Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…In the study of Skype and MSN apps, Chu, Lo were able to locate the target strings in the Android device's memory, even after the devices were rebooted. In the investigation of the Android Viber app, Chu, Yang were able to create an image of the memory and recover the received and sent IMs using the sender's and receiver's mobile numbers.…”
Section: Related Workmentioning
confidence: 99%
“…In the study of Skype and MSN apps, Chu, Lo were able to locate the target strings in the Android device's memory, even after the devices were rebooted. In the investigation of the Android Viber app, Chu, Yang were able to create an image of the memory and recover the received and sent IMs using the sender's and receiver's mobile numbers.…”
Section: Related Workmentioning
confidence: 99%
“…In our recent survey of 117 academic publications on mobile app security, privacy and forensics between January 2009 and August 2014, we only located 11 publications on mobile app forensics; of which four related to communication apps (Chu et al 2013;Chu et al 2012;Gao and Zhang 2013;Husain and Sridhar 2010); two related to social networking apps (Al Mutawa et al 2012;Levinson et al 2011); and five related to cloud apps (Martini and Choo 2013;Martini and Choo 2014;Quick and Choo 2013a;Quick and Choo 2013b;Quick and Choo 2014). To the best of our knowledge, there has been no research on mHealth app forensics published between January 2009 and August 2014, and at the time of this research.…”
Section: Related Workmentioning
confidence: 99%
“…Recent research investigates the risk that mobile phones present to individual members of society [16] and to the business world [14]. It has also examined some of the challenges these devices present to forensic investigations [9,17,18,25]. Hence, it is only a matter of time before individuals, organizations and businesses implement solutions to mitigate these risks through anti-forensics activities.…”
Section: Relevant Workmentioning
confidence: 99%