Current and future trends in mobile device forensics: A survey

K Barmpatsalou, T Cruz, E Monteiro… - ACM Computing Surveys …, 2018 - dl.acm.org
Contemporary mobile devices are the result of an evolution process, during which
computational and networking capabilities have been continuously pushed to keep pace …

Forensic analysis of tor browser on windows 10 and android 10 operating systems

MR Arshad, M Hussain, H Tahir, S Qadir… - IEEE …, 2021 - ieeexplore.ieee.org
Smartphones and Internet have become prevalent in our society with various applications in
businesses, education, healthcare, gaming, and research. One of the major issues with the …

Watch what you wear: preliminary forensic analysis of smart watches

I Baggili, J Oduro, K Anthony… - 2015 10th …, 2015 - ieeexplore.ieee.org
This work presents preliminary forensic analysis of two popular smart watches, the Samsung
Gear 2 Neo and LG G. These wearable computing devices have the form factor of watches …

A forensic analysis of the Tor network in tails operating system

N Mandela, AAS Mahmoud… - 2023 10th International …, 2023 - ieeexplore.ieee.org
The Tor network is a widely used tool for online privacy and security, allowing users to
communicate and access information anonymously. The anonymous and untraceable …

[HTML][HTML] Digital forensic analysis of the private mode of browsers on Android

X Fernández-Fuentes, TF Pena, JC Cabaleiro - Computers & Security, 2023 - Elsevier
The smartphone has become an essential electronic device in our daily lives. We carry our
most precious and important data on it, from family videos of the last few years to credit card …

Exploring the protection of private browsing in desktop browsers

N Tsalis, A Mylonas, A Nisioti, D Gritzalis, V Katos - Computers & Security, 2017 - Elsevier
Desktop browsers have introduced private browsing mode, a security control which aims to
protect users' data that are generated during a private browsing session by not storing them …

[КНИГА][B] The cloud security ecosystem: technical, legal, business and management issues

R Choo, R Ko - 2015 - books.google.com
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security
Ecosystem comprehensively discusses a range of cloud security topics from multi …

Conceptual evidence collection and analysis methodology for Android devices

B Martini, Q Do, KKR Choo - arxiv preprint arxiv:1506.05527, 2015 - arxiv.org
Android devices continue to grow in popularity and capability meaning the need for a
forensically sound evidence collection methodology for these devices also increases. This …

[PDF][PDF] Social Networks IM Forensics: Encryption Analysis.

N Al Barghouthy, H Said - J. Commun., 2013 - researchgate.net
In most regards, the twenty-first century may not bring revolutionary changes in electronic
messaging technology in terms of applications or protocols. Security issues that have long …

AndroKit: A toolkit for forensics analysis of web browsers on android platform

M Asim, MF Amjad, W Iqbal, H Afzal, H Abbas… - Future Generation …, 2019 - Elsevier
Due to the pervasive nature of smart phones and devices, users are becoming more and
more dependent on such devices for accessing online information. Pervasive use of smart …