloud storage forensics. Boston:Syngress, an Imprint of Elsevier; 2014.
-
(2014)
Cloud storage forensics
-
-
Quick, D.1
Martini, B.2
Choo, R.3
-
3
-
-
85013182797
-
Trends in android malware detection
-
Shaerpour, K, Dehghantanha, A, Mahmod, R. Trends in android malware detection. J Digit Forensics Secur Law. 2013;8:21–40.
-
(2013)
J Digit Forensics Secur Law
, vol.8
, pp. 21-40
-
-
Shaerpour, K.1
Dehghantanha, A.2
Mahmod, R.3
-
4
-
-
85013170297
-
Towards a unified forensic investigation framework of smartphones
-
Mohtasebi, SH, Dehghantanha A, Towards a unified forensic investigation framework of smartphones. Int J Comput Theory Eng. 2013;5:351–355. 10.7763/IJCTE.2013.V5.708
-
(2013)
Int J Comput Theory Eng
, vol.5
, pp. 351-355
-
-
Mohtasebi, S.H.1
Dehghantanha, A.2
-
6
-
-
84866690602
-
Forensics investigation challenges in cloud computing environments
-
Kuala Lumpur, Malaysia: IEEE
-
Damshenas, M, Dehghantanha, A, Mahmoud, R, Bin Shamsuddin, S, Forensics investigation challenges in cloud computing environments. In Proceedings title:2012 international conference on cyber security, cyber warfare and digital forensic (CyberSec). Kuala Lumpur, Malaysia:IEEE; 2012, 190–194. doi:10.1109/CyberSec.2012.6246092
-
(2012)
Proceedings title: 2012 international conference on cyber security, cyber warfare and digital forensic (CyberSec)
, pp. 190-194
-
-
Damshenas, M.1
Dehghantanha, A.2
Mahmoud, R.3
Bin Shamsuddin, S.4
-
7
-
-
85013162609
-
Cloud computing and conflicts with digital forensic investigation
-
Damshenas, M, Dehghantanha, A, Mahmoud, R, Shamsuddin, S. Cloud computing and conflicts with digital forensic investigation. Int J Digit Content Technol its Appl. 2013;7:543–554.
-
(2013)
Int J Digit Content Technol its Appl
, vol.7
, pp. 543-554
-
-
Damshenas, M.1
Dehghantanha, A.2
Mahmoud, R.3
Shamsuddin, S.4
-
8
-
-
84910046949
-
Privacy-respecting digital investigation
-
Toronto: IEEE
-
Dehghantanha, A, Franke, K, Privacy-respecting digital investigation. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust. Toronto:IEEE; 2014, 129–138. doi:10.1109/PST.2014.6890932
-
(2014)
2014 Twelfth Annual International Conference on Privacy, Security and Trust
, pp. 129-138
-
-
Dehghantanha, A.1
Franke, K.2
-
13
-
-
84856645731
-
Investigation of bypassing malware defences and malware detections
-
Melaka, Malaysia: IEEE
-
Daryabar, F, Dehghantanha, A, Udzir, NI, Investigation of bypassing malware defences and malware detections. In 2011 7th International Conference on Information Assurance and Security (IAS). Melaka, Malaysia:IEEE; 2011, 173–178. doi:10.1109/ISIAS.2011.6122815
-
(2011)
2011 7th International Conference on Information Assurance and Security (IAS)
, pp. 173-178
-
-
Daryabar, F.1
Dehghantanha, A.2
Udzir, N.I.3
-
14
-
-
84963541600
-
Conceptual evidence collection and analysis methodology for android devices
-
Martini B, Do Q, Choo K-KR. Conceptual evidence collection and analysis methodology for android devices. Cloud Secur Ecosyst. 2015;285–307:doi:10.1016/B978-0-12-801595-7.00014-8.
-
(2015)
Cloud Secur Ecosyst
, pp. 285-307
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
15
-
-
85018181307
-
Chapter 15 - mobile cloud forensics: an analysis of seven popular android apps
-
Martini, B, Do, Q, Choo, K-KR, Chapter 15 - mobile cloud forensics:an analysis of seven popular android apps. Cloud Secur Ecosyst. 2015;309–345. doi:http://dx.doi.org/10.1016/B978-0-12-801595-7.00015-X10.1016/B978-0-12-801595-7.00015-X
-
(2015)
Cloud Secur Ecosyst
, pp. 309-345
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
16
-
-
84964403528
-
Investigating social networking applications on smartphones: detecting Facebook, twitter, LinkedIn, and Google+ artifacts on Android and iOS platforms
-
In press
-
Norouzi, F, Dehghantanha, A, Eterovic-Soric, B, Choo, K-KR. Investigating social networking applications on smartphones:detecting Facebook, twitter, LinkedIn, and Google+ artifacts on Android and iOS platforms. Aust J Forensics Sci. 2015. [In press].
-
(2015)
Aust J Forensics Sci
-
-
Norouzi, F.1
Dehghantanha, A.2
Eterovic-Soric, B.3
Choo, K.-K.R.4
-
18
-
-
84964322400
-
Chapter 19 - Ubuntu One investigation: Detecting evidences on client machines
-
Choo R.K.-K.R., (ed), Boston: Syngress
-
Shariati, M, Dehghantanha, A, Martini, B, Choo, K-KR. The cloud security ecosystem. Boston:Syngress; 2015. Chapter 19 - Ubuntu One investigation:Detecting evidences on client machines (ed. Choo RK-KR,); 429–446.
-
(2015)
The cloud security ecosystem
, pp. 429-446
-
-
Shariati, M.1
Dehghantanha, A.2
Martini, B.3
Choo, K.-K.R.4
-
20
-
-
85013162609
-
Cloud computing and conflicts with digital forensic investigation
-
Damshenas, M, Dehghantanha, A, Mahmoud, R, bin Shamsuddin, S. Cloud computing and conflicts with digital forensic investigation. Int J Digit Content Technol its Appl. 2013;7:543.
-
(2013)
Int J Digit Content Technol its Appl
, vol.7
, Issue.543
-
-
Damshenas, M.1
Dehghantanha, A.2
Mahmoud, R.3
bin Shamsuddin, S.4
-
21
-
-
84938850824
-
Investigating social networking applications on smartphones detecting Facebook, twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
-
Norouzizadeh Dezfouli F, Dehghantanha, A, Eterovic-Soric, B, Choo, K.-K. R. Investigating social networking applications on smartphones detecting Facebook, twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Aust J Forensic Sci. 2015;1–20:doi:10.1080/00450618.2015.1066854.
-
(2015)
Aust J Forensic Sci
, pp. 1-20
-
-
Norouzizadeh Dezfouli, F.1
Dehghantanha, A.2
Eterovic-Soric, B.3
Choo, K.K.R.4
-
22
-
-
84971485844
-
Advances of mobile forensic procedures in Firefox OS
-
Yusoff, M, Mahmod, R, Dehghantanha, A, Abdullah, M, Advances of mobile forensic procedures in Firefox OS. International Journal of Cyber-Security and Digital Forensics (IJCSDF). 2014. Available from:http://usir.salford.ac.uk/33890/1/advances-of-mobile-forensic-procedures-in-firefox-os.pdf
-
(2014)
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
-
-
Yusoff, M.1
Mahmod, R.2
Dehghantanha, A.3
Abdullah, M.4
-
24
-
-
84866678647
-
Towards secure model for SCADA systems
-
Kuala Lumpur, Malaysia: IEEE
-
Daryabar, F, Dehghantanha, A, Udzir, NI, Bin Shamsuddin, S, Towards secure model for SCADA systems. In Proceedings Title:2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). Kuala Lumpur, Malaysia:IEEE; 2012, 60–64. doi:10.1109/CyberSec.2012.6246111
-
(2012)
Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
, pp. 60-64
-
-
Daryabar, F.1
Dehghantanha, A.2
Udzir, N.I.3
Bin Shamsuddin, S.4
-
26
-
-
84919570761
-
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
-
Imgraben J, Engelbrecht A, Choo K-KR. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav Inf Technol. 2014;33:1347–1360.10.1080/0144929X.2014.934286
-
(2014)
Behav Inf Technol
, vol.33
, pp. 1347-1360
-
-
Imgraben, J.1
Engelbrecht, A.2
Choo, K.-K.R.3
-
28
-
-
85013209890
-
Performance measurement for mobile forensic data acquisition in Firefox OS
-
Yusoff MN, Mahmod, R, Abullah MT, Dehghantanha A. Performance measurement for mobile forensic data acquisition in Firefox OS. Int J Cyber-Security Digit Forensics. 2014;3:130–140.
-
(2014)
Int J Cyber-Security Digit Forensics
, vol.3
, pp. 130-140
-
-
Yusoff, M.N.1
Mahmod, R.2
Abullah, M.T.3
Dehghantanha, A.4
-
31
-
-
84884589497
-
Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?
-
Quick D, Choo K-KR. Forensic collection of cloud storage data:does the act of collection result in changes to the data or its metadata? Digit. Investig. 2013;10:266–277.10.1016/j.diin.2013.07.001
-
(2013)
Digit. Investig
, vol.10
, pp. 266-277
-
-
Quick, D.1
Choo, K.-K.R.2
-
32
-
-
84927595578
-
A review on impacts of cloud computing on digital forensics
-
Daryabar, F, Ali Dehghantanha, NIUNF, Binti MSS, Bin S, A review on impacts of cloud computing on digital forensics. Int. J. Cyber-Security Digit. Forensics. 2013;2:77–94.
-
(2013)
Int. J. Cyber-Security Digit. Forensics
, vol.2
, pp. 77-94
-
-
Daryabar, F.1
Ali Dehghantanha, N.I.U.N.F.2
Binti, M.S.S.3
Bin, S.4
-
33
-
-
84870254680
-
Digital forensic investigation of cloud storage services
-
Chung H, Park J, Lee S, Kang C. Digital forensic investigation of cloud storage services. Digit Investig. 2012;9:81–95.10.1016/j.diin.2012.05.015
-
(2012)
Digit Investig
, vol.9
, pp. 81-95
-
-
Chung, H.1
Park, J.2
Lee, S.3
Kang, C.4
-
34
-
-
84872349700
-
A case study on digital forensics in the cloud
-
Louisville, KY, USA:
-
Marturana, F, Me, G, Tacconi, S, A case study on digital forensics in the cloud. In 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). 2012; Louisville, KY, USA. 111–116. doi:10.1109/CyberC.2012.26
-
(2012)
2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
, pp. 111-116
-
-
Marturana, F.1
Me, G.2
Tacconi, S.3
-
35
-
-
84864596423
-
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques
-
Dykstra J, Sherman AT. Acquiring forensic evidence from infrastructure-as-a-service cloud computing:exploring and evaluating tools, trust, and techniques. Digit Investig. 2012;9:S90–S98.10.1016/j.diin.2012.05.001
-
(2012)
Digit Investig
, vol.9
, pp. S90-S98
-
-
Dykstra, J.1
Sherman, A.T.2
-
36
-
-
84884590254
-
Amazon cloud drive forensic analysis
-
Hale JS. Amazon cloud drive forensic analysis. Digit Investig. 2013;10:259–265.10.1016/j.diin.2013.04.006
-
(2013)
Digit Investig
, vol.10
, pp. 259-265
-
-
Hale, J.S.1
-
37
-
-
84875493689
-
Using smartphones as a proxy for forensic evidence contained in cloud storage services
-
Wailea, HI, USA: IEEE
-
Grispos, G, Glisson, WB, Storer, T. Using smartphones as a proxy for forensic evidence contained in cloud storage services. In 2013 46th Hawaii International Conference on System Sciences. Wailea, HI, USA:IEEE; 2013, 4910–4919. doi:10.1109/HICSS.2013.592
-
(2013)
2013 46th Hawaii International Conference on System Sciences
, pp. 4910-4919
-
-
Grispos, G.1
Glisson, W.B.2
Storer, T.3
-
38
-
-
84889083567
-
Cloud storage forensics: Owncloud as a case study
-
Martini B, Choo K-KR. Cloud storage forensics:Owncloud as a case study. Digit Investig. 2013;10:287–299.10.1016/j.diin.2013.08.005
-
(2013)
Digit Investig
, vol.10
, pp. 287-299
-
-
Martini, B.1
Choo, K.-K.R.2
-
39
-
-
84920152770
-
Distributed filesystem forensics: xtreemfs as a case study
-
Martini B, Choo K-KR. Distributed filesystem forensics:xtreemfs as a case study. Digit Investig. 2014;11:295–313.10.1016/j.diin.2014.08.002
-
(2014)
Digit Investig
, vol.11
, pp. 295-313
-
-
Martini, B.1
Choo, K.-K.R.2
-
40
-
-
84896319180
-
Google drive: forensic analysis of data remnants
-
Quick D, Choo K-KR. Google drive:forensic analysis of data remnants. J Netw Comput Appl. 2014;40:179–193.10.1016/j.jnca.2013.09.016
-
(2014)
J Netw Comput Appl
, vol.40
, pp. 179-193
-
-
Quick, D.1
Choo, K.-K.R.2
-
41
-
-
84875147433
-
Digital droplets: Microsoft SkyDrive forensic data remnants
-
Quick D, Choo K-KR. Digital droplets:Microsoft SkyDrive forensic data remnants. Futur Gener Comput Syst. 2013;29:1378–1394.10.1016/j.future.2013.02.001
-
(2013)
Futur Gener Comput Syst
, vol.29
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
42
-
-
84877809583
-
Dropbox analysis: data remnants on user machines
-
Quick D, Choo K-KR. Dropbox analysis:data remnants on user machines. Digit Investig. 2013;10:3–18.10.1016/j.diin.2013.02.003
-
(2013)
Digit Investig
, vol.10
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
43
-
-
84904616098
-
A forensically robust method for acquisition of iCloud data
-
Oestreicher K. A forensically robust method for acquisition of iCloud data. Digit Investig. 2014;11:S106–S113.10.1016/j.diin.2014.05.006
-
(2014)
Digit Investig
, vol.11
, pp. S106-S113
-
-
Oestreicher, K.1
-
44
-
-
84922962817
-
Remote programmatic vcloud forensics: a six-step collection process and a proof of concept
-
Beijing, China: IEEE
-
Martini, B, Choo, K-KR. Remote programmatic vcloud forensics:a six-step collection process and a proof of concept. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. Beijing, China:IEEE; 2014, 935–942. doi:10.1109/TrustCom.2014.124
-
(2014)
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 935-942
-
-
Martini, B.1
Choo, K.-K.R.2
-
45
-
-
84898004587
-
Cloud data imager: a unified answer to remote acquisition of cloud storage areas
-
Federici C. Cloud data imager:a unified answer to remote acquisition of cloud storage areas. Digit Investig. 2014;11:30–42.10.1016/j.diin.2014.02.002
-
(2014)
Digit Investig
, vol.11
, pp. 30-42
-
-
Federici, C.1
-
46
-
-
85015922659
-
-
Elsevier
-
Ryan Ko, RC. The cloud security ecosystem. 1st ed. Elsevier; 2015. Available from:http://store.elsevier.com/The-Cloud-Security-Ecosystem/Ryan-Ko/isbn-9780128015957/
-
(2015)
The cloud security ecosystem
-
-
Ryan Ko, R.C.1
-
47
-
-
84925118436
-
Cloud forensic technical challenges and solutions: a snapshot
-
Martini B, Choo K-KR. Cloud forensic technical challenges and solutions:a snapshot. IEEE Cloud Comput. 2014;1:20–25.10.1109/MCC.2014.69
-
(2014)
IEEE Cloud Comput
, vol.1
, pp. 20-25
-
-
Martini, B.1
Choo, K.-K.R.2
-
48
-
-
84930511409
-
Cloud forensics: technical challenges, solutions and comparative analysis
-
Pichan A, Lazarescu M, Soh ST. Cloud forensics:technical challenges, solutions and comparative analysis. Digit Investig. 2015;13:38–57.10.1016/j.diin.2015.03.002
-
(2015)
Digit Investig
, vol.13
, pp. 38-57
-
-
Pichan, A.1
Lazarescu, M.2
Soh, S.T.3
-
49
-
-
85013192181
-
Recovering residual forensic data from smartphone interactions with cloud storage providers
-
Boston: Syngress
-
Grispos, G, Glisson, W, Storer, T. The cloud security ecosystem. Boston:Syngress; 2015. Recovering residual forensic data from smartphone interactions with cloud storage providers (eds. Ko R, Choo K-KR,); 347–382.
-
(2015)
The cloud security ecosystem
, pp. 347-382
-
-
Grispos, G.1
Glisson, W.2
Storer, T.3
Ko, R.4
Choo, K.-K.R.5
-
51
-
-
84964322400
-
Chapter 19 - Ubuntu One investigation: Detecting evidences on client machines
-
Choo R.K.-K.R., (ed), Boston: Syngress
-
Shariati, M, Dehghantanha, A, Martini, B, Choo, K-KR. The cloud security ecosystem. Boston:Syngress; 2015. Chapter 19 - Ubuntu One investigation:Detecting evidences on client machines (ed. Choo RK-KR,); 429–446.
-
(2015)
The cloud security ecosystem
, pp. 429-446
-
-
Shariati, M.1
Dehghantanha, A.2
Martini, B.3
Choo, K.-K.R.4
-
52
-
-
85015912440
-
-
EDRM File Format Data Set 1.0.1. [Cited 2015 Feb 1]. Available from:http://www.edrm.net/projects/dataset/data-set-files
-
-
-
|