Reference architecture for android applications to support the detection of manipulated evidence
暂无分享,去创建一个
[1] Gaurav Gupta,et al. Preserving Dates and Timestamps for Incident Handling in Android Smartphones , 2014, IFIP Int. Conf. Digital Forensics.
[2] Michael W. Godfrey,et al. A reference architecture for Web browsers , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).
[3] Felix C. Freiling,et al. Forensic Analysis of YAFFS2 , 2012, Sicherheit.
[4] Marnix Kaart,et al. Android forensics: Interpretation of timestamps , 2014, Digit. Investig..
[5] Muhammad Faheem,et al. Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool , 2014 .
[6] Gaurav Gupta,et al. Forensic-Ready Secure iOS Apps for Jailbroken iPhones , 2015, IFIP Int. Conf. Digital Forensics.
[7] David A. Marca,et al. SADT: structured analysis and design technique , 1987 .
[8] Gary C. Kessler,et al. Android forensics: Simplifying cell phone examinations , 2010 .
[9] Sahin Albayrak,et al. Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[10] Ramandeep Singh,et al. CSLA — An application using Android Capstone project , 2014, 2014 IEEE International Conference on MOOC, Innovation and Technology in Education (MITE).
[11] Sunguk Lee. Creating and Using Databases for Android Applications , 2012 .
[12] Harald C. Gall,et al. Software architecture recovery of a program family , 1998, Proceedings of the 20th International Conference on Software Engineering.
[13] Xiangling Fu,et al. Research on Architecture of Multimedia and Its Design Based on Android , 2010, 2010 International Conference on Internet Technology and Applications.
[14] Sangjin Lee,et al. A recovery method of deleted record for SQLite database , 2011, Personal and Ubiquitous Computing.
[15] Eghosa Ugboma. Learn Database Programming Using SQL of MS Access 2007: Easy Transition to other SQL Platforms , 2007 .
[16] Felix C. Freiling,et al. Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL) , 2011 .
[17] Ryan Harris,et al. Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem , 2006, Digit. Investig..
[18] Jin-Soo Kim,et al. Tuning the Ext4 Filesystem Performance for Android-Based Smartphones , 2011, ICFCE.
[19] Heloise Pieterse,et al. Smartphones as Distributed Witnesses for Digital Forensics , 2014, IFIP Int. Conf. Digital Forensics.
[20] Luís Nogueira,et al. Evaluating Android OS for Embedded Real-Time Systems , 2010 .
[21] Douglas T. Ross,et al. Software design using: SADT , 1977, ACM Annual Conference.
[22] 练启光. Android , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[23] Richard C. Holt,et al. A reference architecture for Web servers , 2000, Proceedings Seventh Working Conference on Reverse Engineering.