Subject
Law,Medical Laboratory Technology,Computer Science Applications
Reference31 articles.
1. Android/platform/packages/apps/Email.gitl,2008
2. Azadegan S, Yu W, Sistani M, Acharya S. Novel anti-forensics approaches for smart phones. In Hawaii International Conference on System Sciences (pp. 5424–5431). Maui, HI: IEEE; 2012, January 4.
3. Top 7 ways investigators catch criminals using mobile device forensics;Casey,2009
4. IT organizations embrace bring-your-own devices;Citrix,2011
5. Cohen MI, Bilby D, Caronni G. Distributed forensics and incident response in the enterprise. In: Digital forensics research workshop 2011. New Orleans, LA: Elsevier; 2011S101–10; August 2011.
Cited by
53 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Examining the Behavior of Web Browsers Using Popular Forensic Tools;International Journal of Digital Crime and Forensics;2024-07-17
2. Forensic Operations for Recognizing SQLite Content (FORC): An Automated Forensic Tool for Efficient SQLite Evidence Extraction on Android Devices;Applied Sciences;2023-09-27
3. VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics;Journal of Cybersecurity and Privacy;2023-07-10
4. Comparative analysis of Data Extraction for Qualcomm based android devices;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06
5. Quarks: A Secure and Decentralized Blockchain-Based Messaging Network;2023 IEEE 10th International Conference on Cyber Security and Cloud Computing (CSCloud)/2023 IEEE 9th International Conference on Edge Computing and Scalable Cloud (EdgeCom);2023-07