A comprehensive survey on artifact recovery from social media platforms: approaches and future research directions

K Gupta, D Oladimeji, C Varol, A Rasheed… - Information, 2023 - mdpi.com
Social media applications have been ubiquitous in modern society, and their usage has
grown exponentially over the years. With the widespread adoption of these platforms, social …

Encrypted network traffic analysis of secure instant messaging application: A case study of signal messenger app

A Afzal, M Hussain, S Saleem, MK Shahzad, ATS Ho… - Applied Sciences, 2021 - mdpi.com
Instant messaging applications (apps) have played a vital role in online interaction,
especially under COVID-19 lockdown protocols. Apps with security provisions are able to …

What's on the horizon? An in-depth forensic analysis of android and iOS applications

FE Salamh, MM Mirza, S Hutchinson, YH Yoon… - IEEE …, 2021 - ieeexplore.ieee.org
In the digital forensics discipline, the lack of comprehensive research that addresses
investigative challenges and opportunities for newer mobile Operating Systems (OSs) such …

What's really 'Happning'? A forensic analysis of Android and iOS Happn dating apps

S Knox, S Moghadam, K Patrick, A Phan… - Computers & security, 2020 - Elsevier
With today's world revolving around online interaction, dating applications (apps) are a
prime example of how people are able to discover and converse with others that may share …

[HTML][HTML] A framework for digital forensics of encrypted real-time network traffic, instant messaging, and VoIP application case study

SAE Sarhan, HA Youness, AM Bahaa-Eldin - Ain Shams Engineering …, 2023 - Elsevier
Digital forensics is one of the prime professional fields for law enforcement forces. It is also a
major active research topic in the cybersecurity field. Internet traffic and content analysis are …

[PDF][PDF] Research on Note-Taking Apps with Security Features.

M Park, S Kim, J Kim - J. Wirel. Mob. Networks Ubiquitous Comput …, 2020 - isyou.info
Smartphone applications (apps) provide users with features to maximize the usefulness of
smartphones in various categories, such as finance, education, health, life, and …

[HTML][HTML] Forensic analysis of Matrix protocol and Riot. im application

GC Schipper, R Seelt, NA Le-Khac - Forensic Science International: Digital …, 2021 - Elsevier
Instant messaging (IM) has been around for decades now. Over the last few decades IM has
become more and more popular with varied protocols, both open source and closed source …

[HTML][HTML] Digital forensic analysis of the private mode of browsers on Android

X Fernández-Fuentes, TF Pena, JC Cabaleiro - Computers & Security, 2023 - Elsevier
The smartphone has become an essential electronic device in our daily lives. We carry our
most precious and important data on it, from family videos of the last few years to credit card …

Forensic analysis of open-source XMPP multi-client social networking apps on iOS devices

A Akinbi, E Ojie - Forensic Science International: Digital Investigation, 2021 - Elsevier
In this paper, we present forensic analysis of Monal and Siskin IM, two decentralized open-
source XMPP multi-client social networking apps on iOS devices that provide anonymity and …

Forensics analysis of private Web browsing using android memory acquisition

LB Younis, S Sweda, A Alzu'bi - 2021 12th International …, 2021 - ieeexplore.ieee.org
Modern smartphones can perform and display nearly as much of the internet as personal
computers, including web browsing and video streaming. Nowadays, all users rely on web …