Current and future trends in mobile device forensics: A survey
K Barmpatsalou, T Cruz, E Monteiro… - ACM Computing Surveys …, 2018 - dl.acm.org
Contemporary mobile devices are the result of an evolution process, during which
computational and networking capabilities have been continuously pushed to keep pace …
computational and networking capabilities have been continuously pushed to keep pace …
Cloud incident handling and forensic‐by‐design: cloud storage as a case study
NH Ab Rahman, NDW Cahyani… - Concurrency and …, 2017 - Wiley Online Library
Information security incident handling strategies or models are important to ensure the
security of organisations, particularly in cloud and big data environments. However, existing …
security of organisations, particularly in cloud and big data environments. However, existing …
Cloud storage forensics: MEGA as a case study
F Daryabar, A Dehghantanha… - Australian Journal of …, 2017 - Taylor & Francis
The increasing use of smartphones and cloud storage apps allows users to access their
data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted …
data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted …
Knock! knock! who is there? investigating data leakage from a medical internet of things hijacking attack
Abstract The amalgamation of Medical Internet of Things (MIoT) devices into everyday life is
influencing the landscape of modern medicine. The implementation of these devices …
influencing the landscape of modern medicine. The implementation of these devices …
Are you dating danger? An interdisciplinary approach to evaluating the (in) security of android dating apps
In today's age of instant gratification, mobile dating applications (apps) provide the comfort of
meeting new people at the swipe of a finger. However, recent high profile incidents have …
meeting new people at the swipe of a finger. However, recent high profile incidents have …
The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps
Mobile technologies can be, and have been, exploited in terrorist activities. In this paper, we
highlight the importance of mobile forensics in the investigation of such activities …
highlight the importance of mobile forensics in the investigation of such activities …
[PDF][PDF] Detecting repackaged android applications using perceptual hashing
The last decade has shown a steady rate of Android device dominance in market share and
the emergence of hundreds of thousands of apps available to the public. Because of the …
the emergence of hundreds of thousands of apps available to the public. Because of the …
[图书][B] Mobile Phone Forensics: Theory: Mobile Phone Forensics dan Security Series
AP Heriyanto - 2016 - books.google.com
Telepon seluler atau mobile phone sudah menjadi bagian dari kehidupan sehari-hari
manusia modern saat ini. Penggunaan telepon seluler untuk memenuhi kebutuhan individu …
manusia modern saat ini. Penggunaan telepon seluler untuk memenuhi kebutuhan individu …
Importance of rooting in an Android data acquisition
MR Boueiz - 2020 8th international symposium on digital …, 2020 - ieeexplore.ieee.org
Since Android became the leading handheld device operating system worldwide, the
probability of an Android device being subject to usage in a criminal case is increasing …
probability of an Android device being subject to usage in a criminal case is increasing …
Insight from a docker container introspection
T Watts, RG Benton, WB Glisson… - … Conference on System …, 2019 - par.nsf.gov
Large-scale adoption of virtual containers has stimulated concerns by practitioners and
academics about the viability of data acquisition and reliability due to the decreasing …
academics about the viability of data acquisition and reliability due to the decreasing …