ITM Web Conf.
Volume 46, 2022International Conference on Engineering and Applied Sciences (ICEAS’22)
|Number of page(s)||4|
|Published online||06 June 2022|
- M. Zinkus, T. M. Jois and M. Green, “Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions,” May 27, 2021. [Google Scholar]
- https://en.wikipedia.org/wiki/FBI%E2%80%93Apple_encryption_dispute, “wikipedia,” 2015. [Online]. [Google Scholar]
- https://www.adn.com/nation-world/2021/04/14/to-unlock-a-terrorists-iphone-the-fbi-turned-to-an-obscure-company-in-australia/. [Online]. [Google Scholar]
- W. Jansen and R. Ayers, “Guidelines on Cell Phone,” Recommendations of the National Institute of Standards and Technology, 2007. [CrossRef] [Google Scholar]
- S. C. Sathe and N. M. Dongre, “Data Acquisition Techniques in Mobile Forensics,” in International Conference on Inventive Systems and Control, 2018. [Google Scholar]
- K. Abdulla and A. Jones, “Forensics data acquisition methods for mobile phones,”in The 7th International Conference for Internet Technology and Secured Transactions (ICITST- 2012), 2012. [Google Scholar]
- K. Barmpatsalou, T. Cruz, E. Monteiro and. P. Simoes, “Current and Future Trends in Mobile Device Forensics: A Survey,” vol. 51, no. 3, p. 1– 31, May 2019. [Google Scholar]
- A. Zareen and S. Baig, “Mobile Phone Forensics: Challenges, Analysis and Tools Classification,” in Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, USA, 2010. [Google Scholar]
- D. Hariyadi and T. Rochmadi, “Logical Acquisition in the Forensic Investigation Process of Android Smartphones based on Agent using Open Source Software,” in IOP Conference Series Materials Science and Engineering, 2020. [Google Scholar]
- S. Jei Yang, J. H. Choi, K. B. Kim and T. Chang, “New acquisition method based on firmware update protocols for Android smartphones,” Digital Investigation, pp. S68-S76, 9 August 2015. [Google Scholar]
- “AcronisCyber Protect Cloud,” [Online]. Available: https://www.acronis.com/en-gb/articles/two-factor-authentication/. [Google Scholar]
- N. D. W. Cahyani, B. Martini and K.-K. R. Choo, “Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study,” in CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, 2016. [Google Scholar]
- P. Sharma, D. Arora and T. Sakthivel, “Enhanced Forensic Process for Improving Mobile Cloud Traceability in Cloud-Based Mobile Applications,” Procedia Computer Science, vol. 167, pp. 907-917, 2020. [CrossRef] [Google Scholar]
- D. Kim and J. Park, “Forensic Analysis of Android Phone Using Ext4 File System Journal Log,” 2012. [Google Scholar]
- “Apple Platform Security,” [Online]. Available: https://support.apple.com/guide/security/role-of-apple-file-system-seca6147599e/web. [Google Scholar]
- A. Fukami, R. Stoykova and Z. Geradts, “A new model for forensic data extraction from encrypted mobile devices,” September 2021. [Google Scholar]
- R. SAVJANI, “einfochips,” [Online]. Available: https://www.einfochips.com/blog/understanding-firmware-updates-the-whats-whys-andhows/#:~:text=A%20firmware%20update%20will%20upgrade,while%20interacting%20with%20the%20device. [Google Scholar]
- R. Lohiya, P. John and P. Shah, “Survey on Mobile Forensics,” International Journal of Computer Applications, vol. 118, p. 0975 – 8887, 2015. [Google Scholar]
- A. EL MAJDOUB, C. SAADI and H. C. CHAOUI, “Mobile Devices Forensics investigation,” in JASTI6, Sale, 2021. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.