A review on mobile device's digital forensic process models
The main purpose of this study is to discuss the different comparative studies on digital forensics process models specially in the field of mobile devices. In order to legally pursue digital criminals, investigation should be conducted in a forensically sound manner so that the acquired evidence wo...
| Main Authors: | Farjamfar, Anahita, Abdullah @ Selimun, Mohd Taufik, Mahmod, Ramlan, Udzir, Nur Izura |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Maxwell Science Publication
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/36269/ http://psasir.upm.edu.my/id/eprint/36269/1/A%20review%20on%20mobile%20device.pdf |
Similar Items
A generic smartphone forensic investigation process model
by: Farjamfar, Anahita
Published: (2016)
by: Farjamfar, Anahita
Published: (2016)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Formalization in digital forensic triage for identification of malicious IoT devices
by: Ibrahim, Mohammed, et al.
Published: (2019)
by: Ibrahim, Mohammed, et al.
Published: (2019)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
Critical phases in network forensics - a review
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015)
by: Olalere, Morufu, et al.
Published: (2015)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
A systematic review of file sharing in mobile devices using peer-to-peer systems
by: Yasin, Waheed, et al.
Published: (2011)
by: Yasin, Waheed, et al.
Published: (2011)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
by: Abdul Razak, Muhammad Thariq
Published: (2020)
by: Abdul Razak, Muhammad Thariq
Published: (2020)
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
by: Abdul Razak, Muhammad Thariq
Published: (2020)
by: Abdul Razak, Muhammad Thariq
Published: (2020)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Proposed intelligence systems based on digital Forensics : Review paper
by: Ismael Sahib, Hussein, et al.
Published: (2023)
by: Ismael Sahib, Hussein, et al.
Published: (2023)
A review of digital forensics methods for JPEG file carving
by: ALI, RABEI RAAD, et al.
Published: (2018)
by: ALI, RABEI RAAD, et al.
Published: (2018)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Similar Items
-
A generic smartphone forensic investigation process model
by: Farjamfar, Anahita
Published: (2016) -
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015) -
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013) -
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014) -
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)