2017
DOI: 10.1109/msp.2017.4251107
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Forensics: Advances, Challenges, and Research Opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(42 citation statements)
references
References 14 publications
0
41
0
1
Order By: Relevance
“…However, the nature of smartphones consists of aspects that are not available on typical computing systems, such as desktop and laptop computers. The heterogeneity of smartphones in use from various vendors with a diverse set of hardware and software configurations make the development of forensic tools a challenging task [5]. In such dynamic environments, the application of artificial intelligence (AI) facilitates the resilience to adapt to rapidly changing requirements.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the nature of smartphones consists of aspects that are not available on typical computing systems, such as desktop and laptop computers. The heterogeneity of smartphones in use from various vendors with a diverse set of hardware and software configurations make the development of forensic tools a challenging task [5]. In such dynamic environments, the application of artificial intelligence (AI) facilitates the resilience to adapt to rapidly changing requirements.…”
Section: Discussionmentioning
confidence: 99%
“…However, modern smartphones use strong user authentication mechanisms such as PIN codes, log-in patterns, and biometrics, such as fingerprint and facial recognition. Furthermore, the sheer diversity of makes and models currently in the smartphone market causes difficulty in following a unified approach to perform live analysis on smartphones in investigations [5].…”
Section: Introductionmentioning
confidence: 99%
“…Data from mobile devices must be extracted during investigations. There are five levels of data extraction: manual, logical, hex dumps, chip-offs, and micro reads [5]. Each of these options allow investigators to gather different information from different areas of the device with varying levels of complexity.…”
Section: Data Extractionmentioning
confidence: 99%
“…In the network score‐based algorithm, 29 various network factors are considered for the best network selection of the MN during handover. Finally, the cybercriminal activities of mobile devices and secure data utilization in Internet of things (IoT) left an important research issues 30,31 in future communication. The overall comparison of existing vertical handover algorithms is summarized in Table 2.…”
Section: Literature Surveymentioning
confidence: 99%