Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Mobile forensic tools“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Mobile forensic tools" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Mobile forensic tools"
Sachdeva, Shaweta, B. L. Raina und Avinash Sharma. „Analysis of Digital Forensic Tools“. Journal of Computational and Theoretical Nanoscience 17, Nr. 6 (01.06.2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Der volle Inhalt der QuelleOsho, Oluwafemi, und Sefiyat Oyiza Ohida. „Comparative Evaluation of Mobile Forensic Tools“. International Journal of Information Technology and Computer Science 8, Nr. 1 (08.01.2016): 74–83. http://dx.doi.org/10.5815/ijitcs.2016.01.09.
Der volle Inhalt der QuelleHikmatyar, Firmansyah Gustav, und Bambang Sugiantoro. „Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases“. IJID (International Journal on Informatics for Development) 7, Nr. 2 (07.01.2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Der volle Inhalt der QuelleCurran, Kevin, Andrew Robinson, Stephen Peacocke und Sean Cassidy. „Mobile Phone Forensic Analysis“. International Journal of Digital Crime and Forensics 2, Nr. 3 (Juli 2010): 15–27. http://dx.doi.org/10.4018/jdcf.2010070102.
Der volle Inhalt der QuelleRiadi, Imam, Anton Yudhana und Mushab Al Barra. „Forensik Mobile pada Layanan Media Sosial LinkedIn“. JISKA (Jurnal Informatika Sunan Kalijaga) 6, Nr. 1 (20.01.2021): 9–20. http://dx.doi.org/10.14421/jiska.2021.61-02.
Der volle Inhalt der QuelleUmar, Rusydi, Imam Riadi und Guntur Maulana Zamroni. „Mobile Forensic Tools Evaluation for Digital Crime Investigation“. International Journal on Advanced Science, Engineering and Information Technology 8, Nr. 3 (20.06.2018): 949. http://dx.doi.org/10.18517/ijaseit.8.3.3591.
Der volle Inhalt der QuelleArévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas und Gustavo Adolfo Higuera Castro. „Forensic analysis with hacking tools on android devices“. Visión electrónica 13, Nr. 1 (31.01.2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.
Der volle Inhalt der QuelleZamroni, Guntur M., und Imam Riadi. „Mobile Forensic Tools Validation and Evaluation for Instant Messaging“. International Journal on Advanced Science, Engineering and Information Technology 10, Nr. 5 (15.10.2020): 1860. http://dx.doi.org/10.18517/ijaseit.10.5.7499.
Der volle Inhalt der QuelleNizam, Syafiqah Hanisah Shahrol, Nurul Hidayah Ab Rahman und Niken Dwi Wahyu Cahyani. „Keyword Indexing And Searching Tool (KIST): A Tool to Assist the Forensics Analysis of WhatsApp Chat“. International Journal on Information and Communication Technology (IJoICT) 6, Nr. 1 (20.06.2020): 23. http://dx.doi.org/10.21108/ijoict.2020.61.481.
Der volle Inhalt der QuelleGhannam, Hussein Abed. „Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone“. Journal of Applied Information, Communication and Technology 5, Nr. 2 (28.10.2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.
Der volle Inhalt der QuelleDissertationen zum Thema "Mobile forensic tools"
Shakir, Amer, Muhammad Hammad und Muhammad Kamran. „Comparative Analysis & Study of Android/iOS MobileForensics Tools“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44797.
Der volle Inhalt der Quelle(8800973), Kelsey Billups. „New and Emerging Mobile Apps Among Teens - Are Forensic Tools Keeping Up?“ Thesis, 2020.
Den vollen Inhalt der Quelle findenPin, Chang Feng, und 鄭鋒濱. „A Study on the Differences of Capturing Digital Evidence by Forensic Tools Based on Mobile Device Platform“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/75964868104108420059.
Der volle Inhalt der Quelle國防大學
資訊管理學系
103
With the popularity of mobile devices and Internet use, crime information network has been significantly improved, the crime scene is no longer limited to physical traces card crime, law enforcement officers with traditional forensic equipment and tools are insufficient to capture Internet digital space scene evidence.Therefore, law enforcement officers are required to understand the extent of the platform for mobile devices, such as electromagnetic records which may be generated, which will not get the record, what tools should be used to carry out forensic,it’s their basic knowledge. In response to the investigation of crime and improve smartphone efficiency and detection rate, investigators must be able to promptly identify and trace the source of the problem and, through compliance with standard operating procedures, evidence collection and processing so that come with digital evidence in court evidence probative force and enhance the professionalism of the forensic report and credibility. Thus, for different smartphone platforms crime patterns, what type of digital evidence should capture and use what professional forensic tools in order to effectively and quickly for digital forensic evidence, as court evidence in the courts has become very important. and how to provide an appropriate recommendations or guidelines for the use of law enforcement personnel reference, has become very urgent and important issues worth exploring. This study attempts to create a different smartphone platforms use the same context, and the use of different professional forensic tools implementation, by sorting, classification, analysis and other steps to retrieve the digital evidence to compare the implementation of key differences, such as the mirror file produced time, file restore time, the identification data integrity, data identification readability, data identification number, to restore the hardware and software categories and support system, expect to obtain an objective relative differences in data, and then for different smartphones platform crime patterns, what type of digital evidence should capture and use what professional forensic tools in order to effectively and quickly for digital forensic evidence put forward appropriate recommendations or guidelines related to law enforcement officers to serve for reference use; study showed relevant information is available forensic personnel familiar with the operation and forensic tools to be an effective reference for the court, and proposed future direction for the development of resistance and forensic work.
Chou, Po-How, und 邱柏豪. „The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/9j4589.
Der volle Inhalt der Quelle國立交通大學
管理學院資訊管理學程
106
Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices are widely used in daily life and also used in different fields, including medical, information processing, biometrics, financial transactions, navigation and positioning, and information science. The most popular applications for mobile are communication and email. However, the applications use in phishing, scams, or theft of data. The information-intensive environment, when a digital criminal record is to be verified, it is necessary for a professional digital forensic tool to verify it. However, the rapid development of information security and digital forensics has provided evidence of more evidence and credibility for the standardization and technology of digital forensics in the future. The encrypting applications from mobile, extracting sent and received letters and enterprise applications developed by the company, using digital forensics tools to process and retrieve feature information to identify the correctness of the source and verify the information extracted by the encrypted application. And indirectly understand whether it can provide evidence of favorable evidence and credibility. In the experiments of this paper, test results were obtained through the same forensic tools, mobile device systems, and encryption applications. In summary, the research results show that the evidence ability and credibility evidence provided by the digital forensic tools can be applied legally. However, the encrypted application can protect the enterprise data without being accessed by special permission or tools. And provide the correct digital evidence.
Bücher zum Thema "Mobile forensic tools"
Mikhaylov, Igor. Mobile Forensics Cookbook: Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools. Packt Publishing - ebooks Account, 2017.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Mobile forensic tools"
Agrawal, Animesh Kumar, Pallavi Khatri und Sumitra Ranjan Sinha. „Comparative Study of Mobile Forensic Tools“. In Advances in Data and Information Sciences, 39–47. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8360-0_4.
Der volle Inhalt der QuelleAlhassan, J. K., R. T. Oguntoye, Sanjay Misra, Adewole Adewumi, Rytis Maskeliūnas und Robertas Damaševičius. „Comparative Evaluation of Mobile Forensic Tools“. In Proceedings of the International Conference on Information Technology & Systems (ICITS 2018), 105–14. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73450-7_11.
Der volle Inhalt der QuelleGupchup, Nirneeta, und Nishchol Mishra. „A Systematic Survey on Mobile Forensic Tools Used for Forensic Analysis of Android-Based Social Networking Applications“. In Data, Engineering and Applications, 205–15. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6351-1_16.
Der volle Inhalt der QuelleShukla, Utkarsha, Bishwas Mandal und K. V. D. Kiran. „Perlustration on Mobile Forensics Tools“. In Computer Networks and Inventive Communication Technologies, 1225–31. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9647-6_97.
Der volle Inhalt der QuelleWang, Ping, Matt Rosenberg und Hubert D’Cruze. „Integration of Mobile Forensic Tool Capabilities“. In Advances in Intelligent Systems and Computing, 81–87. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77028-4_13.
Der volle Inhalt der QuelleSatheesh Kumar, S., Bibin Thomas und K. L. Thomas. „An Agent Based Tool for Windows Mobile Forensics“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 77–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35515-8_7.
Der volle Inhalt der QuelleSaleem, Shahzad, Oliver Popov und Oheneba Kwame Appiah-Kubi. „Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 264–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39891-9_17.
Der volle Inhalt der QuelleKemp, Karen, und Subrata Acharya. „Towards the Design of a Forensic Tool for Mobile Data Visualization“. In Lecture Notes in Computer Science, 462–70. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91521-0_33.
Der volle Inhalt der QuelleLai, Yenting, Chunghuang Yang, Chihhung Lin und TaeNam Ahn. „Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing“. In Convergence and Hybrid Information Technology, 196–203. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24106-2_26.
Der volle Inhalt der QuelleCurran, Kevin, Andrew Robinson, Stephen Peacocke und Sean Cassidy. „Mobile Phone Forensic Analysis“. In Crime Prevention Technologies and Applications for Advancing Criminal Investigation, 250–62. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1758-2.ch016.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Mobile forensic tools"
Narayanan, A. Sankara, und M. Mohamed Ashik. „Computer Forensic First Responder Tools“. In 2012 International Conference on Advances in Mobile Network, Communication and its Applications (MNCAPPS). IEEE, 2012. http://dx.doi.org/10.1109/mncapps.2012.38.
Der volle Inhalt der QuellePadmanabhan, Radhika, Karen Lobo, Mrunali Ghelani, Dhanika Sujan und Mahesh Shirole. „Comparative analysis of commercial and open source mobile device forensic tools“. In 2016 Ninth International Conference on Contemporary Computing (IC3). IEEE, 2016. http://dx.doi.org/10.1109/ic3.2016.7880238.
Der volle Inhalt der QuelleAlief, Fahdiaz, Yohan Suryanto, Linda Rosselina und Tofan Hermawan. „Analysis of Autopsy Mobile Forensic Tools against Unsent Messages on WhatsApp Messaging Application“. In 2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI). IEEE, 2020. http://dx.doi.org/10.23919/eecsi50503.2020.9251876.
Der volle Inhalt der QuelleCristian, Pozo-Calderon, Torres-Carrion Hernan, Guaman-Quinche Rene, Alvarez-Pineda Francisco und Narvaez-Guillen Cristian. „Methodologies and Forensic Analysis Tools on Android Mobile Devices: A Systematic Literature Review“. In 2020 15th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2020. http://dx.doi.org/10.23919/cisti49556.2020.9140852.
Der volle Inhalt der QuelleZareen, Amjad, und Shamim Baig. „Notice of Violation of IEEE Publication Principles: Mobile Phone Forensics: Challenges, Analysis and Tools Classification“. In 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2010. http://dx.doi.org/10.1109/sadfe.2010.24.
Der volle Inhalt der QuelleLwin, Htar Htar, Wai Phyo Aung und Kyaw Kyaw Lin. „Comparative Analysis of Android Mobile Forensics Tools“. In 2020 IEEE Conference on Computer Applications (ICCA). IEEE, 2020. http://dx.doi.org/10.1109/icca49400.2020.9022838.
Der volle Inhalt der QuelleWilson, Rodney, und Hongmei Chi. „A Case Study for Mobile Device Forensics Tools“. In ACM SE '17: SouthEast Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3077286.3077564.
Der volle Inhalt der QuelleYates, Maynard. „Practical investigations of digital forensics tools for mobile devices“. In 2010 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1940941.1940972.
Der volle Inhalt der QuelleNinawe, Prashant N., und Shrikant B. Ardhapurkar. „Design and implementation of cloud based mobile forensic tool“. In 2015 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS). IEEE, 2015. http://dx.doi.org/10.1109/iciiecs.2015.7193033.
Der volle Inhalt der QuelleCatanese, Salvatore Amato, und Giacomo Fiumara. „A visual tool for forensic analysis of mobile phone traffic“. In the 2nd ACM workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1877972.1877992.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Mobile forensic tools"
Mentsiev, A., und M. T. Alams. Mobile forensic tools and techniques: Android data security. Ljournal, 2019. http://dx.doi.org/10.18411/2019-2019-2019-00002.
Der volle Inhalt der Quelle