Journal articles on the topic 'Mobile forensic tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mobile forensic tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.
Full textOsho, Oluwafemi, and Sefiyat Oyiza Ohida. "Comparative Evaluation of Mobile Forensic Tools." International Journal of Information Technology and Computer Science 8, no. 1 (January 8, 2016): 74–83. http://dx.doi.org/10.5815/ijitcs.2016.01.09.
Full textHikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (January 7, 2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.
Full textCurran, Kevin, Andrew Robinson, Stephen Peacocke, and Sean Cassidy. "Mobile Phone Forensic Analysis." International Journal of Digital Crime and Forensics 2, no. 3 (July 2010): 15–27. http://dx.doi.org/10.4018/jdcf.2010070102.
Full textRiadi, Imam, Anton Yudhana, and Mushab Al Barra. "Forensik Mobile pada Layanan Media Sosial LinkedIn." JISKA (Jurnal Informatika Sunan Kalijaga) 6, no. 1 (January 20, 2021): 9–20. http://dx.doi.org/10.14421/jiska.2021.61-02.
Full textUmar, Rusydi, Imam Riadi, and Guntur Maulana Zamroni. "Mobile Forensic Tools Evaluation for Digital Crime Investigation." International Journal on Advanced Science, Engineering and Information Technology 8, no. 3 (June 20, 2018): 949. http://dx.doi.org/10.18517/ijaseit.8.3.3591.
Full textArévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas, and Gustavo Adolfo Higuera Castro. "Forensic analysis with hacking tools on android devices." Visión electrónica 13, no. 1 (January 31, 2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.
Full textZamroni, Guntur M., and Imam Riadi. "Mobile Forensic Tools Validation and Evaluation for Instant Messaging." International Journal on Advanced Science, Engineering and Information Technology 10, no. 5 (October 15, 2020): 1860. http://dx.doi.org/10.18517/ijaseit.10.5.7499.
Full textNizam, Syafiqah Hanisah Shahrol, Nurul Hidayah Ab Rahman, and Niken Dwi Wahyu Cahyani. "Keyword Indexing And Searching Tool (KIST): A Tool to Assist the Forensics Analysis of WhatsApp Chat." International Journal on Information and Communication Technology (IJoICT) 6, no. 1 (June 20, 2020): 23. http://dx.doi.org/10.21108/ijoict.2020.61.481.
Full textGhannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.
Full textFaheem, Muhammad, Tahar Kechadi, and Nhien An Le-Khac. "The State of the Art Forensic Techniques in Mobile Cloud Environment." International Journal of Digital Crime and Forensics 7, no. 2 (April 2015): 1–19. http://dx.doi.org/10.4018/ijdcf.2015040101.
Full textSouvignet, T., J. Hatin, F. Maqua, D. Tesniere, P. Léger, and R. Hormière. "Payment card forensic analysis: From concepts to desktop and mobile analysis tools." Digital Investigation 11, no. 3 (September 2014): 143–53. http://dx.doi.org/10.1016/j.diin.2014.06.006.
Full textDégardin, Klara, and Yves Roggo. "Innovative Strategy for Counterfeit Analysis." Medicine Access @ Point of Care 1 (January 2017): maapoc.0000013. http://dx.doi.org/10.5301/maapoc.0000013.
Full textAslan, Fatmagül, and Hacer Yaşar Teke. "A Case of Burn Related to Over-Heating of The Cell Phone Battery." Bulletin of Legal Medicine 23, no. 3 (December 23, 2018): 209–11. http://dx.doi.org/10.17986/blm.2018345611.
Full textSrivastava, Himanshu, and Shashikala Tapaswi. "Logical acquisition and analysis of data from android mobile devices." Information & Computer Security 23, no. 5 (November 9, 2015): 450–75. http://dx.doi.org/10.1108/ics-02-2014-0013.
Full textAshawa, Moses, and Innocent Ogwuche. "Forensic Data Extraction and Analysis of Left Artifacts on emulated Android Phones: A Case Study of Instant Messaging Applications." Circulation in Computer Science 2, no. 11 (December 20, 2017): 8–16. http://dx.doi.org/10.22632/ccs-2017-252-67.
Full textBarinova, Olga A. "THE USE OF A MIX-450 MOBILE FORENSIC LIGHT SOURCE TO IDENTIFY CRIME TRACES." Russian investigator 12 (December 17, 2020): 3–5. http://dx.doi.org/10.18572/1812-3783-2020-12-3-5.
Full textda Silveira, Claudinei Morin, Rafael T. de Sousa Jr, Robson de Oliveira Albuquerque, Georges D. Amvame Nze, Gildásio Antonio de Oliveira Júnior, Ana Lucila Sandoval Orozco, and Luis Javier García Villalba. "Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware." Applied Sciences 10, no. 12 (June 20, 2020): 4231. http://dx.doi.org/10.3390/app10124231.
Full textD.P., Gangwar, Anju Pathania, Anand -, and Shivanshu -. "AUTHENTICATION OF DIGITAL MP4 VIDEO RECORDINGS USING FILE CONTAINERS AND METADATA PROPERTIES." International Journal of Computer Science Engineering 10, no. 2 (April 30, 2021): 28–38. http://dx.doi.org/10.21817/ijcsenet/2021/v10i2/211002004.
Full textStanković, Miloš, Mohammad Meraj Mirza, and Umit Karabiyik. "UAV Forensics: DJI Mini 2 Case Study." Drones 5, no. 2 (June 1, 2021): 49. http://dx.doi.org/10.3390/drones5020049.
Full textMercado, Melissa C., Deborah M. Stone, Caroline W. Kokubun, Aimée-Rika T. Trudeau, Elizabeth Gaylor, Kristin M. Holland, and Brad N. Bartholow. "Inconsistencies in Overdose Suicide Death Investigation Practice and Potential Remedies Using Technology: A Centers for Disease Control and Prevention Consultation Meeting Summary." Academic Forensic Pathology 11, no. 2 (June 2021): 83–93. http://dx.doi.org/10.1177/19253621211022464.
Full textHani Roslee, Nurul Adhlina, and Nurul Hidayah Bt Ab Rahman. "A Visualization Approach to Analyze Android Smartphone Data." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 184. http://dx.doi.org/10.30630/joiv.2.3-2.137.
Full textRossinskaya, E. R., and I. A. Ryadovskiy. "Modern means of committing computer crimes and patterns of their execution." Lex Russica, no. 3 (April 5, 2019): 87–99. http://dx.doi.org/10.17803/1729-5920.2019.148.3.087-099.
Full textRYVKIN, STANISLAV, and GEORGE TUROV. "SPECIFIC FEATURES OF CONDUCTING INVESTIGATIVE ACTIONS IN THE ARCTIC." Gaps in Russian Legislation 13, no. 6 (November 30, 2020): 192–95. http://dx.doi.org/10.33693/2072-3164-2020-13-6-192-195.
Full textNasirudin, Nasirudin, Sunardi Sunardi, and Imam Riadi. "Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express." Jurnal Informatika Universitas Pamulang 5, no. 1 (March 31, 2020): 89. http://dx.doi.org/10.32493/informatika.v5i1.4578.
Full textWan, Xuejiao, Jingsha He, Gongzheng Liu, Na Huang, Xingye Zhu, Bin Zhao, and Yonghao Mai. "Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices." International Journal of Digital Crime and Forensics 7, no. 1 (January 2015): 1–25. http://dx.doi.org/10.4018/ijdcf.2015010101.
Full textAnshori, Ikhwan, Khairina Eka Setya Putri, and Umar Ghoni. "Analisis Barang Bukti Digital Aplikasi Facebook Messenger Pada Smartphone Android Menggunakan Metode NIJ." IT Journal Research and Development 5, no. 2 (August 19, 2020): 118–34. http://dx.doi.org/10.25299/itjrd.2021.vol5(2).4664.
Full textAlHidaifi, Saleh. "Mobile Forensics: Android Platforms and WhatsApp Extraction Tools." International Journal of Computer Applications 179, no. 47 (June 15, 2018): 25–29. http://dx.doi.org/10.5120/ijca2018917264.
Full textPawitradi, Gede, and I. Ketut Gede Suhartana. "Acquisition of LINE Digital Social Media Evidence Using the National Institute of Justice (NIJ) Method." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 2 (January 8, 2020): 129. http://dx.doi.org/10.24843/jlk.2019.v08.i02.p04.
Full textRehault, Frederick. "Windows mobile advanced forensics: An alternative to existing tools." Digital Investigation 7, no. 1-2 (October 2010): 38–47. http://dx.doi.org/10.1016/j.diin.2010.08.003.
Full textBerte, Rosamaria, Fabio Dellutri, Antonio Grillo, Alessandro Lentini, Gianluigi Me, and Vittorio Ottaviani. "Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm." International Journal of Electronic Security and Digital Forensics 2, no. 1 (2009): 18. http://dx.doi.org/10.1504/ijesdf.2009.023872.
Full textKumar, Manish. "Mobile phone forensics - a systematic approach, tools, techniques and challenges." International Journal of Electronic Security and Digital Forensics 13, no. 1 (2021): 64. http://dx.doi.org/10.1504/ijesdf.2021.111725.
Full textAgrawal, Vinayak, and Shashikala Tapaswi. "Forensic analysis of Google Allo messenger on Android platform." Information & Computer Security 27, no. 1 (March 11, 2019): 62–80. http://dx.doi.org/10.1108/ics-03-2017-0011.
Full textOrozco, Ana Lucila Sandoval, Jocelin Rosales Corripio, David Manuel Arenas González, Luis Javier García Villalba, and Julio Hernandez-Castro. "Theia: a tool for the forensic analysis of mobile devices pictures." Computing 98, no. 12 (January 25, 2016): 1251–86. http://dx.doi.org/10.1007/s00607-015-0482-5.
Full textBulgakov, V. V. "A study of the effectiveness to use electronic educational resources with web analytics tools (on the example of a departmental University of the Ministry of Emergency Situations of Russia)." Open Education 24, no. 3 (June 27, 2020): 4–11. http://dx.doi.org/10.21686/1818-4243-2020-3-4-11.
Full textAminova, E., I. Trapeznikov, and A. Priorov. "OVERVIEW OF DIGITAL FORENSICS ALGORITHMS IN DSLR CAMERAS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W4 (May 10, 2017): 199–205. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w4-199-2017.
Full textKeim, Yansi, Yung Han Yoon, and Umit Karabiyik. "Digital Forensics Analysis of Ubuntu Touch on PinePhone." Electronics 10, no. 3 (February 1, 2021): 343. http://dx.doi.org/10.3390/electronics10030343.
Full textKarampela, Sevasti, Jessica Smith, and Irene Panderi. "Determination of 19 Psychoactive Substances in Premortem and Postmortem Whole Blood Samples Using Ultra-High-Performance Liquid Chromatography–Tandem Mass Spectrometry." Separations 8, no. 6 (June 3, 2021): 78. http://dx.doi.org/10.3390/separations8060078.
Full textVizoso, Ángel, Martín Vaz-Álvarez, and Xosé López-García. "Fighting Deepfakes: Media and Internet Giants’ Converging and Diverging Strategies Against Hi-Tech Misinformation." Media and Communication 9, no. 1 (March 3, 2021): 291–300. http://dx.doi.org/10.17645/mac.v9i1.3494.
Full textSaleem, Shahzad, Oliver Popov, and Ibrahim Baggili. "A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis." Digital Investigation 16 (March 2016): S55—S64. http://dx.doi.org/10.1016/j.diin.2016.01.008.
Full textMai, Hang-Nga, and Du-Hyeong Lee. "Accuracy of Mobile Device–Compatible 3D Scanners for Facial Digitization: Systematic Review and Meta-Analysis." Journal of Medical Internet Research 22, no. 10 (October 23, 2020): e22228. http://dx.doi.org/10.2196/22228.
Full textCadle, Brian A., Kristin C. Rasmus, Juan A. Varela, Leah S. Leverich, Casey E. O'Neill, Ryan K. Bachtell, and Donald C. Cooper. "Cellular Phone-Based Image Acquisition and Quantitative Ratiometric Method for Detecting Cocaine and Benzoylecgonine for Biological and Forensic Applications." Substance Abuse: Research and Treatment 4 (January 2010): SART.S5025. http://dx.doi.org/10.4137/sart.s5025.
Full textSaleem, Shahzad, Oliver Popov, and Ibrahim Baggili. "Comments on “A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis” [Digit Investig 16S, S55–S64]." Digital Investigation 21 (June 2017): 88. http://dx.doi.org/10.1016/j.diin.2017.02.003.
Full textKlevtsov, Kirill K., and Vitaliy F. Vasyukov. "Obtaining electronic information on criminal cases within the framework of international cooperation." Vestnik of Saint Petersburg University. Law 12, no. 1 (2021): 36–51. http://dx.doi.org/10.21638/spbu14.2021.103.
Full textYudianto, Ahmad, and Nola Margaret. "EFFECT OF ROOM TEMPERATURE ON THE QUALITY OF DNA FROM EARPHONE SWAB BY OBSERVING MITOCHONDRIAL DNA [mtDNA] D-LOOP REGION OF 126 bp (HVS II, nt 34-159) AND 143 bp (HVS I, nt 16268-16410)." Folia Medica Indonesiana 53, no. 2 (November 3, 2017): 86. http://dx.doi.org/10.20473/fmi.v53i2.6342.
Full text"FORENSIC ANALYSIS OF DUPLICATE IMEI’S-A CASE STUDY." March-2021 10, no. 3 (2021): 79–82. http://dx.doi.org/10.29121/ijesrt.v10.i3.2021.11.
Full textZamroni, Guntur Maulana, and Imam Riadi. "Instant Messaging Forensic Analysis on Android Operating System." Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, May 28, 2019, 137–48. http://dx.doi.org/10.22219/kinetik.v4i2.735.
Full textJansen, Wayne, and Rick Ayers. "Forensic Tools for Mobile Phone Subscriber Identity Modules." Journal of Digital Forensics, Security and Law, 2006. http://dx.doi.org/10.15394/jdfsl.2006.1006.
Full text"Data Acquisition From Mobile Phone using Mobiledit." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S2 (August 31, 2019): 188–91. http://dx.doi.org/10.35940/ijitee.i1036.0789s219.
Full textYudhana, Anton, Imam Riadi, and Ikhwan Anshori. "IDENTIFICATION OF DIGITAL EVIDENCE FACEBOOK MESSENGER ON MOBILE PHONE WITH NATIONAL INSTITUTE OF STANDARDS TECHNOLOGY (NIST) METHOD." Kursor 9, no. 3 (January 15, 2019). http://dx.doi.org/10.28961/kursor.v9i3.152.
Full text