Husain MI, Baggili I, Sridhar R (2010) A simple cost-effective framework for iphone forensic analysis. (2013) A critical review of 7 years of mobile device forensics. 2013 Information Security for South Africa, 1-8.īarmpatsalou K, Damopoulos D, Kambourakis G, et al. doi: 10.1007/s11232-5Īl Fahdi M, Clarke NL, Furnell SM (2013) Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. (2020) Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues. Waldrop MM (2016) The chips are down for moore's law. Jackson W (2014) Can digital forensics keep up with smartphone tech. Ferrag MA, Maglaras L, Derhab A (2019) Authentication and authorization for mobile iot devices using biofeatures: Recent advances and future trends.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |