2013
DOI: 10.1016/j.diin.2013.10.003
|View full text |Cite
|
Sign up to set email alerts
|

A critical review of 7 years of Mobile Device Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 68 publications
(36 citation statements)
references
References 49 publications
0
34
0
2
Order By: Relevance
“…Stach and Mitschang, 2013), and mobile forensic literature (e.g. Barmpatsalou et al, 2013). This is, perhaps, unsurprising partly due to the walled-garden model on iOS devices.…”
Section: Related Workmentioning
confidence: 93%
“…Stach and Mitschang, 2013), and mobile forensic literature (e.g. Barmpatsalou et al, 2013). This is, perhaps, unsurprising partly due to the walled-garden model on iOS devices.…”
Section: Related Workmentioning
confidence: 93%
“…Not surprisingly, smartphones have been widely targeted by cybercriminals such as malware designed to steal users' private data 7−9 . Rapid changes in mobile device technologies and the wide range of mobile operating platforms and devices compound the challenges in a forensic investigation 10 . At the time of research, Android with 51.5% market share and Apple's iOS with 42.4% market share are the most popular mobile platforms 11 .…”
Section: Introductionmentioning
confidence: 99%
“…The nature of smartphones, the Central Processing Unit (CPU) architecture, their processing and memory resources, as well as the sheer number of used Operating Systems (OS), severely complicates the forensic acquisition and analysis of these devices (Barmpatsalou, Damopoulos, Kambourakis, & Katos, 2013).…”
Section: Hand-held Satellite Navigation Devicesmentioning
confidence: 99%