Mobile forensic data acquisition in Firefox OS
Mozilla Corporation has recently released a Linux-based open source operating system, namely Firefox OS. The arrival of this Firefox OS has created new challenges, concentrations and opportunities for digital investigators. Currently, Firefox OS is still not fully supported by most of the existing m...
| Main Authors: | Yusoff, Mohd Najwadi, Mahmod, Ramlan, Abdullah @ Selimun, Mohd Taufik, Dehghantanha, Ali |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47634/ http://psasir.upm.edu.my/id/eprint/47634/1/Mobile%20forensic%20data%20acquisition%20in%20Firefox%20OS.pdf |
Similar Items
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
by: Daryabar, Farid, et al.
Published: (2016)
by: Daryabar, Farid, et al.
Published: (2016)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Digital forensics investigation reduction model (DIFReM) framework for Windows 10 OS
by: Shayau, Yazid Haruna, et al.
Published: (2019)
by: Shayau, Yazid Haruna, et al.
Published: (2019)
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
Greening cloud-enabled big data storage forensics: syncany as a case study
by: Teing, Yee-Yang, et al.
Published: (2019)
by: Teing, Yee-Yang, et al.
Published: (2019)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
A forensics acquisition method of WhatsApp data on Android smartphone
by: Muzakir, Ummu Khosyatillah
Published: (2018)
by: Muzakir, Ummu Khosyatillah
Published: (2018)
Critical phases in network forensics - a review
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
by: Nik Abdull Malik, Nik Mariza, et al.
Published: (2014)
An investigation of the secure data communication in medical mobile applications
by: Aminnezhad, Asou, et al.
Published: (2015)
by: Aminnezhad, Asou, et al.
Published: (2015)
A mobile forensic visualization tool for android data partition
by: Chow, Xiang Quan, et al.
Published: (2021)
by: Chow, Xiang Quan, et al.
Published: (2021)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
Role of OsFKBP62-OsHSP90-OsHSFA2 pathway in regulating
thermotolerance in rice (Oryza sativa L.)
by: Ng'ang'a, Maureen
Published: (2025)
by: Ng'ang'a, Maureen
Published: (2025)
Development of a Mobile Robot Spatial Data Acquisition System
by: Ooi, Wei Han
Published: (2006)
by: Ooi, Wei Han
Published: (2006)
Diversification of Malaysian art (1990s- 201Os)
by: Abdullah, Sarena
Published: (2014)
by: Abdullah, Sarena
Published: (2014)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
A survey on cyber-crime prediction techniques
by: Shaerpour, Kaveh, et al.
Published: (2013)
by: Shaerpour, Kaveh, et al.
Published: (2013)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Islamic ethics for autism children on iOS
by: Abd Malik, Sofianiza, et al.
Published: (2014)
by: Abd Malik, Sofianiza, et al.
Published: (2014)
OsHAC1;1 and OsHAC1;2 function as arsenate reductases and regulate arsenic accumulation
by: Shi, Shulin, et al.
Published: (2016)
by: Shi, Shulin, et al.
Published: (2016)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
Windows instant messaging app forensics: facebook and skype as case studies
by: Teing, Yee Yang, et al.
Published: (2016)
by: Teing, Yee Yang, et al.
Published: (2016)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Evaluating premature convergence for metaheuristic.
by: Md Sultan, Abu Bakar, et al.
Published: (2008)
by: Md Sultan, Abu Bakar, et al.
Published: (2008)
Similar Items
-
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014) -
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014) -
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014) -
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012) -
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)