Academic literature on the topic 'Mobile forensic tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile forensic tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mobile forensic tools"
Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Full textOsho, Oluwafemi, and Sefiyat Oyiza Ohida. "Comparative Evaluation of Mobile Forensic Tools." International Journal of Information Technology and Computer Science 8, no. 1 (January 8, 2016): 74–83. http://dx.doi.org/10.5815/ijitcs.2016.01.09.
Full textHikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (January 7, 2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Full textCurran, Kevin, Andrew Robinson, Stephen Peacocke, and Sean Cassidy. "Mobile Phone Forensic Analysis." International Journal of Digital Crime and Forensics 2, no. 3 (July 2010): 15–27. http://dx.doi.org/10.4018/jdcf.2010070102.
Full textRiadi, Imam, Anton Yudhana, and Mushab Al Barra. "Forensik Mobile pada Layanan Media Sosial LinkedIn." JISKA (Jurnal Informatika Sunan Kalijaga) 6, no. 1 (January 20, 2021): 9–20. http://dx.doi.org/10.14421/jiska.2021.61-02.
Full textUmar, Rusydi, Imam Riadi, and Guntur Maulana Zamroni. "Mobile Forensic Tools Evaluation for Digital Crime Investigation." International Journal on Advanced Science, Engineering and Information Technology 8, no. 3 (June 20, 2018): 949. http://dx.doi.org/10.18517/ijaseit.8.3.3591.
Full textArévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas, and Gustavo Adolfo Higuera Castro. "Forensic analysis with hacking tools on android devices." Visión electrónica 13, no. 1 (January 31, 2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.
Full textZamroni, Guntur M., and Imam Riadi. "Mobile Forensic Tools Validation and Evaluation for Instant Messaging." International Journal on Advanced Science, Engineering and Information Technology 10, no. 5 (October 15, 2020): 1860. http://dx.doi.org/10.18517/ijaseit.10.5.7499.
Full textNizam, Syafiqah Hanisah Shahrol, Nurul Hidayah Ab Rahman, and Niken Dwi Wahyu Cahyani. "Keyword Indexing And Searching Tool (KIST): A Tool to Assist the Forensics Analysis of WhatsApp Chat." International Journal on Information and Communication Technology (IJoICT) 6, no. 1 (June 20, 2020): 23. http://dx.doi.org/10.21108/ijoict.2020.61.481.
Full textGhannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.
Full textDissertations / Theses on the topic "Mobile forensic tools"
Shakir, Amer, Muhammad Hammad, and Muhammad Kamran. "Comparative Analysis & Study of Android/iOS MobileForensics Tools." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44797.
Full text(8800973), Kelsey Billups. "New and Emerging Mobile Apps Among Teens - Are Forensic Tools Keeping Up?" Thesis, 2020.
Find full textPin, Chang Feng, and 鄭鋒濱. "A Study on the Differences of Capturing Digital Evidence by Forensic Tools Based on Mobile Device Platform." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/75964868104108420059.
Full text國防大學
資訊管理學系
103
With the popularity of mobile devices and Internet use, crime information network has been significantly improved, the crime scene is no longer limited to physical traces card crime, law enforcement officers with traditional forensic equipment and tools are insufficient to capture Internet digital space scene evidence.Therefore, law enforcement officers are required to understand the extent of the platform for mobile devices, such as electromagnetic records which may be generated, which will not get the record, what tools should be used to carry out forensic,it’s their basic knowledge. In response to the investigation of crime and improve smartphone efficiency and detection rate, investigators must be able to promptly identify and trace the source of the problem and, through compliance with standard operating procedures, evidence collection and processing so that come with digital evidence in court evidence probative force and enhance the professionalism of the forensic report and credibility. Thus, for different smartphone platforms crime patterns, what type of digital evidence should capture and use what professional forensic tools in order to effectively and quickly for digital forensic evidence, as court evidence in the courts has become very important. and how to provide an appropriate recommendations or guidelines for the use of law enforcement personnel reference, has become very urgent and important issues worth exploring. This study attempts to create a different smartphone platforms use the same context, and the use of different professional forensic tools implementation, by sorting, classification, analysis and other steps to retrieve the digital evidence to compare the implementation of key differences, such as the mirror file produced time, file restore time, the identification data integrity, data identification readability, data identification number, to restore the hardware and software categories and support system, expect to obtain an objective relative differences in data, and then for different smartphones platform crime patterns, what type of digital evidence should capture and use what professional forensic tools in order to effectively and quickly for digital forensic evidence put forward appropriate recommendations or guidelines related to law enforcement officers to serve for reference use; study showed relevant information is available forensic personnel familiar with the operation and forensic tools to be an effective reference for the court, and proposed future direction for the development of resistance and forensic work.
Chou, Po-How, and 邱柏豪. "The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/9j4589.
Full text國立交通大學
管理學院資訊管理學程
106
Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices are widely used in daily life and also used in different fields, including medical, information processing, biometrics, financial transactions, navigation and positioning, and information science. The most popular applications for mobile are communication and email. However, the applications use in phishing, scams, or theft of data. The information-intensive environment, when a digital criminal record is to be verified, it is necessary for a professional digital forensic tool to verify it. However, the rapid development of information security and digital forensics has provided evidence of more evidence and credibility for the standardization and technology of digital forensics in the future. The encrypting applications from mobile, extracting sent and received letters and enterprise applications developed by the company, using digital forensics tools to process and retrieve feature information to identify the correctness of the source and verify the information extracted by the encrypted application. And indirectly understand whether it can provide evidence of favorable evidence and credibility. In the experiments of this paper, test results were obtained through the same forensic tools, mobile device systems, and encryption applications. In summary, the research results show that the evidence ability and credibility evidence provided by the digital forensic tools can be applied legally. However, the encrypted application can protect the enterprise data without being accessed by special permission or tools. And provide the correct digital evidence.
Books on the topic "Mobile forensic tools"
Mikhaylov, Igor. Mobile Forensics Cookbook: Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools. Packt Publishing - ebooks Account, 2017.
Find full textBook chapters on the topic "Mobile forensic tools"
Agrawal, Animesh Kumar, Pallavi Khatri, and Sumitra Ranjan Sinha. "Comparative Study of Mobile Forensic Tools." In Advances in Data and Information Sciences, 39–47. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8360-0_4.
Full textAlhassan, J. K., R. T. Oguntoye, Sanjay Misra, Adewole Adewumi, Rytis Maskeliūnas, and Robertas Damaševičius. "Comparative Evaluation of Mobile Forensic Tools." In Proceedings of the International Conference on Information Technology & Systems (ICITS 2018), 105–14. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73450-7_11.
Full textGupchup, Nirneeta, and Nishchol Mishra. "A Systematic Survey on Mobile Forensic Tools Used for Forensic Analysis of Android-Based Social Networking Applications." In Data, Engineering and Applications, 205–15. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6351-1_16.
Full textShukla, Utkarsha, Bishwas Mandal, and K. V. D. Kiran. "Perlustration on Mobile Forensics Tools." In Computer Networks and Inventive Communication Technologies, 1225–31. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9647-6_97.
Full textWang, Ping, Matt Rosenberg, and Hubert D’Cruze. "Integration of Mobile Forensic Tool Capabilities." In Advances in Intelligent Systems and Computing, 81–87. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77028-4_13.
Full textSatheesh Kumar, S., Bibin Thomas, and K. L. Thomas. "An Agent Based Tool for Windows Mobile Forensics." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 77–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35515-8_7.
Full textSaleem, Shahzad, Oliver Popov, and Oheneba Kwame Appiah-Kubi. "Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 264–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39891-9_17.
Full textKemp, Karen, and Subrata Acharya. "Towards the Design of a Forensic Tool for Mobile Data Visualization." In Lecture Notes in Computer Science, 462–70. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91521-0_33.
Full textLai, Yenting, Chunghuang Yang, Chihhung Lin, and TaeNam Ahn. "Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing." In Convergence and Hybrid Information Technology, 196–203. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24106-2_26.
Full textCurran, Kevin, Andrew Robinson, Stephen Peacocke, and Sean Cassidy. "Mobile Phone Forensic Analysis." In Crime Prevention Technologies and Applications for Advancing Criminal Investigation, 250–62. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1758-2.ch016.
Full textConference papers on the topic "Mobile forensic tools"
Narayanan, A. Sankara, and M. Mohamed Ashik. "Computer Forensic First Responder Tools." In 2012 International Conference on Advances in Mobile Network, Communication and its Applications (MNCAPPS). IEEE, 2012. http://dx.doi.org/10.1109/mncapps.2012.38.
Full textPadmanabhan, Radhika, Karen Lobo, Mrunali Ghelani, Dhanika Sujan, and Mahesh Shirole. "Comparative analysis of commercial and open source mobile device forensic tools." In 2016 Ninth International Conference on Contemporary Computing (IC3). IEEE, 2016. http://dx.doi.org/10.1109/ic3.2016.7880238.
Full textAlief, Fahdiaz, Yohan Suryanto, Linda Rosselina, and Tofan Hermawan. "Analysis of Autopsy Mobile Forensic Tools against Unsent Messages on WhatsApp Messaging Application." In 2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI). IEEE, 2020. http://dx.doi.org/10.23919/eecsi50503.2020.9251876.
Full textCristian, Pozo-Calderon, Torres-Carrion Hernan, Guaman-Quinche Rene, Alvarez-Pineda Francisco, and Narvaez-Guillen Cristian. "Methodologies and Forensic Analysis Tools on Android Mobile Devices: A Systematic Literature Review." In 2020 15th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2020. http://dx.doi.org/10.23919/cisti49556.2020.9140852.
Full textZareen, Amjad, and Shamim Baig. "Notice of Violation of IEEE Publication Principles: Mobile Phone Forensics: Challenges, Analysis and Tools Classification." In 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2010. http://dx.doi.org/10.1109/sadfe.2010.24.
Full textLwin, Htar Htar, Wai Phyo Aung, and Kyaw Kyaw Lin. "Comparative Analysis of Android Mobile Forensics Tools." In 2020 IEEE Conference on Computer Applications (ICCA). IEEE, 2020. http://dx.doi.org/10.1109/icca49400.2020.9022838.
Full textWilson, Rodney, and Hongmei Chi. "A Case Study for Mobile Device Forensics Tools." In ACM SE '17: SouthEast Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3077286.3077564.
Full textYates, Maynard. "Practical investigations of digital forensics tools for mobile devices." In 2010 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1940941.1940972.
Full textNinawe, Prashant N., and Shrikant B. Ardhapurkar. "Design and implementation of cloud based mobile forensic tool." In 2015 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS). IEEE, 2015. http://dx.doi.org/10.1109/iciiecs.2015.7193033.
Full textCatanese, Salvatore Amato, and Giacomo Fiumara. "A visual tool for forensic analysis of mobile phone traffic." In the 2nd ACM workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1877972.1877992.
Full textReports on the topic "Mobile forensic tools"
Mentsiev, A., and M. T. Alams. Mobile forensic tools and techniques: Android data security. Ljournal, 2019. http://dx.doi.org/10.18411/2019-2019-2019-00002.
Full text