Forensic analysis of wireless networking evidence of Android smartphones, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.109-114, 2012. ,
DOI : 10.1109/WIFS.2012.6412634
Forensic analysis of WhatsApp Messenger on Android smartphones, Digital Investigation, pp.201-213, 2014. ,
DOI : 10.1016/j.diin.2014.04.003
Digital forensic investigation of cloud storage services, Digital Investigation, pp.81-95, 2012. ,
DOI : 10.1016/j.diin.2012.05.015
Storage and exchange formats for digital evidence, Digital Investigation, pp.122-128, 2011. ,
DOI : 10.1016/j.diin.2011.09.002
Digital image forensics, IEEE Signal Processing Magazine, vol.26, issue.2, pp.26-37, 2009. ,
DOI : 10.1109/MSP.2008.931078
Android forensics: Automated data collection and reporting from a mobile device, Digital Investigation, pp.12-20, 2013. ,
DOI : 10.1016/j.diin.2013.06.002
Android Forensics: Investigation, Analysis and Mobile Security for Google Android, 2011. ,
Don't cache out your case: Prosecuting child pornography possession laws based on images located in temporary Internet files, Berkeley Technical Law Journal, vol.19, pp.1227-1273, 2004. ,
Social snapshots, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.113-122, 2011. ,
DOI : 10.1145/2076732.2076748
Measurement and analysis of child pornography trafficking on P2P networks, Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.631-642, 2013. ,
DOI : 10.1145/2488388.2488444
Detecting social network profile cloning, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp.295-300, 2011. ,
DOI : 10.1109/PERCOMW.2011.5766886
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.6095
Forensic investigation of peer-to-peer file sharing networks, Digital Investigation, pp.95-103, 2010. ,
DOI : 10.1016/j.diin.2010.05.012
Identification of Smartphone-Image Source and Manipulation, Advanced Research in Applied Artificial Intelligence, pp.262-271, 2012. ,
DOI : 10.1007/978-3-642-31087-4_28
A Machine Learning-based Triage methodology for automated categorization of digital media, Digital Investigation, pp.193-204, 2013. ,
DOI : 10.1016/j.diin.2013.01.001
Smartphone sensor data as digital evidence, Computers & Security, vol.38, pp.51-75, 2013. ,
DOI : 10.1016/j.cose.2013.03.007
Anti-forensics of digital image compression, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.1050-1065, 2011. ,
DOI : 10.1109/TIFS.2011.2119314
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.420.1106
Improving the computer forensic analysis process through visualization, Communications of the ACM, vol.49, issue.2, pp.71-75, 2006. ,
DOI : 10.1145/1113034.1113073
Unification of digital evidence from disparate sources (Digital Evidence Bags), Digital Investigation, pp.223-228, 2005. ,
DOI : 10.1016/j.diin.2005.07.001