Mobile Cloud Computing: implications to smartphone forensic procedures and methodologies
暂无分享,去创建一个
[1] Qian Wang,et al. SOA's Last Mile-Connecting Smartphones to the Service Cloud , 2009, 2009 IEEE International Conference on Cloud Computing.
[2] Wayne Jansen,et al. Guidelines on Cell Phone Forensics , 2007 .
[3] Anna Lysyanskaya,et al. Pay as you go , 1980, Nature.
[4] Xie Jian,et al. An Optimized Solution for Mobile Environment Using Mobile Cloud Computing , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[5] Brenda M. Williamson,et al. Forensics analysis of the contents of Nokia mobile phones , 2006 .
[6] Denis Reilly,et al. Cloud Computing: Pros and Cons for Computer Forensic Investigations , 2011 .
[7] Andrea Gregg,et al. Learning From Doing: Lessons Learned From Designing and Developing an Educational Software Within a Heterogeneous Group , 2021, Int. J. Web Based Learn. Teach. Technol..
[8] Rodney McKemmish,et al. What is forensic computing , 1999 .
[9] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[10] Stephen Kemmis,et al. Action Research in Retrospect and Prospect. , 1980 .
[11] Maurizio Rossi,et al. Internal forensic acquisition for mobile equipments , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[12] Upkar Varshney,et al. Issues in Emerging 4G Wireless Networks , 2001, Computer.
[13] Gary C. Kessler,et al. Android forensics: Simplifying cell phone examinations , 2010 .
[14] Daryl Johnson,et al. Third Party Application Forensics on Apple Mobile Devices , 2011, 2011 44th Hawaii International Conference on System Sciences.
[15] Gustavo Alonso,et al. Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications , 2009, Middleware.
[16] Hans D. Schotten,et al. Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[17] Jill Slay,et al. Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[18] Xinwen Zhang,et al. Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.
[19] Amjad Zareen,et al. Notice of Violation of IEEE Publication PrinciplesMobile Phone Forensics: Challenges, Analysis and Tools Classification , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[20] David Kember. Action learning and action research , 2000 .
[21] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[22] Bernd Grobauer,et al. Towards incident handling in the cloud: challenges and approaches , 2010, CCSW '10.
[23] Roy H. Campbell,et al. Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware , 2007 .
[24] Stephen D. Wolthusen,et al. Overcast: Forensic Discovery in Cloud Environments , 2009, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics.
[25] Bruria Haberman,et al. Research methods in computing: what are they, and how should we teach them? , 2006, ACM SIGCSE Bull..
[26] Ray Hunt,et al. Forensic information acquisition in mobile networks , 2009, 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[27] Marjie T. Britz. Computer Forensics and Cyber Crime: An Introduction , 2003 .
[28] Ashish Kumar Saxena,et al. Mobile forensics: Guidelines and challenges in data preservation and acquisition , 2009, 2009 IEEE Student Conference on Research and Development (SCOReD).
[29] Stephen Biggs,et al. Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[30] N. Sandlin. PAY AS YOU GO , 1989 .
[31] Sean Morrissey,et al. iOS Forensic Analysis: for iPhone, iPad, and iPod touch , 2010 .
[32] P. Sasikala,et al. Architectural Strategies for Green Cloud Computing: Environments, Infrastructure and Resources , 2011, Int. J. Cloud Appl. Comput..
[33] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[34] Verna J. Willis. Action Learning and Action Research , 2010 .
[35] Ludwig Slusky,et al. Cloud computing and computer forensics for business applications , 2009 .
[36] J. Creswell. Qualitative inquiry and research design: choosing among five traditions. , 1998 .
[37] R. O'Brien. An Overview of the Methodological Approach of Action Research , 2008 .