M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis et al., Tensorflow: A system for large-scale machine learning, Proceedings of the Twelfth USENIX Symposium on Operating Systems Design and Implementation, pp.265-283, 2016.

N. Mutawa, I. Baggili, and A. Marrington, Forensic analysis of social networking applications on mobile devices, Digital Investigation, vol.9, pp.24-33, 2012.

A. Aminnezhad, A. Dehghantanha, and M. Abdullah, A survey of privacy issues in digital forensics, International Journal of Cyber-Security and Digital Forensics, vol.1, issue.4, pp.311-323, 2012.

C. Anglano, Forensic analysis of WhatsApp Messenger on Android smartphones, Digital Investigation, vol.11, pp.201-213, 2014.

C. Apple and . Ml, , 2017.

I. Apple and . Security, , vol.12, 2019.

, AutoHotkey Foundation, AutoHotkey (autohotkey.com), 2019.

J. Bergstra, F. Bastien, O. Breuleux, P. Lamblin, R. Pascanu et al., Theano: Deep learning on GPUs with Python, Proceedings of the BigLearning Workshop, vol.3, 2011.

G. Cantrell, D. Dampier, Y. Dandass, N. Niu, and C. Bogen, Research toward a partially-automated and crime-specific digital triage process model, Computer and Information Science, vol.5, issue.2, pp.29-38, 2012.

K. Cho, B. Van-merrienboer, C. Gulcehre, D. Bahdanau, F. Bougares et al., Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01433235

D. Crockford, The application/json Media Type for JavaScript Object Notation (JSON), RFC, vol.4627, 2006.

. Google, Android Developer Manual, 2017.

A. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang et al., MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications, p.2017

M. Husain, I. Baggili, and R. Sridhar, A simple cost-effective framework for iPhone forensic analysis, Proceedings of the International Conference on Digital Forensics and Cyber Crime, pp.27-37, 2010.

Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long et al., Caffe: Convolutional architecture for fast feature embedding, Proceedings of the Twenty-Second ACM International Conference on Multimedia, pp.675-678, 2014.

, Keras Team, Keras: Deep Learning for Humans, GitHub (github. com/keras-team/keras), 2019.

S. Khan, A. Gani, A. Wahab, M. Shiraz, and I. Ahmad, Network forensics: Review, taxonomy and open challenges, Journal of Network and Computer Applications, pp.214-235, 2016.

A. Krizhevsky, I. Sutskever, and G. Hinton, ImageNet classification with deep convolutional neural networks, Communications of the ACM, vol.60, issue.6, pp.84-90, 2017.

D. Lawton, R. Stacey, and G. Dodd, E-Discovery in Digital Forensic Investigations, CAST Publication Number 32/14, Science and Technology, 2014.

Y. Lecun, Y. Bengio, and G. Hinton, Deep learning, Nature, vol.521, issue.7553, pp.436-444, 2015.

, libimobiledevice: A cross-platform software protocol library and tools to communicate with iOS devices natively (www.libimobiledevice.org), 2019.

J. Mahadeokar, Open NSFW Model, GitHub (github, 2017.

S. Morrissey and T. Campbell, iOS Forensic Analysis: For iPhone, iPad and iPod touch, 2010.

K. Murphy, Machine Learning: A Probabilistic Perspective, 2012.

D. Quick and M. Alzaabi, Forensic analysis of the Android filesystem YAFFS2, Proceedings of the Ninth Australian Digital Forensics Conference, pp.100-109, 2011.

V. Roussev, A. Barreto, and I. Ahmed, Forensic Acquisition of Cloud Drives, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01758692

V. Roussev, C. Quates, and R. Martell, Real-time digital forensics and triage, Digital Investigation, vol.10, pp.158-167, 2013.

N. Scrivens and X. Lin, Android digital forensics: Data, extraction and analysis, Proceedings of the ACM Turing 50th Celebration Conference -China, 2017.

A. Shekhar, Android TensorFlow Machine Learning Example, MindOrks Blog (blog.mindorks.com/android-tensorflow-mach ine-learning-example-ff0e9b2654cc, 2017.

Y. Steinbuch and J. Tacopino, Woman records horrific scene after boyfriend is fatally shot by police, 2016.

P. Stirparo and I. Kounelis, The Mobileak Project: Forensic methodology for mobile application privacy assessment, Proceedings of the International Conference on Internet Technology and Secured Transactions, pp.297-303, 2012.

M. Stroud, Boston bombing, 2013.

C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, Rethinking the inception architecture for computer vision, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.2818-2826, 2016.

T. Cydia, Cydia Impactor (cydia-app.com/cydia-impactor), 2019.

. Tensorflow, Introduction to TensorFlow Lite, 2018.