An Investigative Framework for Incident Analysis Advances in Digital Forensics, pp.23-34, 2011. ,
DOI : 10.1007/978-3-642-24212-0_2
Regulation of Converged Communications Surveillance, New Directions in Surveillance and Privacy, pp.39-73, 2009. ,
The iPhone Meets the Fourth Amendment, SSRN Electronic Journal, vol.3, 2008. ,
DOI : 10.2139/ssrn.1084503
A Multi-component View of Digital Forensics, 2010 International Conference on Availability, Reliability and Security, pp.647-652, 2010. ,
DOI : 10.1109/ARES.2010.61
FORZA ??? Digital forensics investigation framework that incorporate legal issues, Digital Investigation, pp.29-36, 2006. ,
DOI : 10.1016/j.diin.2006.06.004
A survey of mobile phone sensing, IEEE Communications Magazine, vol.48, issue.9, pp.140-150, 2010. ,
DOI : 10.1109/MCOM.2010.5560598
Guidelines on cell phone forensics, NIST Special Publication, vol.800, p.101, 2007. ,
DOI : 10.6028/NIST.SP.800-101
The growing need for on-scene triage of mobile devices, Digital Investigation, vol.6, issue.3-4, pp.3-4, 2010. ,
DOI : 10.1016/j.diin.2010.03.001
Data Retention: a Pandora Box for Rights and Liberties, Digital Privacy: Theory, Technologies and Practices, pp.410-433, 2008. ,
IOS Forensic Analysis: for IPhone, IPad and IPod Touch, Apress, 2010. ,
DOI : 10.1007/978-1-4302-3343-5
Smartphone spying tools, 2008. ,
Computer Forensics Field Triage Process Model, Proceeding of the Conference on Digital Forensics Security and Law, pp.27-40, 2006. ,
DOI : 10.15394/jdfsl.2006.1004
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.1878
Acquiring volatile operating system data tools and techniques, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.6-73, 2008. ,
DOI : 10.1145/1368506.1368516
Forensic readiness, @ Stake Technical Report, 2001. ,
Live memory forensics of mobile phones, Digital Investigation, pp.74-82, 2010. ,
DOI : 10.1016/j.diin.2010.05.010
Forensic Triage for Mobile Phones with DEC0DE, USENIX Security Symposium, 2011. ,
The new Fundamental Right to IT Security -First evaluation and comparative view at the U.S., Datenschutz und Datensicherheit, pp.713-716, 2008. ,
Agents, Trojans and tags: The next generation of investigators, International Review of Law Computers & Technology, vol.23, issue.12, pp.99-108, 2009. ,
A framework for information systems architecture, IBM Systems Journal, vol.26, issue.3, pp.276-292, 1987. ,
DOI : 10.1147/sj.263.0276