-
1
-
-
84905817532
-
Interconnected cloud computing environments: challenges, taxonomy, and survey
-
Toosi AN, Calheiros RN, Buyya R. Interconnected cloud computing environments: challenges, taxonomy, and survey. ACM Computing Surveys 2014; 47(1):7:1–7:47.
-
(2014)
ACM Computing Surveys
, vol.47
, Issue.1
, pp. 7:1-7:47
-
-
Toosi, A.N.1
Calheiros, R.N.2
Buyya, R.3
-
3
-
-
84963728330
-
Forensic-by-design framework for cyber-physical cloud systems
-
Ab Rahman NH, Glisson WB, Yang Y, Choo K-KR. Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Computing 2016; 3(1):50–59.
-
(2016)
IEEE Cloud Computing
, vol.3
, Issue.1
, pp. 50-59
-
-
Ab Rahman, N.H.1
Glisson, W.B.2
Yang, Y.3
Choo, K.-K.R.4
-
4
-
-
85020938375
-
-
[16 July 2015]
-
Windows Phone Architecture Overview. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Getting_Started/Windows_Phone_architecture_overview [16 July 2015].
-
Windows Phone Architecture Overview
-
-
-
5
-
-
85020913313
-
-
Slide presented at MobCom Workshop. MobCom Workshop;, Feb 6; Ledeberg, Belgium., [9 August 2014]
-
Hernie D. Windows Phone 8 security deep dive. Slide presented at: MobCom Workshop. MobCom Workshop; 2013 Feb 6; Ledeberg, Belgium. https://www.msec.be/mobcom/ws2013/presentations/david_hernie.pdf [9 August 2014].
-
(2013)
Windows Phone 8 security deep dive
-
-
Hernie, D.1
-
7
-
-
85020938362
-
-
[16 July 2015]
-
User Data Folder Layout. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/User_data_folder_layout [16 July 2015].
-
User Data Folder Layout
-
-
-
8
-
-
85020911371
-
-
[31 March 2014]
-
Windows Phone 8 Security Guide. http://www.microsoft.com/en-us/download/details.aspx?id=36173 [31 March 2014].
-
Windows Phone 8 Security Guide
-
-
-
11
-
-
85020880262
-
-
[16 July 2015]
-
Folder Layout. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Folder_layout [16 July 2015].
-
Folder Layout
-
-
-
12
-
-
85020855136
-
-
[16 July 2015]
-
Main OS Folder Layout. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Main_OS_folder_layout [16 July 2015].
-
Main OS Folder Layout
-
-
-
13
-
-
85020892821
-
-
[16 July 2015]
-
Removable User Data Folder Layout. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Removable_user_data_folder_layout [16 July 2015].
-
Removable User Data Folder Layout
-
-
-
14
-
-
85020896592
-
-
[16 July 2015]
-
Boot and UEFI. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Boot_and_UEFI [16 July 2015].
-
Boot and UEFI
-
-
-
15
-
-
85020879949
-
-
[16 July 2015]
-
Secure Boot and Device Encryption Overview. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Secure_boot_and_device_encryption_overview [16 July 2015].
-
Secure Boot and Device Encryption Overview
-
-
-
16
-
-
85020911182
-
-
[9 August 2014]
-
Windows Phone 8.1 Security Overview. http://www.microsoft.com/en-us/download/details.aspx?id=42509 [9 August 2014].
-
Windows Phone 8.1 Security Overview
-
-
-
18
-
-
84861379813
-
Digital evidence from mobile telephone applications
-
Taylor M, Hughes G, Haggerty J, Gresty D, Almond P. Digital evidence from mobile telephone applications. Computer Law & Security Review 2012; 28(3):335–339. doi:10.1016/j.clsr.2012.03.006.
-
(2012)
Computer Law & Security Review
, vol.28
, Issue.3
, pp. 335-339
-
-
Taylor, M.1
Hughes, G.2
Haggerty, J.3
Gresty, D.4
Almond, P.5
-
19
-
-
84986189172
-
Chapter 20—Digital evidence on mobile devices
-
In, USA, Elsevier
-
Casey E, Turnbull B. Chapter 20—Digital evidence on mobile devices. In Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. USA: Elsevier, 2011; 2–44.
-
(2011)
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet
, pp. 2-44
-
-
Casey, E.1
Turnbull, B.2
-
20
-
-
77952241813
-
Windows mobile advanced forensics
-
Klaver C. Windows mobile advanced forensics. Digital Investigation 2010; 6(3):147–167. doi:10.1016/j.diin.2010.02.001.
-
(2010)
Digital Investigation
, vol.6
, Issue.3
, pp. 147-167
-
-
Klaver, C.1
-
21
-
-
33644922345
-
Forensic imaging of embedded systems using JTAG (boundary-scan)
-
Breeuwsma I. Forensic imaging of embedded systems using JTAG (boundary-scan). Digital Investigation 2006; 3(1):32–42. doi:10.1016/j.diin.2006.01.003.
-
(2006)
Digital Investigation
, vol.3
, Issue.1
, pp. 32-42
-
-
Breeuwsma, I.1
-
23
-
-
78449255925
-
Windows mobile advanced forensics: an alternative to existing tools
-
Rehault F. Windows mobile advanced forensics: an alternative to existing tools. Digital Investigation 2010; 7(1):38–47. doi:10.1016/j.diin.2010.08.003.
-
(2010)
Digital Investigation
, vol.7
, Issue.1
, pp. 38-47
-
-
Rehault, F.1
-
24
-
-
77952104315
-
Introduction to windows mobile forensics
-
Casey E, Bann M, Doyle J. Introduction to windows mobile forensics. Digital Investigation 2010; 6(3):136–146. doi:10.1016/j.diin.2010.01.004.
-
(2010)
Digital Investigation
, vol.6
, Issue.3
, pp. 136-146
-
-
Casey, E.1
Bann, M.2
Doyle, J.3
-
25
-
-
80051672577
-
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
-
Grispos G, Storer T, Glisson WB. A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation 2011; 8(1):23–36. doi:10.1016/j.diin.2011.05.016.
-
(2011)
Digital Investigation
, vol.8
, Issue.1
, pp. 23-36
-
-
Grispos, G.1
Storer, T.2
Glisson, W.B.3
-
27
-
-
85020899352
-
Windows phone 7/8 (WP7)—digital forensic investigation procedure and evidence recovery techniques
-
October
-
Ehud DR. Windows phone 7/8 (WP7)—digital forensic investigation procedure and evidence recovery techniques. eForensics Magazine, October 2013; 2(23):36–40.
-
(2013)
eForensics Magazine
, vol.2
, Issue.23
, pp. 36-40
-
-
Ehud, D.R.1
-
30
-
-
84874723547
-
Windows mobile live SD forensics
-
Canlar ES, Conti M, Crispo B, Di Pietro R. Windows mobile live SD forensics. Journal of Network and Computer Applications 2013; 36(2):677–648.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.2
, pp. 648-677
-
-
Canlar, E.S.1
Conti, M.2
Crispo, B.3
Di Pietro, R.4
-
32
-
-
84963541600
-
Chapter 14—Conceptual evidence collection and analysis methodology for Android devices
-
In, Waltham, MA, Syngress
-
Martini B, Do Q, Choo K-KR. Chapter 14—Conceptual evidence collection and analysis methodology for Android devices. In Cloud Security Ecosystem. Waltham, MA: Syngress, 2015; 285–307.
-
(2015)
Cloud Security Ecosystem
, pp. 285-307
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
33
-
-
84934762632
-
-
NIST Special Publication, 800-101., [18 August 2015]
-
Guidelines on Mobile Device Forensics. NIST Special Publication 2014:800-101. nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf [18 August 2015].
-
(2014)
Guidelines on Mobile Device Forensics
-
-
-
35
-
-
84970003207
-
Trustworthy processing of healthcare Big data in hybrid clouds
-
Nepal S, Ranjan R, Choo K-KR. Trustworthy processing of healthcare Big data in hybrid clouds. IEEE Cloud Computing 2015; 2(2):78–84. doi:10.1109/MCC.2015.36.
-
(2015)
IEEE Cloud Computing
, vol.2
, Issue.2
, pp. 78-84
-
-
Nepal, S.1
Ranjan, R.2
Choo, K.-K.R.3
-
36
-
-
77957695303
-
Organised crime groups in cyberspace: a typology
-
Choo K-KR. Organised crime groups in cyberspace: a typology. Trends in Organized Crime 2008; 11(3):270–295. doi:10.1007/s12117-008-9038-9.
-
(2008)
Trends in Organized Crime
, vol.11
, Issue.3
, pp. 270-295
-
-
Choo, K.-K.R.1
-
37
-
-
80955142795
-
The cyber threat landscape: challenges and future research directions
-
Choo K-KR. The cyber threat landscape: challenges and future research directions. Computers & Security 2011; 30(8):719–731. doi:10.1016/j.cose.2011.08.004.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
38
-
-
84947587045
-
A forensically sound adversary model for mobile devices
-
Do Q, Martini B, Choo K-KR. A forensically sound adversary model for mobile devices. PLoS ONE 2015; 10(9):e0138449. doi:10.1371/journal.pone.0138449.
-
(2015)
PLoS ONE
, vol.10
, Issue.9
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
39
-
-
84978640065
-
Windows instant messaging app forensics: Facebook and Skype as case studies
-
Yang TY, Dehghantanha A, Choo K-K R, Muda Z. Windows instant messaging app forensics: Facebook and Skype as case studies. PLoS ONE 2016; 11(3):e0150300. doi:10.1371/journal.pone.0150300.
-
(2016)
PLoS ONE
, vol.11
, Issue.3
-
-
Yang, T.Y.1
Dehghantanha, A.2
Choo, R.3
Muda, Z.4
-
40
-
-
84958034911
-
Android mobile VoIP apps: a survey and examination of their security and privacy
-
Azfar A, Choo K-K R, Liu L. Android mobile VoIP apps: a survey and examination of their security and privacy. Electronic Commerce Research 2016; 16(1):73–111. doi:10.1007/s10660-015-9208-1.
-
(2016)
Electronic Commerce Research
, vol.16
, Issue.1
, pp. 73-111
-
-
Azfar, A.1
Choo, R.2
Liu, L.3
|