Publisher
Springer Science and Business Media LLC
Subject
Law,Strategy and Management,Safety Research
Reference46 articles.
1. Afonin, Oleg, and Vladimir Katalov. 2016. Mobile forensics—Advanced investigative strategies. Birmingham: Packt Publications.
2. All Answers Ltd. 2018. Investigation of JTAG and ISP techniques for forensic procedures. https://ukdiss.com/examples/jtag-and-isp-techniques-forensic-procedures.php?vref=1. Accessed 26 Dec 2020.
3. Ayers, R., W. Jansen, L. Moenner, and A. Delaitre. 2007. Cell phone forensic tools: An overview and analysis update. NIST Interagency/Internal Report (NISTIR) 7387. https://doi.org/10.6028/NIST.IR.7387.
4. Bair, John. 2018a. eMMC reading and in-system programming. In Seeking the truth from mobile evidence, ed. John Bair, 457–478. Cambridge: Academic. https://doi.org/10.1016/B978-0-12-811056-0.00030-3.
5. Bair, John. 2018b. The legal process. In Seeking the truth from mobile evidence, ed. John Bair, 41–54. Cambridge: Academic. https://doi.org/10.1016/B978-0-12-811056-0.00004-2.