Guidelines on PDA Forensics

[1]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..

[2]  Pascal Meunier,et al.  ActiveSync, TCP/IP and 802.11b wireless vulnerabilities of WinCE-based PDAs , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[3]  Kingpin Kingpin,et al.  Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats , 2001, USENIX Security Symposium.

[4]  Joseph Grand pdd: Memory Imaging and Forensic Analysis of Palm OS Devices , 2002 .