Smartphone data evaluation model: Identifying authentic smartphone data

H Pieterse, M Olivier, R Van Heerden - Digital Investigation, 2018 - Elsevier
Ever improving smartphone technology, along with the widespread use of the devices to
accomplish daily tasks, leads to the collection of rich sources of smartphone data …

Reference architecture for android applications to support the detection of manipulated evidence

H Pieterse, MS Olivier… - SAIEE Africa Research …, 2016 - ieeexplore.ieee.org
Traces found on Android smartphones form a significant part of digital investigations. A key
component of these traces is the date and time, often formed as timestamps. These …

Detecting manipulated smartphone data on Android and iOS Devices

H Pieterse, M Olivier, R Van Heerden - … , South Africa, August 15–16, 2018 …, 2019 - Springer
Ever improving technology allows smartphones to become an integral part of people's lives.
The reliance on and ubiquitous use of smartphones render these devices rich sources of …

Evaluation framework for detecting manipulated smartphone data

H Pieterse, M Olivier… - SAIEE Africa Research …, 2019 - ieeexplore.ieee.org
Ever improving technology allows smartphones to become an integral part of people's lives.
The reliance on and ubiquitous use of smartphones render these devices rich sources of …

Playing hide-and-seek: Detecting the manipulation of Android timestamps

H Pieterse, MS Olivier… - 2015 Information Security …, 2015 - ieeexplore.ieee.org
Mobile technology continues to evolve in the 21st century, providing users with improved
capabilities and advance functionality. One of the leaders of this evolution is Android, a …

Evaluating the authenticity of smartphone evidence

H Pieterse, M Olivier, R Van Heerden - … in Digital Forensics XIII: 13th IFIP …, 2017 - Springer
The widespread use and rich functionality of smartphones have made them valuable
sources of digital evidence. Malicious individuals are becoming aware of the importance of …

Forensics enabled secure mobile computing system for enterprises

J Govindaraj, G Gupta, D Chang - 2018 - repository.iiitd.edu.in
The enterprises are facing constant security threats with the emergence of new mobile
computing devices like smartphones, smartwatches, and wearables. The existing digital …