{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:03:00Z","timestamp":1742936580187,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319734491"},{"type":"electronic","value":"9783319734507"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-73450-7_11","type":"book-chapter","created":{"date-parts":[[2018,1,4]],"date-time":"2018-01-04T01:42:53Z","timestamp":1515030173000},"page":"105-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Comparative Evaluation of Mobile Forensic Tools"],"prefix":"10.1007","author":[{"given":"J. K.","family":"Alhassan","sequence":"first","affiliation":[]},{"given":"R. T.","family":"Oguntoye","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Misra","sequence":"additional","affiliation":[]},{"given":"Adewole","family":"Adewumi","sequence":"additional","affiliation":[]},{"given":"Rytis","family":"Maskeli\u016bnas","sequence":"additional","affiliation":[]},{"given":"Robertas","family":"Dama\u0161evi\u010dius","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,5]]},"reference":[{"key":"11_CR1","unstructured":"Azfar, A., Choo, K.K., Liu, L.: International Conference on Multimedia Tools Applcation. Springer (2016)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Lin, C., Peng, C.: Research of digital evidence forensics standard operating procedure with comparison and analysis based on smart phone. In: Broadband and Wireless Computing Communication and Application (BWCCA), pp. 386\u2013391. IEEE Xplore, Taiwan (2011)","DOI":"10.1109\/BWCCA.2011.63"},{"key":"11_CR3","unstructured":"Alghafi, J., Martin, M.: Forensic data acquistion methods for mobile phones. 2012 International Conference on Internet Technology and Secured Transactions, pp. 265\u2013269. IEEE, United Arab. Emirates (2012)"},{"key":"11_CR4","unstructured":"Chandran, A.: Investigating and analysing malicious events in Android application. Int. J. Eng. Sci. Res. Technol., 1462\u20131467 (2013)"},{"key":"11_CR5","unstructured":"Ntantogian, A., Marinakis, X.: Discovering authentication credentials in volatile memory android mobile devices. Mob. Forensics, 110\u2013117 (2013)"},{"issue":"3","key":"11_CR6","doi-asserted-by":"publisher","first-page":"358","DOI":"10.19026\/rjaset.8.981","volume":"8","author":"A Farjamfar","year":"2014","unstructured":"Farjamfar, A., Mahmod, U.: A review on mobile device\u2019s digital forensic process models. Res. J. Appl. Sci. Eng. Technol. 8(3), 358\u2013366 (2014)","journal-title":"Res. J. Appl. Sci. Eng. Technol."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Lai, Y., Lin, A.: Design and implementation of mobile forensic tool for android smart phone through cloud computing. In: Design and Implementation of Mobile Forensic Tool, pp. 196\u2013203 (2011)","DOI":"10.1007\/978-3-642-24106-2_26"},{"key":"11_CR8","first-page":"157","volume":"4","author":"J Kamble","year":"2015","unstructured":"Kamble, J.: Digital forensic investigation procedure. Int. J. Adv. Res. Sci. Eng. IJARSE 4, 157\u2013168 (2015)","journal-title":"Int. J. Adv. Res. Sci. Eng. IJARSE"},{"key":"11_CR9","unstructured":"Aniar, R.R., Anshul, K.K., Leesha, A.: Anroid phone forensics: tools and techniques. In: International Conference on Computing, Communication and Automation, ICCCA 2016 (2016)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Padmanabhan, R., Lobo, K., Ghelani, M., Sujan, D., Mahesh, S.: Comparative analysis of commercial and open source mobile device forensic tools. IEEE (2016)","DOI":"10.1109\/IC3.2016.7880238"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Osho, O., Ohida, A.: Comparative evaluation of mobile forensic tools. I. J. Inf. Technol. Comput. Sci., pp. 74\u201383 (2016)","DOI":"10.5815\/ijitcs.2016.01.09"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Yusof, M., Abdullah, D.: Performance measurement for mobile forensic data acquisition in firefox OS. Int. J. Cyber-Secur. Digital Forensics (IJCSDF), 130\u2013140 (2014)","DOI":"10.17781\/P001333"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Kubi, S., Saleem, P.: Evaluation of some tools for extracting e-evidence from mobile devices. I. J. Inf. Technol. Comput. Sci., 64\u201373 (2011)","DOI":"10.1109\/ICAICT.2011.6110999"},{"issue":"3","key":"11_CR14","first-page":"651","volume":"1","author":"A Mohtasebi","year":"2011","unstructured":"Mohtasebi, A., Dehghantanha, G., Broujerdi, H.: Smartphone foresics: a case study with Nokia E5-00 mobile phone. Int. J. Digital Inf. Wireless Commun. 1(3), 651\u2013655 (2011)","journal-title":"Int. J. Digital Inf. Wireless Commun."},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"S24","DOI":"10.1016\/j.diin.2012.05.007","volume":"9","author":"N Al Mutawa","year":"2012","unstructured":"Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digital Invest. 9, S24\u2013S33 (2012)","journal-title":"Digital Invest."},{"key":"11_CR16","unstructured":"Ahmed, R., Dharaskar, R.V.: Mobile forensics: an overview, tools, future trends and challenges from law enforcement perspective. In: 6th International Conference on E-Governance, ICEG, Emerging Technologies in E-Government, M-Government, pp. 312\u2013323 (2008)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Information Technology & Systems (ICITS 2018)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-73450-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T18:18:26Z","timestamp":1664475506000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-73450-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319734491","9783319734507"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-73450-7_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"5 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICITS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology & Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Libertad city","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ecuador","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 January 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 January 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icitss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icits.me\/index.php?lang.en","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}