A review of mobile forensic investigation process models

A Al-Dhaqm, S Abd Razak, RA Ikuesan… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …

Current and future trends in mobile device forensics: A survey

K Barmpatsalou, T Cruz, E Monteiro… - ACM Computing Surveys …, 2018 - dl.acm.org
Contemporary mobile devices are the result of an evolution process, during which
computational and networking capabilities have been continuously pushed to keep pace …

A forensically sound adversary model for mobile devices

Q Do, B Martini, KKR Choo - PloS one, 2015 - journals.plos.org
In this paper, we propose an adversary model to facilitate forensic investigations of mobile
devices (eg Android, iOS and Windows smartphones) that can be readily adapted to the …

Conceptual evidence collection and analysis methodology for Android devices

B Martini, Q Do, KKR Choo - arxiv preprint arxiv:1506.05527, 2015 - arxiv.org
Android devices continue to grow in popularity and capability meaning the need for a
forensically sound evidence collection methodology for these devices also increases. This …

[LIVRE][B] The cloud security ecosystem: technical, legal, business and management issues

R Choo, R Ko - 2015 - books.google.com
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security
Ecosystem comprehensively discusses a range of cloud security topics from multi …

Mobile forensics: A review

H Alatawi, K Alenazi, S Alshehri… - … on Computing and …, 2020 - ieeexplore.ieee.org
Mobile devices are widely used. Although most of mobile devices are legally used, criminals
may use mobile devices during crime commitment. Therefore, these mobile devices become …

Impact of android phone rooting on user data integrity in mobile forensics

T Almehmadi, O Batarfi - 2019 2nd International Conference on …, 2019 - ieeexplore.ieee.org
Modern cellular phones are potent computing devices, and their capabilities are constantly
progressing. The Android operating system (OS) is widely used, and the number of …

An investigation into the impact of rooting android device on user data integrity

M Hassan, L Pantaleon - 2017 Seventh International …, 2017 - ieeexplore.ieee.org
The available commercial and freeware mobile forensics tools heavily rely on a rooted
mobile device for them to extract data. The potential effects of rooting the device before …

Data collection and audit logs of digital forensics in cloud

MR Sumalatha, P Batsa - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Cloud computing has become more important to the users and the service providers, since it
is convenient for the users to get the required service from their service providers. As the …

Comparative Study of Mobile Forensics Tools: Autopsy, Belkasoft X and Magnet Axiom

J Mehta, Y Bhadania, P Shah… - 2024 5th International …, 2024 - ieeexplore.ieee.org
In this modern era, smartphones have become in-tegral to human existence, influencing
almost various aspects of daily life. As smartphones and tablets have become more …