Volatile memory acquisition using backup for forensic investigation
Nowadays mobile phones are used all over the world for the communication purposes. The capabilities of these devices are improved during the past few years. Due to their capabilities, mobile devices are used broadly in criminal activities especially in cybercrime. The volatile data stored in mobile...
| Main Authors: | Dezfouli, Farhood Norouzizadeh, Dehghantanha, Ali, Mahmod, Ramlan, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/68824/ http://psasir.upm.edu.my/id/eprint/68824/1/Volatile%20memory%20acquisition%20using%20backup%20for%20forensic%20investigation.pdf |
Similar Items
Analytical method for forensic investigation of social networking applications on smartphones
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Client data backup screen saver (in collaboration with backup server) / Wahida Zakaria
by: Zakaria, Wahida
Published: (2005)
by: Zakaria, Wahida
Published: (2005)
An investigation into the effect of backup coat sands on investment casting products
by: Kaila, Vishal N, et al.
Published: (2022)
by: Kaila, Vishal N, et al.
Published: (2022)
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Individual-Cell Monitoring System in Energy Backup Banks
by: Ortega-Sanchez, Cesar
Published: (2004)
by: Ortega-Sanchez, Cesar
Published: (2004)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Data backup and recovery with a minimum replica plan in a multi-cloud environment
by: Alshammari, Mohammad Matar, et al.
Published: (2020)
by: Alshammari, Mohammad Matar, et al.
Published: (2020)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Disaster recovery planning : local and remote data backup system / Low Chin Seng.
by: Low, Chin Seng
Published: (2000)
by: Low, Chin Seng
Published: (2000)
Stand-alone backup power system for electrical appliances with solar PV and grid options
by: Sabre, A. H., et al.
Published: (2020)
by: Sabre, A. H., et al.
Published: (2020)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
by: Daryabar, Farid, et al.
Published: (2016)
by: Daryabar, Farid, et al.
Published: (2016)
Improved reliability assessment of backup battery storage integrated with power supply system in a building
by: Othman, Muhammad Murtadha, et al.
Published: (2019)
by: Othman, Muhammad Murtadha, et al.
Published: (2019)
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
A forensics acquisition method of WhatsApp data on Android smartphone
by: Muzakir, Ummu Khosyatillah
Published: (2018)
by: Muzakir, Ummu Khosyatillah
Published: (2018)
Availability Analysis of Shared Backup Path Protection
Under Multiple-link Failure Scenario in WDM Networks
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
Availability Analysis Of Shared Backup Path Protection Under Multiple-Link Failure Scenario In WDM Networks
by: Mohamed Mostafa, A. Azim, et al.
Published: (2015)
by: Mohamed Mostafa, A. Azim, et al.
Published: (2015)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study
by: Teing, Yee Yang, et al.
Published: (2017)
by: Teing, Yee Yang, et al.
Published: (2017)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
A survey on cyber-crime prediction techniques
by: Shaerpour, Kaveh, et al.
Published: (2013)
by: Shaerpour, Kaveh, et al.
Published: (2013)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Windows instant messaging app forensics: facebook and skype as case studies
by: Teing, Yee Yang, et al.
Published: (2016)
by: Teing, Yee Yang, et al.
Published: (2016)
Development of phase change memory cell electrical circuit model for non-volatile multistate memory device
by: ElHassan, Nemat Hassan Ahmed
Published: (2017)
by: ElHassan, Nemat Hassan Ahmed
Published: (2017)
An investigation into staff burnout in forensic hospitals
by: Shaw, Emily
Published: (2019)
by: Shaw, Emily
Published: (2019)
Similar Items
-
Analytical method for forensic investigation of social networking applications on smartphones
by: Dezfouli, Farhood Norouzizadeh
Published: (2016) -
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013) -
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013) -
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013) -
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)