Results 21 to 30 of about 1,722,189 (301)

A comparison of forensic evidence recovery techniques for a windows mobile smart phone [PDF]

open access: yes, 2011
<p>Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult.
Glisson, W.B., Grispos, G., Storer, T.
core   +2 more sources

A Review of Mobile Forensic Investigation Process Models

open access: yesIEEE Access, 2020
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques.
Arafat Al-Dhaqm   +4 more
doaj   +1 more source

(IN-)PRIVACY IN MOBILE APPS. CUSTOMER OPPORTUNITIES [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
Subject of Study. The paper presents the results of an investigation of cross-platform mobile applications. This paper focuses on a cross-platform app data investigation in purpose of creating a database that helps to make decisions from data privacy ...
Yu.S. Chemerkina , T.I. Kuzmenkob
doaj   +1 more source

Digital Forensics in Action The Role of Digital Forensics in Cybercrime Investigations

open access: yesNUML International Journal of Engineering and Computing
The explosion of technology in recent years has revolutionized the face of cybercrime and requires new and innovative approaches to investigating digital crimes.
Hassan Shah Khan   +2 more
doaj   +5 more sources

Digital Forensics Subdomains: The State of the Art and Future Directions

open access: yesIEEE Access, 2021
For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident.
Arafat Al-Dhaqm   +7 more
doaj   +1 more source

Using smartphones as a proxy for forensic evidence contained in cloud storage services [PDF]

open access: yes, 2013
Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities.
Glisson, W., Grispos, G., Storer, T.
core   +2 more sources

Realistic Man, Fantasy Policeman: The Longevity of Ruth Rendell's Reginald Wexford [PDF]

open access: yes, 2016
Publisher does not allow open access until after ...
Schnabel, Jennifer
core   +1 more source

Machine Learning Approach to Mobile Forensics Framework for Cyber Crime Detection in Nigeria

open access: yesJournal of Computer Science Research, 2020
The mobile Cyber Crime detection is challenged by number of mobile devices (internet of things), large and complex data, the size, the velocity, the nature and the complexity of the data and devices has become so high that data mining techniques are no ...
Ibrahim Goni, Murtala Mohammad
semanticscholar   +1 more source

Mobile forensic triage for damaged phones using M_Triage [PDF]

open access: yes, 2016
Mobile forensics triage is a useful technique in a digital forensics investigation for recovering lost or purposely deleted and hidden files from digital storage.
Mohammed Hasheem, Yusoof
core   +1 more source

Secure and efficient DRM watermark algorithm of forensics in mobile internet

open access: yesEURASIP Journal on Image and Video Processing, 2018
With the development of mobile Internet technology, the characteristic of easy editing, transmitting, and forging the digital media bring great challenges in authenticity of multimedia.
Ma Zhaofeng, Jiang Ming
doaj   +1 more source

Home - About - Disclaimer - Privacy