Current and future trends in mobile device forensics: A survey

K Barmpatsalou, T Cruz, E Monteiro… - ACM Computing Surveys …, 2018 - dl.acm.org
Contemporary mobile devices are the result of an evolution process, during which
computational and networking capabilities have been continuously pushed to keep pace …

Cloud incident handling and forensic‐by‐design: cloud storage as a case study

NH Ab Rahman, NDW Cahyani… - Concurrency and …, 2017 - Wiley Online Library
Information security incident handling strategies or models are important to ensure the
security of organisations, particularly in cloud and big data environments. However, existing …

Cloud storage forensics: MEGA as a case study

F Daryabar, A Dehghantanha… - Australian Journal of …, 2017 - Taylor & Francis
The increasing use of smartphones and cloud storage apps allows users to access their
data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted …

Knock! knock! who is there? investigating data leakage from a medical internet of things hijacking attack

T Flynn, G Grispos, W Glisson, W Mahoney - 2020 - scholarspace.manoa.hawaii.edu
Abstract The amalgamation of Medical Internet of Things (MIoT) devices into everyday life is
influencing the landscape of modern medicine. The implementation of these devices …

Are you dating danger? An interdisciplinary approach to evaluating the (in) security of android dating apps

R Shetty, G Grispos, KKR Choo - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In today's age of instant gratification, mobile dating applications (apps) provide the comfort of
meeting new people at the swipe of a finger. However, recent high profile incidents have …

The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps

NDW Cahyani, NHA Rahman, WB Glisson… - Mobile Networks and …, 2017 - Springer
Mobile technologies can be, and have been, exploited in terrorist activities. In this paper, we
highlight the importance of mobile forensics in the investigation of such activities …

[PDF][PDF] Detecting repackaged android applications using perceptual hashing

T Nguyen, JT McDonald, WB Glisson, TR Andel - 2020 - shsu-ir.tdl.org
The last decade has shown a steady rate of Android device dominance in market share and
the emergence of hundreds of thousands of apps available to the public. Because of the …

[图书][B] Mobile Phone Forensics: Theory: Mobile Phone Forensics dan Security Series

AP Heriyanto - 2016 - books.google.com
Telepon seluler atau mobile phone sudah menjadi bagian dari kehidupan sehari-hari
manusia modern saat ini. Penggunaan telepon seluler untuk memenuhi kebutuhan individu …

Importance of rooting in an Android data acquisition

MR Boueiz - 2020 8th international symposium on digital …, 2020 - ieeexplore.ieee.org
Since Android became the leading handheld device operating system worldwide, the
probability of an Android device being subject to usage in a criminal case is increasing …

Insight from a docker container introspection

T Watts, RG Benton, WB Glisson… - … Conference on System …, 2019 - par.nsf.gov
Large-scale adoption of virtual containers has stimulated concerns by practitioners and
academics about the viability of data acquisition and reliability due to the decreasing …