Tawanda Mushiri & Marvellous Moyo. 2023. Healthcare Systems Design of Intelligent Testing Centers. Healthcare Systems Design of Intelligent Testing Centers
199
219
.
Muhammad Haziq Mohd Zainudin, Khairul Akram Zainol Ariffin, Dahlia Asyiqin Ahmad Zainaddin, Ahmad Tarmizi Abdul Ghani & Siti Norul Huda Sheikh Abdullah. (2022) Cloud-based Data Extraction From Mobile Devices: A Preliminary Analysis. Cloud-based Data Extraction From Mobile Devices: A Preliminary Analysis.
Shahnawaz Khan, Ammar Yusuf, Mohammad Haider, K. Thirunavukkarasu, Parma Nand & Mohammad Khalid Imam Rahmani. (2022) A Review of Android and iOS Operating System Security. A Review of Android and iOS Operating System Security.
Sumin Shin, Giyoon Kim, Soram Kim & Jongsung Kim. (2022) Forensic analysis of note and journal applications. Forensic Science International: Digital Investigation 40, pages 301355.
Crossref
Dr. Dirk Pawlaszczyk, Martin Bochmann, Philipp Engler, Coert Klaver & Christian Hummert. (2022) API-based evidence acquisition in the cloud - a survey. Open Research Europe 2, pages 69.
Crossref
Richard Buurke & Nhien-An Le-Khac. 2022. Digital Forensics and Cyber Crime. Digital Forensics and Cyber Crime
93
108
.
Fatma GÜNEŞ ERİŞ & Erhan AKBAL. (2021) Forensic Analysis of Popular Social Media Applications on Android Smartphones. Balkan Journal of Electrical and Computer Engineering 9:4, pages 386-397.
Crossref
Marie-Rose Boueiz. (2020) Importance of rooting in an Android data acquisition. Importance of rooting in an Android data acquisition.
Wasim Ahmad Bhat, Mohammad Faid Jalal, Sajid Sajad Khan, Faiqah Farooq Shah & Mohamad Ahtisham Wani. (2019) Forensic analysis of Sync.com and FlipDrive cloud applications on Android platform. Forensic Science International 302, pages 109845.
Crossref
Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda & Mohd Taufik Abdullah. (2019) Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study. IEEE Transactions on Sustainable Computing 4:2, pages 204-216.
Crossref
Mitchell Vásquez Bermúdez, Jorge Hidalgo Larrea & María del Pilar Avilés Vera. (2019) Evaluación del uso efectivo de nextcloud como una herramienta colaborativa para la gestión del aprendizaje. Revista Científica Ciencia y Tecnología 21:Vol. 19 Núm. 21 (2019).
Crossref
Mohammed Asim, Dean Richard McKinnel, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh & Gregory Epiphaniou. 2019. Handbook of Big Data and IoT Security. Handbook of Big Data and IoT Security
179
210
.
Krzysztof Nagrabski, Michael Hopkins, Milda Petraityte, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou & Mohammad Hammoudeh. 2019. Handbook of Big Data and IoT Security. Handbook of Big Data and IoT Security
129
151
.
Yee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh & Gregory Epiphaniou. 2019. Handbook of Big Data and IoT Security. Handbook of Big Data and IoT Security
73
127
.
Lim Sze Thiam, Tooska Dargahi & Ali Dehghantanha. 2019. Handbook of Big Data and IoT Security. Handbook of Big Data and IoT Security
329
344
.
Pablo F. Ordoñez-Ordoñez, Domingo D. Herrera-Loaiza & Roberth Figueroa-Diaz. 2019. Technology Trends. Technology Trends
104
115
.
Adam J. Brown, William Bradley Glisson, Todd R. Andel & Kim-Kwang Raymond Choo. (2018) Cloud forecasting: Legal visibility issues in saturated environments. Computer Law & Security Review 34:6, pages 1278-1290.
Crossref
Yee‐Yang Teing, Ali Dehghantanha & Kim‐Kwang Raymond Choo. (2017) CloudMe forensics: A case of big data forensic investigation. Concurrency and Computation: Practice and Experience 30:5.
Crossref
Christian J. D’Orazio & Kim-Kwang Raymond Choo. (2018) Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. Future Generation Computer Systems 79, pages 247-261.
Crossref
Anand Kumar Mishra, Emmanuel Pilli & Mahesh Govil. 2018. Advances in Digital Forensics XIV. Advances in Digital Forensics XIV
243
261
.
Andrii Shalaginov, Sergii Banin, Ali Dehghantanha & Katrin Franke. 2018. Cyber Threat Intelligence. Cyber Threat Intelligence
7
45
.
Mudit Kalpesh Pandya, Sajad Homayoun & Ali Dehghantanha. 2018. Cyber Threat Intelligence. Cyber Threat Intelligence
281
296
.
Shasi Pokharel, Kim-Kwang Raymond Choo & Jixue Liu. (2017) Mobile cloud security: An adversary model for lightweight browser security. Computer Standards & Interfaces 49, pages 71-78.
Crossref
M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos & A. Dehghantanha. 2017. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
285
305
.
Kenneth M. Ovens & Gordon Morison. (2016) Identification and Analysis of Email and Contacts Artefacts on iOS and OS X. Identification and Analysis of Email and Contacts Artefacts on iOS and OS X.