References
- Martini B, Choo K-KR. An integrated conceptual digital forensic framework for cloud computing. Digit Invest. 2012;9(2):71–80.10.1016/j.diin.2012.07.001
- Quick D, Martini B, Choo R. Cloud storage forensics. Rockland, MA: Syngress, an Imprint of Elsevier; 2014. p. 208.
- Hale JS. Amazon cloud drive forensic analysis. Digit Invest. 2013;10(3):259–265.10.1016/j.diin.2013.04.006
- Gu Q, Guirguis M. High performance cloud auditing and applications. Springer; 2014. Secure mobile cloud computing and security issues; 65–90. Available from: http://link.springer.com/chapter/10.1007/978-1-4614-3296-8_3
- Norouzizadeh Dezfouli F, Dehghantanha A, Eterovic-Soric B, Choo K-K R. Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Aust. J. Forensic Sci. 2015: 1–20. Available from: doi:10.1080/00450618.2015.1066854
- Martini B, Do Q, Choo K-KR. The cloud security ecosystem. Boston, MA: Syngress; 2015. Choo RK-KR, editor. Chapter 14 - Conceptual evidence collection and analysis methodology for Android devices; p. 285–307. Available from: http://www.sciencedirect.com/science/article/pii/B978012801595700014810.1016/B978-0-12-801595-7.00014-8
- Martini B, Do Q, Choo K-KR. The cloud security ecosystem. Boston, MA: Syngress; 2015. Choo RK-KR, editor. Chapter 15 - Mobile cloud forensics: an analysis of seven popular Android apps; p. 309–345. Available from: http://www.sciencedirect.com/science/article/pii/B978012801595700015X10.1016/B978-0-12-801595-7.00015-X
- Shariati M, Dehghantanha A, Choo K-KR. SugarSync forensic analysis. Australian J Forensic Sci. 2015:1–23.10.1080/00450618.2015.1021379
- Shariati M, Dehghantanha A, Martini B, Choo K-KR. The cloud security ecosystem. Boston, MA: Syngress; 2015. Choo RK-KR, editor. Chapter 19 - Ubuntu one investigation: detecting evidences on client machines; p. 429–446. Available from: http://www.sciencedirect.com/science/article/pii/B978012801595700019710.1016/B978-0-12-801595-7.00019-7
- Ayers R, Brothers S, Jansen W. Guidelines on mobile device forensics; 2014. NIST Special Publication 800-101 Revision 1. Available from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf10.6028/NIST.SP.800-101r1
- Chung H, Park J, Lee S, Kang C. Digital forensic investigation of cloud storage services. Digit Invest. 2012;9(2):81–95.10.1016/j.diin.2012.05.015
- Marturana F, Me G, Tacconi S. A case study on digital forensics in the cloud. 2012 International conference on cyber-enabled distributed computing and knowledge discovery (CyberC). 2012:111–116.10.1109/CyberC.2012.26
- Dykstra J, Sherman AT. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digit Invest. 2012;9(SUPPL.):S90–S98.10.1016/j.diin.2012.05.001
- Grispos G, Glisson WB, Storer T. Using smartphones as a proxy for forensic evidence contained in cloud storage services. IEEE. 2013:4910–4919. Available from: http://ezproxy.upm.edu.my:2078/xpl/articleDetails.jsp?tp=&arnumber=6480436&matchBoolean%3Dtrue%26searchField%3DSearch_All%26queryText%3D%28%28p_Abstract%3Aforensics%29+AND+p_Abstract%3Aios%29
- Martini B, Choo K-KR. Cloud storage forensics: owncloud as a case study. Digit Invest. 2013;10(4):287–299.10.1016/j.diin.2013.08.005
- Wen Y, Man X, Le K, Shi W. Forensics-as-a-Service (FaaS): computer forensic workflow management and processing using cloud. 2013. p. 208–214. Available from: http://www.thinkmind.org/index.php?view=article&articleid=cloud_computing_2013_8_40_20185
- Zawoad S, Dutta AK, Hasan R. SecLaaS: Secure Logging-as-a-Service for cloud forensics. arXiv:1302.6267 [cs]. 2013 Feb 25 [cited 2015 Apr 22]. Available from: http://arxiv.org/abs/1302.6267
- Martini B, Choo K-KR. Remote programmatic vCloud forensics: a six-step collection process and a proof of concept. Proc. 13th IEEE Int’l Conf. Trust, Security and Privacy in Computing and Comm. (TrustCom); 2014. p. 935–942.
- Federici C. Cloud data imager: a unified answer to remote acquisition of cloud storage areas. Digit Invest. 2014;11(1):30–42.10.1016/j.diin.2014.02.002
- Quick D, Choo K-KR. Google drive: forensic analysis of data remnants. J Netw Comput Appl. 2014;40:179–193.10.1016/j.jnca.2013.09.016
- Quick D, Choo K-KR. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Gener Comput Syst. 2013;29(6):1378–1394. (Including Special sections: High Performance Computing in the Cloud & Resource Discovery Mechanisms for P2P Systems).10.1016/j.future.2013.02.001
- Quick D, Choo K-KR. Dropbox analysis: data remnants on user machines. Digit Invest. 2013;10(1):3–18.10.1016/j.diin.2013.02.003
- Martini B, Do Q, Choo K-K R. Conceptual evidence collection and analysis methodology for Android devices. Cloud Secur. Ecosyst. 2015: 285–307. doi:10.1016/B978-0-12-801595-7.00014-8
- Choo K-KR. Organised crime groups in cyberspace: a typology. Trends in Organized Crime. 2008;11(3):270–295.10.1007/s12117-008-9038-9
- Choo K-KR, Smith RG. Criminal exploitation of online systems by organised crime groups. Trends in Organized Crime. 2008;11(3):270–295.10.1007/s12117-008-9038-9
- EDRM File Format Data Set 1.0.1. [cited 2015 Jan 17]. Available from: http://www.edrm.net/resources/data-sets/edrm-file-format-data-set
- Mohtasebi SH, Dehghantanha A. Towards a unified forensic investigation framework of smartphones. Int J Comput Theory Eng. 2013;5(2):351.10.7763/IJCTE.2013.V5.708
- Daryabar F, Dehghantanha A, Udzir NI. Investigation of bypassing malware defences and malware detections. Information Assurance and Security (IAS), 2011 7th International Conference on. IEEE; 2011. p. 173–178. Available from: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=612281510.1109/ISIAS.2011.6122815
- Shaerpour K, Dehghantanha A. Trends in android malware detection. J Digit Forensics, Secur Law. 2013;8(3):21.
- Damshenas M, Dehghantanha A, Mahmoud R, bin Shamsuddin S. Cloud computing and conflicts with digital forensic investigation. Int J Digit Content Technol Appl. 2013;7(9):543.
- Damshenas M, Dehghantanha A, Choo K-KR, Mahmud R. M0Droid: an Android behavioral-based malware detection model. J Inf Privacy Secur. 2015;11(3):141–157.10.1080/15536548.2015.1073510
- Daryabar F, Dehghantanha A, Udzir NI, Sani NF, Shamsuddin S. A survey on privacy impacts of digital investigation. JNIT. 2013;4(8):57.
- Dehghantanha A, Franke K. Privacy-respecting digital investigation. Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on. IEEE; 2014. p. 129–138. Available from: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=689093210.1109/PST.2014.6890932