Smartphone data evaluation model: Identifying authentic smartphone data
Ever improving smartphone technology, along with the widespread use of the devices to
accomplish daily tasks, leads to the collection of rich sources of smartphone data …
accomplish daily tasks, leads to the collection of rich sources of smartphone data …
Reference architecture for android applications to support the detection of manipulated evidence
H Pieterse, MS Olivier… - SAIEE Africa Research …, 2016 - ieeexplore.ieee.org
Traces found on Android smartphones form a significant part of digital investigations. A key
component of these traces is the date and time, often formed as timestamps. These …
component of these traces is the date and time, often formed as timestamps. These …
Detecting manipulated smartphone data on Android and iOS Devices
Ever improving technology allows smartphones to become an integral part of people's lives.
The reliance on and ubiquitous use of smartphones render these devices rich sources of …
The reliance on and ubiquitous use of smartphones render these devices rich sources of …
Evaluation framework for detecting manipulated smartphone data
H Pieterse, M Olivier… - SAIEE Africa Research …, 2019 - ieeexplore.ieee.org
Ever improving technology allows smartphones to become an integral part of people's lives.
The reliance on and ubiquitous use of smartphones render these devices rich sources of …
The reliance on and ubiquitous use of smartphones render these devices rich sources of …
Playing hide-and-seek: Detecting the manipulation of Android timestamps
H Pieterse, MS Olivier… - 2015 Information Security …, 2015 - ieeexplore.ieee.org
Mobile technology continues to evolve in the 21st century, providing users with improved
capabilities and advance functionality. One of the leaders of this evolution is Android, a …
capabilities and advance functionality. One of the leaders of this evolution is Android, a …
Evaluating the authenticity of smartphone evidence
The widespread use and rich functionality of smartphones have made them valuable
sources of digital evidence. Malicious individuals are becoming aware of the importance of …
sources of digital evidence. Malicious individuals are becoming aware of the importance of …
Forensics enabled secure mobile computing system for enterprises
The enterprises are facing constant security threats with the emergence of new mobile
computing devices like smartphones, smartwatches, and wearables. The existing digital …
computing devices like smartphones, smartwatches, and wearables. The existing digital …