Advances of mobile forensic procedures in Firefox OS
The advancement of smartphone technology has attracted many companies in developing mobile operating system (OS). Mozilla Corporation recently released Linux-based open source mobile OS, named Firefox OS. The emergence of Firefox OS has created new challenges, concentrations and opportunities for di...
| Main Authors: | Yusoff, Mohd Najwadi, Mahmod, Ramlan, Dehghantanha, Ali, Abdullah @ Selimun, Mohd Taufik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
The Society of Digital Information and Wireless Communications
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/36337/ http://psasir.upm.edu.my/id/eprint/36337/1/Advances%20of%20mobile%20forensic%20procedures%20in%20Firefox%20OS.pdf |
Similar Items
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
by: Daryabar, Farid, et al.
Published: (2016)
by: Daryabar, Farid, et al.
Published: (2016)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
Digital forensics investigation reduction model (DIFReM) framework for Windows 10 OS
by: Shayau, Yazid Haruna, et al.
Published: (2019)
by: Shayau, Yazid Haruna, et al.
Published: (2019)
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Critical phases in network forensics - a review
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
Greening cloud-enabled big data storage forensics: syncany as a case study
by: Teing, Yee-Yang, et al.
Published: (2019)
by: Teing, Yee-Yang, et al.
Published: (2019)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Role of OsFKBP62-OsHSP90-OsHSFA2 pathway in regulating
thermotolerance in rice (Oryza sativa L.)
by: Ng'ang'a, Maureen
Published: (2025)
by: Ng'ang'a, Maureen
Published: (2025)
Diversification of Malaysian art (1990s- 201Os)
by: Abdullah, Sarena
Published: (2014)
by: Abdullah, Sarena
Published: (2014)
A survey on cyber-crime prediction techniques
by: Shaerpour, Kaveh, et al.
Published: (2013)
by: Shaerpour, Kaveh, et al.
Published: (2013)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Islamic ethics for autism children on iOS
by: Abd Malik, Sofianiza, et al.
Published: (2014)
by: Abd Malik, Sofianiza, et al.
Published: (2014)
OsHAC1;1 and OsHAC1;2 function as arsenate reductases and regulate arsenic accumulation
by: Shi, Shulin, et al.
Published: (2016)
by: Shi, Shulin, et al.
Published: (2016)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
Unveiling the hidden truth: The evolution and advancement of forensic accounting in Indonesia
by: Ika Sari, Wahyuni TD, et al.
Published: (2024)
by: Ika Sari, Wahyuni TD, et al.
Published: (2024)
Windows instant messaging app forensics: facebook and skype as case studies
by: Teing, Yee Yang, et al.
Published: (2016)
by: Teing, Yee Yang, et al.
Published: (2016)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
An investigation of the secure data communication in medical mobile applications
by: Aminnezhad, Asou, et al.
Published: (2015)
by: Aminnezhad, Asou, et al.
Published: (2015)
Enhancing privacy of paging procedure in LTE
by: Muthana, Abdulrahman, et al.
Published: (2018)
by: Muthana, Abdulrahman, et al.
Published: (2018)
Evaluating premature convergence for metaheuristic.
by: Md Sultan, Abu Bakar, et al.
Published: (2008)
by: Md Sultan, Abu Bakar, et al.
Published: (2008)
Forensic analysis of gasoline in molotov cocktail using gas chromatography-mass spectrometry and chemometric procedures
by: Jamaluddin, Mohamad Ismail
Published: (2014)
by: Jamaluddin, Mohamad Ismail
Published: (2014)
Herberto Helder: os gestos do poema
by: Andre da Costa, Sara Sofia
Published: (2019)
by: Andre da Costa, Sara Sofia
Published: (2019)
Investigation into mammalian os cordis and cartilago cordis
by: Best, AS
Published: (2022)
by: Best, AS
Published: (2022)
Similar Items
-
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014) -
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014) -
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014) -
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008) -
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)