2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies 2010
DOI: 10.1109/ngmast.2010.17
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of the Digital Forensic Examination of Mobile Phones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…There lies the need where researchers came up with the completely new domain, Cloud Forensics. All the IT services [19][20] are now-a-days being dominated by this Cloud Computing's highly dynamic architecture. With the rapid flourish of cloud computing, the traditional digital forensics methodology is becoming insufficient.…”
Section: Migrating Forensics To the Cloudmentioning
confidence: 99%
See 1 more Smart Citation
“…There lies the need where researchers came up with the completely new domain, Cloud Forensics. All the IT services [19][20] are now-a-days being dominated by this Cloud Computing's highly dynamic architecture. With the rapid flourish of cloud computing, the traditional digital forensics methodology is becoming insufficient.…”
Section: Migrating Forensics To the Cloudmentioning
confidence: 99%
“…Various confidential and sensitive information is thus stolen by the malicious users and as a consequence, the trust of the CSPs is affected badly. In this respect, for the purpose of monitoring VMs of the consumers and detecting malicious activities, CSPs must be provisioned with either introspection mechanism [20] or Intrusion Detection System [21].…”
Section: Related Frameworkmentioning
confidence: 99%