, On the construction of a false alibi on the Android OS, Proceedings of the Third International Conference on Intelligent Networking and Collaborative Systems, pp.685-690, 2011.
, iPhone 3GS forensics: Logical analysis using Apple iTunes Backup Utility, vol.4, 2010.
, Computers and the Internet, 2011.
Innovation and competition in the smartphone industry: Is there a dominant design, Telecommunications Policy, vol.39, pp.162-175, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02386876
, Digital Forensic Evidence Examination, Fred Cohen and Associates, 2009.
, From digital diplomatics to digital records forensics, vol.68, pp.39-66, 2009.
An increasingly important requirement: Authentication of digital evidence, Journal of the Missouri Bar, vol.70, issue.6, pp.314-323, 2014. ,
Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem, Digital Investigation, vol.3, pp.44-49, 2006. ,
Guidelines on Cell Phone Forensics, NIST Special Publication, pp.800-101, 2007. ,
Non-technical manipulation of digital data, Advances in Digital Forensics, pp.51-63, 2005. ,
Playing hide-and-seek: Detecting the manipulation of Android timestamps, Proceedings of the Information Security for South Africa Conference, 2015. ,
Evaluating the authenticity of smartphone evidence, Advances in Digital Forensics XIII, pp.41-61, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01716408
Smartphone data evaluation model: Identifying authentic smartphone data, Digital Investigation, vol.24, pp.11-24, 2018. ,
Detecting manipulated smartphone data on Android and iOS devices, Communications in Computer and Information Science, H. Venter, M. Loock, M. Coetzee, pp.89-103, 2019. ,
Information Security Institute, Faculty of Information Technology, Digital Evidence: Representation and Assurance, 2007. ,