P. Andriotis, G. Oikonomou, and T. Tryfonas, Forensic analysis of wireless networking evidence of Android smartphones, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.109-114, 2012.
DOI : 10.1109/WIFS.2012.6412634

C. Anglano, Forensic analysis of WhatsApp Messenger on Android smartphones, Digital Investigation, pp.201-213, 2014.
DOI : 10.1016/j.diin.2014.04.003

H. Chung, J. Park, S. Lee, and C. Kang, Digital forensic investigation of cloud storage services, Digital Investigation, pp.81-95, 2012.
DOI : 10.1016/j.diin.2012.05.015

A. Flaglien, A. Mallasvik, M. Mustorp, and A. Arnes, Storage and exchange formats for digital evidence, Digital Investigation, pp.122-128, 2011.
DOI : 10.1016/j.diin.2011.09.002

J. Fridrich, Digital image forensics, IEEE Signal Processing Magazine, vol.26, issue.2, pp.26-37, 2009.
DOI : 10.1109/MSP.2008.931078

J. Grover, Android forensics: Automated data collection and reporting from a mobile device, Digital Investigation, pp.12-20, 2013.
DOI : 10.1016/j.diin.2013.06.002

A. Hoog, Android Forensics: Investigation, Analysis and Mobile Security for Google Android, 2011.

T. Howard, Don't cache out your case: Prosecuting child pornography possession laws based on images located in temporary Internet files, Berkeley Technical Law Journal, vol.19, pp.1227-1273, 2004.

M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek et al., Social snapshots, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.113-122, 2011.
DOI : 10.1145/2076732.2076748

R. Hurley, S. Prusty, H. Soroush, R. Walls, J. Albrecht et al., Measurement and analysis of child pornography trafficking on P2P networks, Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.631-642, 2013.
DOI : 10.1145/2488388.2488444

G. Kontaxis, I. Polakis, S. Ioannidis, and E. Markatos, Detecting social network profile cloning, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp.295-300, 2011.
DOI : 10.1109/PERCOMW.2011.5766886

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.6095

M. Liberatore, R. Erdely, T. Kerle, B. Levine, and C. Shields, Forensic investigation of peer-to-peer file sharing networks, Digital Investigation, pp.95-103, 2010.
DOI : 10.1016/j.diin.2010.05.012

Q. Liu, X. Li, L. Chen, H. Cho, P. Cooper et al., Identification of Smartphone-Image Source and Manipulation, Advanced Research in Applied Artificial Intelligence, pp.262-271, 2012.
DOI : 10.1007/978-3-642-31087-4_28

F. Marturana and S. Tacconi, A Machine Learning-based Triage methodology for automated categorization of digital media, Digital Investigation, pp.193-204, 2013.
DOI : 10.1016/j.diin.2013.01.001

A. Mylonas, V. Meletiadis, L. Mitrou, and D. Gritzalis, Smartphone sensor data as digital evidence, Computers & Security, vol.38, pp.51-75, 2013.
DOI : 10.1016/j.cose.2013.03.007

M. Stamm and K. Liu, Anti-forensics of digital image compression, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.1050-1065, 2011.
DOI : 10.1109/TIFS.2011.2119314

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.420.1106

S. Teelink and R. Erbacher, Improving the computer forensic analysis process through visualization, Communications of the ACM, vol.49, issue.2, pp.71-75, 2006.
DOI : 10.1145/1113034.1113073

P. Turner, Unification of digital evidence from disparate sources (Digital Evidence Bags), Digital Investigation, pp.223-228, 2005.
DOI : 10.1016/j.diin.2005.07.001