[
    {
        "key": "QIU482AP",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/QIU482AP",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/QIU482AP",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Willassen",
            "parsedDate": "2005-01-01",
            "numChildren": 0
        },
        "data": {
            "key": "QIU482AP",
            "version": 7,
            "itemType": "bookSection",
            "title": "Forensic Analysis of Mobile Phone Internal Memory",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Svein",
                    "lastName": "Willassen"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Mark",
                    "lastName": "Pollitt"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Sujeet",
                    "lastName": "Shenoi"
                }
            ],
            "abstractNote": "Modern mobile phones store data in SIM cards, internal memory and external flash memory. With advanced functionality such as multimedia messaging becoming common, increasing amounts of information are now stored in internal memory. However, the forensic analysis of internal memory, including the recovery of deleted items, has been largely ignored. This paper presents two methods for imaging the internal memory of mobile phones. The methods are applied on several popular models to recover information, including deleted text messages.",
            "bookTitle": "Advances in Digital Forensics",
            "series": "IFIP — The International Federation for Information Processing",
            "seriesNumber": "194",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2005/01/01",
            "publisher": "Springer US",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "191-204",
            "ISBN": "978-0-387-30012-2, 978-0-387-31163-0",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/0-387-31163-7_16",
            "accessDate": "2013-05-18T20:51:01Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "©2005 International Federation for Information Processing",
            "extra": "",
            "tags": [
                {
                    "tag": "Computer Appl. in Social and Behavioral Sciences",
                    "type": 1
                },
                {
                    "tag": "Computer Science, general",
                    "type": 1
                },
                {
                    "tag": "Computer Systems Organization and Communication Networks",
                    "type": 1
                },
                {
                    "tag": "Computers and Society",
                    "type": 1
                },
                {
                    "tag": "Data Structures, Cryptology and Information Theory",
                    "type": 1
                },
                {
                    "tag": "Information Storage and Retrieval",
                    "type": 1
                },
                {
                    "tag": "digital evidence",
                    "type": 1
                },
                {
                    "tag": "internal memory",
                    "type": 1
                },
                {
                    "tag": "mobile phones",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "T4HV8M6P",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/T4HV8M6P",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/T4HV8M6P",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Naccache",
            "parsedDate": "2006-01-01",
            "numChildren": 0
        },
        "data": {
            "key": "T4HV8M6P",
            "version": 7,
            "itemType": "bookSection",
            "title": "National Security, Forensics and Mobile Communications",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "David",
                    "lastName": "Naccache"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Dong Ho",
                    "lastName": "Won"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Seungjoo",
                    "lastName": "Kim"
                }
            ],
            "abstractNote": "There are nearly 1.5 billion handset users in the world. As the recent attacks in London illustrate, this proliferation of inexpensive mobile phones provides criminals and terrorists with flexible communication means. In this talk we will describe the forensic methodology used for analysing SIM cards and handsets within the French legal context. We will describe specific technical problems applicable to the analysis of cards (e.g., the impossibility to interact with a SIM without altering its internal state), underline seizure details, demonstrate the tools allowing to extract the contents of a handset and a SIM knowing their associated PIN codes. We will overview some of the “heavy” analysis methods (physical reverse-engineering) used with various degrees of success when PIN codes are unknown and describe the protocol allowing to negotiate with the judiciary authorities an evidence destruction risk before undertaking the actual analysis of the SIMs and handsets.",
            "bookTitle": "Information Security and Cryptology - ICISC 2005",
            "series": "Lecture Notes in Computer Science",
            "seriesNumber": "3935",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2006/01/01",
            "publisher": "Springer Berlin Heidelberg",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "1-1",
            "ISBN": "978-3-540-33354-8, 978-3-540-33355-5",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/11734727_1",
            "accessDate": "2013-05-18T20:50:23Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "©2006 Springer Berlin Heidelberg",
            "extra": "",
            "tags": [
                {
                    "tag": "Algorithm Analysis and Problem Complexity",
                    "type": 1
                },
                {
                    "tag": "Computer Communication Networks",
                    "type": 1
                },
                {
                    "tag": "Data Encryption",
                    "type": 1
                },
                {
                    "tag": "Discrete Mathematics in Computer Science",
                    "type": 1
                },
                {
                    "tag": "Management of Computing and Information Systems",
                    "type": 1
                },
                {
                    "tag": "Operating Systems",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "ZQ8WD69J",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/ZQ8WD69J",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/ZQ8WD69J",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Jahankhani and Azam",
            "parsedDate": "2007-01-01",
            "numChildren": 0
        },
        "data": {
            "key": "ZQ8WD69J",
            "version": 7,
            "itemType": "bookSection",
            "title": "Review of Forensic Tools for Smartphones",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Hamid",
                    "lastName": "Jahankhani"
                },
                {
                    "creatorType": "author",
                    "firstName": "Amir",
                    "lastName": "Azam"
                }
            ],
            "abstractNote": "The technological capability of mobile devices in particular Smartphones makes their use of value to the criminal community as a data terminal in the facilitation of organised crime or terrorism. The effective targeting of these devices from criminal and security intelligence perspectives and subsequent detailed forensic examination of the targeted device will significantly enhance the evidence available to the law enforcement community. When phone devices are involved in crimes, forensic examiners require tools that allow the proper retrieval and prompt examination of information present on these devices. Smartphones that are compliant to Global System for Mobile Communication (GSM) standards, will maintains their identity and user’s personal information on Subscriber Identity Module (SIM). Beside SIM cards, substantial amount of information is stored on device’s internal memory and external memory modules. The aim of this paper is to give an overview of the currently available forensic software tools that are developed to carry out forensic investigation of mobile devices and point to current weaknesses within this process.",
            "bookTitle": "EC2ND 2006",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2007/01/01",
            "publisher": "Springer London",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "69-84",
            "ISBN": "978-1-84628-749-7, 978-1-84628-750-3",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/978-1-84628-750-3_8",
            "accessDate": "2013-05-18T20:49:52Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "©2007 Springer-Verlag London",
            "extra": "",
            "tags": [
                {
                    "tag": "Computer Communication Networks",
                    "type": 1
                },
                {
                    "tag": "Information Storage and Retrieval",
                    "type": 1
                },
                {
                    "tag": "Information Systems Applications (incl.Internet)",
                    "type": 1
                },
                {
                    "tag": "Legal Aspects of Computing",
                    "type": 1
                },
                {
                    "tag": "Management of Computing and Information Systems",
                    "type": 1
                },
                {
                    "tag": "PDA",
                    "type": 1
                },
                {
                    "tag": "SIM",
                    "type": 1
                },
                {
                    "tag": "Smartphones",
                    "type": 1
                },
                {
                    "tag": "USIM",
                    "type": 1
                },
                {
                    "tag": "digital forensics tools",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "JVWXWJAF",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/JVWXWJAF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/JVWXWJAF",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Chin et al.",
            "parsedDate": "2012",
            "numChildren": 0
        },
        "data": {
            "key": "JVWXWJAF",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "Measuring user confidence in smartphone security and privacy",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Erika",
                    "lastName": "Chin"
                },
                {
                    "creatorType": "author",
                    "firstName": "Adrienne Porter",
                    "lastName": "Felt"
                },
                {
                    "creatorType": "author",
                    "firstName": "Vyas",
                    "lastName": "Sekar"
                },
                {
                    "creatorType": "author",
                    "firstName": "David",
                    "lastName": "Wagner"
                }
            ],
            "abstractNote": "In order to direct and build an effective, secure mobile ecosystem, we must first understand user attitudes toward security and privacy for smartphones and how they may differ from attitudes toward more traditional computing systems. What are users' comfort levels in performing different tasks? How do users select applications? What are their overall perceptions of the platform? This understanding will help inform the design of more secure smartphones that will enable users to safely and confidently benefit from the potential and convenience offered by mobile platforms. To gain insight into user perceptions of smartphone security and installation habits, we conduct a user study involving 60 smartphone users. First, we interview users about their willingness to perform certain tasks on their smartphones to test the hypothesis that people currently avoid using their phones due to privacy and security concerns. Second, we analyze why and how they select applications, which provides information about how users decide to trust applications. Based on our findings, we present recommendations and opportunities for services that will help users safely and confidently use mobile applications and platforms.",
            "proceedingsTitle": "Proceedings of the Eighth Symposium on Usable Privacy and Security",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2012",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "1:1–1:16",
            "series": "SOUPS '12",
            "seriesNumber": "",
            "DOI": "10.1145/2335356.2335358",
            "ISBN": "978-1-4503-1532-6",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/2335356.2335358",
            "accessDate": "2013-05-18T20:36:48Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Smartphones",
                    "type": 1
                },
                {
                    "tag": "application installation",
                    "type": 1
                },
                {
                    "tag": "laptop usage",
                    "type": 1
                },
                {
                    "tag": "mobile phone usage",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "ZANGZADD",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/ZANGZADD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/ZANGZADD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Tso et al.",
            "parsedDate": "2012",
            "numChildren": 0
        },
        "data": {
            "key": "ZANGZADD",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "iPhone social networking for evidence investigations using iTunes forensics",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Yu-Cheng",
                    "lastName": "Tso"
                },
                {
                    "creatorType": "author",
                    "firstName": "Shiuh-Jeng",
                    "lastName": "Wang"
                },
                {
                    "creatorType": "author",
                    "firstName": "Cheng-Ta",
                    "lastName": "Huang"
                },
                {
                    "creatorType": "author",
                    "firstName": "Wei-Jen",
                    "lastName": "Wang"
                }
            ],
            "abstractNote": "The smart phone, like a small computer, providing not only the functions of normal phones and wireless Internet access, but also all kinds of application tools, serves as a platform of the sources of real-time information, information sharing and information exchange in our daily lives. As a result, the extract the crucial digital evidence in the smart phone, it has now become a challenge in the technology time. In particular, it is for when the smart phone applications are committed as the illegal contacts. In this paper, we discuss the most five popular mobile social networking applications in iPhone usages. The backup files of social networking applications could offer us the crucial evidence in this paper study. The relative information of social networking applications operated in iPhone is able to be accessed if necessary, even though iPhone has been destructed or encrypted by the suspect. It could help the investigators to exactly reconstruct the crime venue and find the truth.",
            "proceedingsTitle": "Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2012",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "62:1–62:7",
            "series": "ICUIMC '12",
            "seriesNumber": "",
            "DOI": "10.1145/2184751.2184827",
            "ISBN": "978-1-4503-1172-4",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/2184751.2184827",
            "accessDate": "2013-05-18T20:28:12Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "backup file",
                    "type": 1
                },
                {
                    "tag": "iPhone",
                    "type": 1
                },
                {
                    "tag": "iTunes backup",
                    "type": 1
                },
                {
                    "tag": "social networking application",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "SJMMIXWM",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/SJMMIXWM",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/SJMMIXWM",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Iqbal et al.",
            "parsedDate": "2012",
            "numChildren": 0
        },
        "data": {
            "key": "SJMMIXWM",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "A novel method of iDevice (iPhone, iPad, iPod) forensics without jailbreaking",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "B.",
                    "lastName": "Iqbal"
                },
                {
                    "creatorType": "author",
                    "firstName": "A.",
                    "lastName": "Iqbal"
                },
                {
                    "creatorType": "author",
                    "firstName": "H.A.",
                    "lastName": "Obaidli"
                }
            ],
            "abstractNote": "With boom in mobility technology sector, a new generation of computing devices such as iPhone/iPad/iPod have emerged and immersed itself in the lives of millions and millions of people. With its widespread its fair to say that the use of these devices has created a new source of digital evidence and a need for a fast and trusted method to image and analyze the data has emerged. In this paper we will discuss a novel method that we have developed to create an image of the iDevice (iPhone, iPad, iPod) in a secure and fast manner within 30 minutes or less without jailbreaking compared to the fastest current method which takes up to 20 hours.",
            "proceedingsTitle": "2012 International Conference on Innovations in Information Technology (IIT)",
            "conferenceName": "2012 International Conference on Innovations in Information Technology (IIT)",
            "publisher": "",
            "place": "",
            "date": "2012",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "238-243",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.1109/INNOVATIONS.2012.6207740",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "IEEE Xplore",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Apple",
                    "type": 1
                },
                {
                    "tag": "Arrays",
                    "type": 1
                },
                {
                    "tag": "Forensics",
                    "type": 1
                },
                {
                    "tag": "IPhone forensics",
                    "type": 1
                },
                {
                    "tag": "Imaging",
                    "type": 1
                },
                {
                    "tag": "Mobile communication",
                    "type": 1
                },
                {
                    "tag": "Portable media players",
                    "type": 1
                },
                {
                    "tag": "Reactive power",
                    "type": 1
                },
                {
                    "tag": "Workstations",
                    "type": 1
                },
                {
                    "tag": "computer forensics",
                    "type": 1
                },
                {
                    "tag": "computing devices",
                    "type": 1
                },
                {
                    "tag": "cybercrime",
                    "type": 1
                },
                {
                    "tag": "data acquisition",
                    "type": 1
                },
                {
                    "tag": "data analysis",
                    "type": 1
                },
                {
                    "tag": "digital evidence",
                    "type": 1
                },
                {
                    "tag": "digital investigation",
                    "type": 1
                },
                {
                    "tag": "iDevice forensics",
                    "type": 1
                },
                {
                    "tag": "iPad",
                    "type": 1
                },
                {
                    "tag": "iPad forensics",
                    "type": 1
                },
                {
                    "tag": "iPhone",
                    "type": 1
                },
                {
                    "tag": "iPod",
                    "type": 1
                },
                {
                    "tag": "iPod forensics",
                    "type": 1
                },
                {
                    "tag": "image creation",
                    "type": 1
                },
                {
                    "tag": "image processing",
                    "type": 1
                },
                {
                    "tag": "mobility technology sector",
                    "type": 1
                },
                {
                    "tag": "smart phones",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "V48MHWMD",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/V48MHWMD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/V48MHWMD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Gómez-Miralles and Arnedo-Moreno",
            "parsedDate": "2012",
            "numChildren": 0
        },
        "data": {
            "key": "V48MHWMD",
            "version": 7,
            "itemType": "journalArticle",
            "title": "Versatile iPad forensic acquisition using the Apple Camera Connection Kit",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Luis",
                    "lastName": "Gómez-Miralles"
                },
                {
                    "creatorType": "author",
                    "firstName": "Joan",
                    "lastName": "Arnedo-Moreno"
                }
            ],
            "abstractNote": "The Apple iPad is a popular tablet device presented by Apple in early 2010. The idiosyncracies of this new portable device and the kind of data it may store open new opportunities in the field of computer forensics. Given that its design, both internal and external, is very similar to the iPhone, the current easiest way to obtain a forensic image is to install an SSH server and some tools, dump its internal storage and transfer it to a remote host via wireless networking. This approach may require up to 20 hours. In this paper, we present a novel approach that takes advantage of an undocumented feature so that it is possible to use a cheap iPad accessory, the Camera Connection Kit, to image the disk to an external hard drive attached via USB connection, greatly reducing the required time.",
            "publicationTitle": "Computers & Mathematics with Applications",
            "publisher": "",
            "place": "",
            "date": "Enero 2012",
            "volume": "63",
            "issue": "2",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "544-553",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Computers & Mathematics with Applications",
            "DOI": "10.1016/j.camwa.2011.09.053",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S0898122111008315",
            "accessDate": "2013-05-18T20:54:54Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0898-1221",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Advances in context, cognitive, and secure computing",
            "language": "",
            "libraryCatalog": "ScienceDirect",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Apple",
                    "type": 1
                },
                {
                    "tag": "Forensics",
                    "type": 1
                },
                {
                    "tag": "cybercrime",
                    "type": 1
                },
                {
                    "tag": "digital investigation",
                    "type": 1
                },
                {
                    "tag": "iPad",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "THSQJITV",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/THSQJITV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/THSQJITV",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Al Mutawa et al.",
            "parsedDate": "2012",
            "numChildren": 0
        },
        "data": {
            "key": "THSQJITV",
            "version": 7,
            "itemType": "journalArticle",
            "title": "Forensic analysis of social networking applications on mobile devices",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Noora",
                    "lastName": "Al Mutawa"
                },
                {
                    "creatorType": "author",
                    "firstName": "Ibrahim",
                    "lastName": "Baggili"
                },
                {
                    "creatorType": "author",
                    "firstName": "Andrew",
                    "lastName": "Marrington"
                }
            ],
            "abstractNote": "The increased use of social networking applications on smartphones makes these devices a goldmine for forensic investigators. Potential evidence can be held on these devices and recovered with the right tools and examination methods. This paper focuses on conducting forensic analyses on three widely used social networking applications on smartphones: Facebook, Twitter, and MySpace. The tests were conducted on three popular smartphones: BlackBerrys, iPhones, and Android phones. The tests consisted of installing the social networking applications on each device, conducting common user activities through each application, acquiring a forensically sound logical image of each device, and performing manual forensic analysis on each acquired logical image. The forensic analyses were aimed at determining whether activities conducted through these applications were stored on the device's internal memory. If so, the extent, significance, and location of the data that could be found and retrieved from the logical image of each device were determined. The results show that no traces could be recovered from BlackBerry devices. However, iPhones and Android phones store a significant amount of valuable data that could be recovered and used by forensic investigators.",
            "publicationTitle": "Digital Investigation",
            "publisher": "",
            "place": "",
            "date": "Agosto 2012",
            "volume": "9, Supplement",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "S24-S33",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Digital Investigation",
            "DOI": "10.1016/j.diin.2012.05.007",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S1742287612000321",
            "accessDate": "2013-05-18T20:54:21Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1742-2876",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "The Proceedings of the Twelfth Annual DFRWS Conference 12th Annual Digital Forensics Research Conference",
            "language": "",
            "libraryCatalog": "ScienceDirect",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Blackberry",
                    "type": 1
                },
                {
                    "tag": "Mobile device forensics",
                    "type": 1
                },
                {
                    "tag": "Social Networking",
                    "type": 1
                },
                {
                    "tag": "android",
                    "type": 1
                },
                {
                    "tag": "iPhone",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "D6HMTAMZ",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/D6HMTAMZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/D6HMTAMZ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Chung et al.",
            "parsedDate": "2012-11",
            "numChildren": 0
        },
        "data": {
            "key": "D6HMTAMZ",
            "version": 7,
            "itemType": "journalArticle",
            "title": "Digital forensic investigation of cloud storage services",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Hyunji",
                    "lastName": "Chung"
                },
                {
                    "creatorType": "author",
                    "firstName": "Jungheum",
                    "lastName": "Park"
                },
                {
                    "creatorType": "author",
                    "firstName": "Sangjin",
                    "lastName": "Lee"
                },
                {
                    "creatorType": "author",
                    "firstName": "Cheulhoon",
                    "lastName": "Kang"
                }
            ],
            "abstractNote": "The demand for cloud computing is increasing because of the popularity of digital devices and the wide use of the Internet. Among cloud computing services, most consumers use cloud storage services that provide mass storage. This is because these services give them various additional functions as well as storage. It is easy to access cloud storage services using smartphones. With increasing utilization, it is possible for malicious users to abuse cloud storage services. Therefore, a study on digital forensic investigation of cloud storage services is necessary. This paper proposes new procedure for investigating and analyzing the artifacts of all accessible devices, such as Windows system, Mac system, iPhone, and Android smartphone.",
            "publicationTitle": "Digital Investigation",
            "publisher": "",
            "place": "",
            "date": "Noviembre 2012",
            "volume": "9",
            "issue": "2",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "81-95",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Digital Investigation",
            "DOI": "10.1016/j.diin.2012.05.015",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S1742287612000400",
            "accessDate": "2013-05-18T20:53:48Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1742-2876",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ScienceDirect",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Artifacts",
                    "type": 1
                },
                {
                    "tag": "Cloud storage services",
                    "type": 1
                },
                {
                    "tag": "Mac system",
                    "type": 1
                },
                {
                    "tag": "Windows system",
                    "type": 1
                },
                {
                    "tag": "android",
                    "type": 1
                },
                {
                    "tag": "digital forensics",
                    "type": 1
                },
                {
                    "tag": "iOS",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "QHTHUDDE",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/QHTHUDDE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/QHTHUDDE",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Ahmed and Dharaskar",
            "parsedDate": "2009-01-01",
            "numChildren": 0
        },
        "data": {
            "key": "QHTHUDDE",
            "version": 7,
            "itemType": "bookSection",
            "title": "Mobile Forensics: An Introduction from Indian Law Enforcement Perspective",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Rizwan",
                    "lastName": "Ahmed"
                },
                {
                    "creatorType": "author",
                    "firstName": "Rajiv V.",
                    "lastName": "Dharaskar"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Sushil K.",
                    "lastName": "Prasad"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Susmi",
                    "lastName": "Routray"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Reema",
                    "lastName": "Khurana"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Sartaj",
                    "lastName": "Sahni"
                }
            ],
            "abstractNote": "Mobile phone proliferation in our societies is on the increase. Advances in semiconductor technologies related to mobile phones and the increase of computing power of mobile phones led to an increase of functionality of mobile phones while keeping the size of such devices small enough to fit in a pocket. This led mobile phones to become portable data carriers. This in turn increased the potential for data stored on mobile phone handsets to be used as evidence in civil or criminal cases. This paper examines the nature of some of the newer pieces of information that can become potential evidence on mobile phones. It also highlights some of the weaknesses of mobile forensic toolkits and procedures. Finally, the paper shows the need for more in depth examination of mobile phone evidence.",
            "bookTitle": "Information Systems, Technology and Management",
            "series": "Communications in Computer and Information Science",
            "seriesNumber": "31",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2009/01/01",
            "publisher": "Springer Berlin Heidelberg",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "173-184",
            "ISBN": "978-3-642-00404-9, 978-3-642-00405-6",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/978-3-642-00405-6_21",
            "accessDate": "2013-05-18T20:50:36Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Mobile Forensics",
            "language": "",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "©2009 Springer Berlin Heidelberg",
            "extra": "",
            "tags": [
                {
                    "tag": "Computer Systems Organization and Communication Networks",
                    "type": 1
                },
                {
                    "tag": "Data Encryption",
                    "type": 1
                },
                {
                    "tag": "Data Mining and Knowledge Discovery",
                    "type": 1
                },
                {
                    "tag": "Digital device Forensics",
                    "type": 1
                },
                {
                    "tag": "Management of Computing and Information Systems",
                    "type": 1
                },
                {
                    "tag": "Mobile Forensics toolkits",
                    "type": 1
                },
                {
                    "tag": "Mobile Phone evidence",
                    "type": 1
                },
                {
                    "tag": "Multimedia Information Systems",
                    "type": 1
                },
                {
                    "tag": "Software Engineering/Programming and Operating Systems",
                    "type": 1
                },
                {
                    "tag": "mobile forensics",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "XBWR7T6J",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/XBWR7T6J",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/XBWR7T6J",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Park et al.",
            "parsedDate": "2012-08-01",
            "numChildren": 0
        },
        "data": {
            "key": "XBWR7T6J",
            "version": 7,
            "itemType": "journalArticle",
            "title": "Guest editorial: Theme issue on smartphone applications and services for pervasive computing",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "James J. (Jong Hyuk)",
                    "lastName": "Park"
                },
                {
                    "creatorType": "author",
                    "firstName": "Han-Chieh",
                    "lastName": "Chao"
                },
                {
                    "creatorType": "author",
                    "firstName": "Taeshik",
                    "lastName": "Shon"
                },
                {
                    "creatorType": "author",
                    "firstName": "Mieso",
                    "lastName": "Denko"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Personal and Ubiquitous Computing",
            "publisher": "",
            "place": "",
            "date": "2012/08/01",
            "volume": "16",
            "issue": "6",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "611-612",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Pers Ubiquit Comput",
            "DOI": "10.1007/s00779-011-0429-6",
            "citationKey": "",
            "url": "http://link.springer.com/article/10.1007/s00779-011-0429-6",
            "accessDate": "2013-05-18T20:49:32Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1617-4909, 1617-4917",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Guest editorial",
            "language": "en",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Computer Science, general",
                    "type": 1
                },
                {
                    "tag": "Personal Computing",
                    "type": 1
                },
                {
                    "tag": "User Interfaces and Human Computer Interaction",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "83ZZPGMP",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/83ZZPGMP",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/83ZZPGMP",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Chu et al.",
            "parsedDate": "2011-07-01",
            "numChildren": 0
        },
        "data": {
            "key": "83ZZPGMP",
            "version": 7,
            "itemType": "journalArticle",
            "title": "Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Hai-Cheng",
                    "lastName": "Chu"
                },
                {
                    "creatorType": "author",
                    "firstName": "Der-Jiunn",
                    "lastName": "Deng"
                },
                {
                    "creatorType": "author",
                    "firstName": "Han-Chieh",
                    "lastName": "Chao"
                }
            ],
            "abstractNote": "Cyberterrorism has become a hotly debated research issue in the past decades because of the convergence of mobile computing powers and the fledging multimedia communication computing capabilities. Cyberterrorism is the exploitation of computer network tools to incur malfunction or shut down critical infrastructures with several keyboard punches, which is dramatically different from traditional terrorism. Due to the ubiquitous multimedia communication tools, they have radically transformed the ways concerning data transmission. Unfortunately, it also incurs unprecedented opportunities for committing cyber crimes that we were not able to foresee two decades ago. Undoubtedly, the mushrooming proliferation of mobile phones spectacularly triggers the information security leakage while most people heavily rely on mobile phones for daily communication. As cybercrime or cyberterrorism surges, digital forensics (DF) of mobile communication devices still enormously lags behind than computer forensics. Hence, in this research paper, we provide a hypothetical case review concerning the DF of a potential cyberterrorist attack that was triggered by a mobile multimedia smart phone utilizing a popular web 2.0 application program via ubiquitous Wi-Fi access points. The corresponding DF of the mobile device was conducted in a step-by-step manner as well as the crime scene reconstruction based on the digital evidence collected, analyzed, and preserved.",
            "publicationTitle": "Multimedia Systems",
            "publisher": "",
            "place": "",
            "date": "2011/07/01",
            "volume": "17",
            "issue": "4",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "341-349",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Multimedia Systems",
            "DOI": "10.1007/s00530-010-0216-7",
            "citationKey": "",
            "url": "http://link.springer.com/article/10.1007/s00530-010-0216-7",
            "accessDate": "2013-05-18T20:46:15Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0942-4962, 1432-1882",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Computer Communication Networks",
                    "type": 1
                },
                {
                    "tag": "Computer Graphics",
                    "type": 1
                },
                {
                    "tag": "Cyberterrorism",
                    "type": 1
                },
                {
                    "tag": "Data Encryption",
                    "type": 1
                },
                {
                    "tag": "Data Storage Representation",
                    "type": 1
                },
                {
                    "tag": "Mobile multimedia computing and embedded systems",
                    "type": 1
                },
                {
                    "tag": "Multimedia Information Systems",
                    "type": 1
                },
                {
                    "tag": "Operating Systems",
                    "type": 1
                },
                {
                    "tag": "Web 2.0",
                    "type": 1
                },
                {
                    "tag": "digital forensics",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "2DCP46ME",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/2DCP46ME",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/2DCP46ME",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Pollitt",
            "parsedDate": "2009-01-01",
            "numChildren": 0
        },
        "data": {
            "key": "2DCP46ME",
            "version": 7,
            "itemType": "bookSection",
            "title": "Digital Forensics as a Surreal Narrative",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Mark",
                    "lastName": "Pollitt"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Gilbert",
                    "lastName": "Peterson"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Sujeet",
                    "lastName": "Shenoi"
                }
            ],
            "abstractNote": "Digital forensics is traditionally approached either as a computer science problem or as an investigative problem. In both cases, the goal is usually the same: attempt to locate discrete pieces of information that are probative. In the computer science approach, characteristics of the data are utilized to include or exclude objects, data or metadata. The investigative approach reviews the content of the evidence to interpret the data in the light of known facts and elements of the crime in order to determine probative information or information of lead value. This paper explores two literary theories, narrative theory and surrealism, for potential application to the digital forensic process. Narrative theory focuses on the “story” that is represented by text. At some level, a storage device may be viewed as a series of interweaving, possibly multi-dimensional, narratives. Furthermore, the narratives themselves, coupled with the metadata from the file system and applications, may form a meta-narrative. The literary theory of surrealism, the notion of disjointed elements, can be utilized to derive meaning from forensic evidence. This paper uses a technique known as surrealist games to illustrate the point.",
            "bookTitle": "Advances in Digital Forensics V",
            "series": "IFIP Advances in Information and Communication Technology",
            "seriesNumber": "306",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2009/01/01",
            "publisher": "Springer Berlin Heidelberg",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "3-15",
            "ISBN": "978-3-642-04154-9, 978-3-642-04155-6",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/978-3-642-04155-6_1",
            "accessDate": "2013-05-18T20:45:39Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "©2009 Springer Berlin Heidelberg",
            "extra": "",
            "tags": [
                {
                    "tag": "Computation by Abstract Devices",
                    "type": 1
                },
                {
                    "tag": "Data Mining and Knowledge Discovery",
                    "type": 1
                },
                {
                    "tag": "Data Structures",
                    "type": 1
                },
                {
                    "tag": "Information Systems and Communication Service",
                    "type": 1
                },
                {
                    "tag": "Legal Aspects of Computing",
                    "type": 1
                },
                {
                    "tag": "Pattern Recognition",
                    "type": 1
                },
                {
                    "tag": "digital forensics",
                    "type": 1
                },
                {
                    "tag": "narratology",
                    "type": 1
                },
                {
                    "tag": "surrealism",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "MAU4XXEM",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/MAU4XXEM",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/MAU4XXEM",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Liu et al.",
            "numChildren": 0
        },
        "data": {
            "key": "MAU4XXEM",
            "version": 7,
            "itemType": "journalArticle",
            "title": "Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Qingzhong",
                    "lastName": "Liu"
                },
                {
                    "creatorType": "author",
                    "firstName": "Peter A.",
                    "lastName": "Cooper"
                },
                {
                    "creatorType": "author",
                    "firstName": "Lei",
                    "lastName": "Chen"
                },
                {
                    "creatorType": "author",
                    "firstName": "Hyuk",
                    "lastName": "Cho"
                },
                {
                    "creatorType": "author",
                    "firstName": "Zhongxue",
                    "lastName": "Chen"
                },
                {
                    "creatorType": "author",
                    "firstName": "Mengyu",
                    "lastName": "Qiao"
                },
                {
                    "creatorType": "author",
                    "firstName": "Yuting",
                    "lastName": "Su"
                },
                {
                    "creatorType": "author",
                    "firstName": "Mingzhen",
                    "lastName": "Wei"
                },
                {
                    "creatorType": "author",
                    "firstName": "Andrew H.",
                    "lastName": "Sung"
                }
            ],
            "abstractNote": "Digital multimedia forensics is an emerging field that has important applications in law enforcement and protection of public safety and national security. In digital imaging, JPEG is the most popular lossy compression standard and JPEG images are ubiquitous. Today’s digital techniques make it easy to tamper JPEG images without leaving any visible clues. Furthermore, most image tampering involves JPEG double compression, it heightens the need for accurate analysis of JPEG double compression in image forensics. In this paper, to improve the detection of JPEG double compression, we transplant the neighboring joint density features, which were designed for JPEG steganalysis, and merge the joint density features with marginal density features in DCT domain as the detector for learning classifiers. Experimental results indicate that the proposed method improves the detection performance. We also study the relationship among compression factor, image complexity, and detection accuracy, which has not been comprehensively analyzed before. The results show that a complete evaluation of the detection performance of different algorithms should necessarily include image complexity as well as the double compression quality factor. In addition to JPEG double compression, the identification of image capture source is an interesting topic in image forensics. Mobile handsets are widely used for spontaneous photo capture because they are typically carried by their users at all times. In the imaging device market, smartphone adoption is currently exploding and megapixel smartphones pose a threat to the traditional digital cameras. While smartphone images are widely disseminated, the manipulation of images is also easily performed with various photo editing tools. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. Following the success of our previous work in JPEG double compression detection, we conducted a study to identify smartphone source and post-capture manipulation by utilizing marginal density and neighboring joint density features together. Experimental results show that our method is highly promising for identifying both smartphone source and manipulations. Finally, our study also indicates that applying unsupervised clustering and supervised classification together leads to improvement in identifying smartphone sources and manipulations and thus provides a means to address the complexity issue of the intentional post-capture manipulation on smartphone images.",
            "publicationTitle": "Applied Intelligence",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "1-22",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Appl Intell",
            "DOI": "10.1007/s10489-013-0430-z",
            "citationKey": "",
            "url": "http://link.springer.com/article/10.1007/s10489-013-0430-z",
            "accessDate": "2013-05-18T20:45:01Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0924-669X, 1573-7497",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Artificial Intelligence (incl. Robotics)",
                    "type": 1
                },
                {
                    "tag": "Image complexity",
                    "type": 1
                },
                {
                    "tag": "JPEG double compression",
                    "type": 1
                },
                {
                    "tag": "Manufacturing, Machines, Tools",
                    "type": 1
                },
                {
                    "tag": "Marginal density",
                    "type": 1
                },
                {
                    "tag": "Mechanical Engineering",
                    "type": 1
                },
                {
                    "tag": "classification",
                    "type": 1
                },
                {
                    "tag": "hierarchical clustering",
                    "type": 1
                },
                {
                    "tag": "image forensics",
                    "type": 1
                },
                {
                    "tag": "neighboring joint density",
                    "type": 1
                },
                {
                    "tag": "smartphone identification",
                    "type": 1
                },
                {
                    "tag": "source",
                    "type": 1
                },
                {
                    "tag": "support vector machine",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "4IIXRF5W",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/4IIXRF5W",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/4IIXRF5W",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Rastogi et al.",
            "parsedDate": "2013",
            "numChildren": 0
        },
        "data": {
            "key": "4IIXRF5W",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "AppsPlayground: automatic security analysis of smartphone applications",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Vaibhav",
                    "lastName": "Rastogi"
                },
                {
                    "creatorType": "author",
                    "firstName": "Yan",
                    "lastName": "Chen"
                },
                {
                    "creatorType": "author",
                    "firstName": "William",
                    "lastName": "Enck"
                }
            ],
            "abstractNote": "Today's smartphone application markets host an ever increasing number of applications. The sheer number of applications makes their review a daunting task. We propose AppsPlayground for Android, a framework that automates the analysis smartphone applications. AppsPlayground integrates multiple components comprising different detection and automatic exploration techniques for this purpose. We evaluated the system using multiple large scale and small scale experiments involving real benign and malicious applications. Our evaluation shows that AppsPlayground is quite effective at automatically detecting privacy leaks and malicious functionality in applications.",
            "proceedingsTitle": "Proceedings of the third ACM conference on Data and application security and privacy",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2013",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "209–220",
            "series": "CODASPY '13",
            "seriesNumber": "",
            "DOI": "10.1145/2435349.2435379",
            "ISBN": "978-1-4503-1890-7",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/2435349.2435379",
            "accessDate": "2013-05-18T20:37:48Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "AppsPlayground",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "android",
                    "type": 1
                },
                {
                    "tag": "dynamic analysis",
                    "type": 1
                },
                {
                    "tag": "malware",
                    "type": 1
                },
                {
                    "tag": "privacy leakage",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "3Q5CDER4",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/3Q5CDER4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/3Q5CDER4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Wilson",
            "parsedDate": "2008",
            "numChildren": 0
        },
        "data": {
            "key": "3Q5CDER4",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "Forensics in cyber-space: the legal challenges",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Nigel",
                    "lastName": "Wilson"
                }
            ],
            "abstractNote": "• The nature and impact of Information and Communication Technologies (ICTs) involve major challenges and opportunities for forensic analysis and legal regulation. The legal challenges for forensic analysis in cyber-space include: • global liability issues; • jurisdiction-based issues; • risk issues; • data and document retention issues; • response and regulatory issues; • independence, objectivity and expertise issues; • commercialization issues; • regulatory and investigation issues; and • human rights issues. The opportunity exists for forensic analysis to play a key role in the regulation of cyber-space and the management of cyber-risk.",
            "proceedingsTitle": "Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop",
            "conferenceName": "",
            "publisher": "ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)",
            "place": "ICST, Brussels, Belgium, Belgium",
            "date": "2008",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "2:1–2:6",
            "series": "e-Forensics '08",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "978-963-9799-19-6",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=1363217.1363220",
            "accessDate": "2013-05-18T20:33:58Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Forensics in cyber-space",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "E7KZSHSP",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/E7KZSHSP",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/E7KZSHSP",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Yates and Chi",
            "parsedDate": "2011",
            "numChildren": 0
        },
        "data": {
            "key": "E7KZSHSP",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "A framework for designing benchmarks of investigating digital forensics tools for mobile devices",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Maynard",
                    "lastName": "Yates"
                },
                {
                    "creatorType": "author",
                    "firstName": "Hongmei",
                    "lastName": "Chi"
                }
            ],
            "abstractNote": "With the continued growth of the mobile device market, the possibility of their use in criminal activity will only continue to increase. While the mobile device market provides a great variety of manufacturers and models causing a strong diversity, it becomes difficult for a professional investigator to choose the proper forensics tools for seizing internal data from mobile devices. Through this paper, we will give a comprehensive perspective of each popular digital forensic tool and initiate discussion towards benchmarking key features and considerations of forensic analysis techniques.",
            "proceedingsTitle": "Proceedings of the 49th Annual Southeast Regional Conference",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2011",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "179–184",
            "series": "ACM-SE '11",
            "seriesNumber": "",
            "DOI": "10.1145/2016039.2016088",
            "ISBN": "978-1-4503-0686-7",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/2016039.2016088",
            "accessDate": "2013-05-18T20:28:41Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Paraben CSI stick",
                    "type": 1
                },
                {
                    "tag": "XRY",
                    "type": 1
                },
                {
                    "tag": "benchmarking",
                    "type": 1
                },
                {
                    "tag": "cell seizure",
                    "type": 1
                },
                {
                    "tag": "digital forensics",
                    "type": 1
                },
                {
                    "tag": "forensics tools",
                    "type": 1
                },
                {
                    "tag": "handheld devices",
                    "type": 1
                },
                {
                    "tag": "mobile devices",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "QTGPPHEK",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/QTGPPHEK",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/QTGPPHEK",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Yates,II",
            "parsedDate": "2010",
            "numChildren": 0
        },
        "data": {
            "key": "QTGPPHEK",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "Practical investigations of digital forensics tools for mobile devices",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Maynard",
                    "lastName": "Yates,II"
                }
            ],
            "abstractNote": "With the continued growth of the mobile device market, the possibility of their use in criminal activity will only continue to increase. While the mobile device market provides a great variety of manufactures and models causing a strong diversity. It becomes difficult for a professional investigator to choose the proper forensics tools for seizing internal data from mobile devices. Through this paper, we will give a comprehensive perspective of each popular digital forensic tool and offer an inside view for investigators to choose their free sources or commercial tools. In addition, a summary for the future direction for forensics tools in mobile devices.",
            "proceedingsTitle": "2010 Information Security Curriculum Development Conference",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2010",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "156–162",
            "series": "InfoSecCD '10",
            "seriesNumber": "",
            "DOI": "10.1145/1940941.1940972",
            "ISBN": "978-1-4503-0202-9",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/1940941.1940972",
            "accessDate": "2013-05-18T20:28:27Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Paraben CSI stick",
                    "type": 1
                },
                {
                    "tag": "XRY",
                    "type": 1
                },
                {
                    "tag": "cell seizure",
                    "type": 1
                },
                {
                    "tag": "digital forensics",
                    "type": 1
                },
                {
                    "tag": "forensics tools",
                    "type": 1
                },
                {
                    "tag": "handheld devices",
                    "type": 1
                },
                {
                    "tag": "mobile devices",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "ID9SPRW4",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/ID9SPRW4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/ID9SPRW4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Dellutri et al.",
            "parsedDate": "2009",
            "numChildren": 0
        },
        "data": {
            "key": "ID9SPRW4",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "Data reverse engineering on a smartphone",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "F.",
                    "lastName": "Dellutri"
                },
                {
                    "creatorType": "author",
                    "firstName": "V.",
                    "lastName": "Ottaviani"
                },
                {
                    "creatorType": "author",
                    "firstName": "D.",
                    "lastName": "Bocci"
                },
                {
                    "creatorType": "author",
                    "firstName": "G.F.",
                    "lastName": "Italiano"
                },
                {
                    "creatorType": "author",
                    "firstName": "Gianluigi",
                    "lastName": "Me"
                }
            ],
            "abstractNote": "In this paper we propose a novel methodology which applies data reverse engineering on a smartphone, which aims at helping the operator to identify in which files the personal information are contained and how to decode them, in order to be converted in a more suitable format. The proposed methodology shows its full potential when applied to mobile operating systems for which data formats are not open or not public. The work in this paper follows the MIAT (Mobile Internal Acquisition Tool) open source tool to support investigation from the data acquisition to the data analysis, but the decoded information can be used to serve other areas beyond mobile forensics.",
            "proceedingsTitle": "International Conference on Ultra Modern Telecommunications Workshops, 2009. ICUMT '09",
            "conferenceName": "International Conference on Ultra Modern Telecommunications Workshops, 2009. ICUMT '09",
            "publisher": "",
            "place": "",
            "date": "2009",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "1-8",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.1109/ICUMT.2009.5345493",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "IEEE Xplore",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Data mining",
                    "type": 1
                },
                {
                    "tag": "Decoding",
                    "type": 1
                },
                {
                    "tag": "File Format",
                    "type": 1
                },
                {
                    "tag": "File systems",
                    "type": 1
                },
                {
                    "tag": "Forensics",
                    "type": 1
                },
                {
                    "tag": "Internet",
                    "type": 1
                },
                {
                    "tag": "Layout",
                    "type": 1
                },
                {
                    "tag": "Smartphones",
                    "type": 1
                },
                {
                    "tag": "Video recording",
                    "type": 1
                },
                {
                    "tag": "data acquisition",
                    "type": 1
                },
                {
                    "tag": "data analysis",
                    "type": 1
                },
                {
                    "tag": "data reverse engineering",
                    "type": 1
                },
                {
                    "tag": "mobile computing",
                    "type": 1
                },
                {
                    "tag": "mobile forensics",
                    "type": 1
                },
                {
                    "tag": "mobile handsets",
                    "type": 1
                },
                {
                    "tag": "mobile internal acquisition tool",
                    "type": 1
                },
                {
                    "tag": "mobile operating systems",
                    "type": 1
                },
                {
                    "tag": "operating systems (computers)",
                    "type": 1
                },
                {
                    "tag": "reverse engineering",
                    "type": 1
                },
                {
                    "tag": "smartphone",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "74N9KBRW",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/74N9KBRW",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/74N9KBRW",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Kubi et al.",
            "parsedDate": "2011",
            "numChildren": 0
        },
        "data": {
            "key": "74N9KBRW",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "Evaluation of some tools for extracting e-evidence from mobile devices",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "A.K.",
                    "lastName": "Kubi"
                },
                {
                    "creatorType": "author",
                    "firstName": "S.",
                    "lastName": "Saleem"
                },
                {
                    "creatorType": "author",
                    "firstName": "O.",
                    "lastName": "Popov"
                }
            ],
            "abstractNote": "In a digital world, even illegal behaviour and/or crimes may be termed as digital. This world is increasing becoming mobile, where the basic computation and communication entities are Small Scale Digital Devices (SSDDs or S2D2s) such as ordinary mobile phones, personal digital assistants, smart phones and tablets. The need to recover data, which might refer to unlawful and unethical activities gave rise to the discipline of mobile forensics, which has become an integral part of digital forensics. Consequently, in the last few years there is an abundance of mobile forensics tools, both commercial and open-source ones, whose vendors and developers make various assertions about the capabilities and the performance of their tools. The complexity and the diversity of both mobile devices and mobile forensics tools, coupled with the volatile nature of the digital evidence and the legal requirements of admissibility makes it difficult for forensics investigators to select the right tool. Hence, we have evaluated UFED Physical Pro 1.1.3.8 and XRY 5.0 following “Smartphone Tool Specifications Standard” developed by NIST, in order to start developing a framework for evaluating and referencing the “goodness” of the mobile forensic tools. The experiments and the results of the research against the core smart phone tool specifications and their associated test findings are presented in such a way that it should make it easier for the prospective mobile forensic examiner select the most adequate tool for a specific case.",
            "proceedingsTitle": "2011 5th International Conference on Application of Information and Communication Technologies (AICT)",
            "conferenceName": "2011 5th International Conference on Application of Information and Communication Technologies (AICT)",
            "publisher": "",
            "place": "",
            "date": "2011",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "1-6",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.1109/ICAICT.2011.6110999",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "IEEE Xplore",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Global Positioning System",
                    "type": 1
                },
                {
                    "tag": "Graphics",
                    "type": 1
                },
                {
                    "tag": "Mobile Device Forensics and tools",
                    "type": 1
                },
                {
                    "tag": "Mobile communication",
                    "type": 1
                },
                {
                    "tag": "Reliability",
                    "type": 1
                },
                {
                    "tag": "Reliability Assurance Level",
                    "type": 1
                },
                {
                    "tag": "SSDD",
                    "type": 1
                },
                {
                    "tag": "Servers",
                    "type": 1
                },
                {
                    "tag": "Smartphone Tool Specifications Standard",
                    "type": 1
                },
                {
                    "tag": "Software",
                    "type": 1
                },
                {
                    "tag": "Telephone sets",
                    "type": 1
                },
                {
                    "tag": "UFED Physical Pro 1.1.3.8",
                    "type": 1
                },
                {
                    "tag": "XRY 5.0",
                    "type": 1
                },
                {
                    "tag": "communication entity",
                    "type": 1
                },
                {
                    "tag": "computer forensics",
                    "type": 1
                },
                {
                    "tag": "crimes",
                    "type": 1
                },
                {
                    "tag": "data recovery",
                    "type": 1
                },
                {
                    "tag": "digital evidence",
                    "type": 1
                },
                {
                    "tag": "digital forensics",
                    "type": 1
                },
                {
                    "tag": "digital world",
                    "type": 1
                },
                {
                    "tag": "e-Evidence",
                    "type": 1
                },
                {
                    "tag": "e-evidence extraction",
                    "type": 1
                },
                {
                    "tag": "illegal behaviour",
                    "type": 1
                },
                {
                    "tag": "law administration",
                    "type": 1
                },
                {
                    "tag": "legal requirements",
                    "type": 1
                },
                {
                    "tag": "mobile computing",
                    "type": 1
                },
                {
                    "tag": "mobile device complexity",
                    "type": 1
                },
                {
                    "tag": "mobile device diversity",
                    "type": 1
                },
                {
                    "tag": "mobile forensics tools",
                    "type": 1
                },
                {
                    "tag": "open-source system",
                    "type": 1
                },
                {
                    "tag": "public domain software",
                    "type": 1
                },
                {
                    "tag": "small scale digital devices",
                    "type": 1
                },
                {
                    "tag": "smart phones",
                    "type": 1
                },
                {
                    "tag": "unethical activity",
                    "type": 1
                },
                {
                    "tag": "unlawful activity",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:55:13Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "VWCAH285",
        "version": 7,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/VWCAH285",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/VWCAH285",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Said et al.",
            "parsedDate": "2011",
            "numChildren": 0
        },
        "data": {
            "key": "VWCAH285",
            "version": 7,
            "itemType": "conferencePaper",
            "title": "IPhone forensics techniques and crime investigation",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "H.",
                    "lastName": "Said"
                },
                {
                    "creatorType": "author",
                    "firstName": "A.",
                    "lastName": "Yousif"
                },
                {
                    "creatorType": "author",
                    "firstName": "H.",
                    "lastName": "Humaid"
                }
            ],
            "abstractNote": "The smart phones are used worldwide due to their enhanced features, computing capabilities, increased storage capacity, attractive touch interface, and the ability to use the Wi-Fi signals. The smart phones have new uploaded features that make them more interesting. These include, sharing video and pictures via social network websites such as, Facebook and Twitter. Due to the large number of people using smart phones, there is a growing concern for electronic crimes. Therefore, the digital forensic of the smart phones has became an essential practice to forensic analyst and security specialists. Investigators found that smart phones are now a significant potential source of digital evidence in criminal investigations. The paper investigates different types of logical backup and encryption techniques used with the smart phones. Different smart phones were examined; examples of these are iPhone 3GS, BlackBerry Bold, and Samsung Omnia II I8000. The paper has also addressed the storage and location of social network data.",
            "proceedingsTitle": "2011 International Conference and Workshop on Current Trends in Information Technology (CTIT)",
            "conferenceName": "2011 International Conference and Workshop on Current Trends in Information Technology (CTIT)",
            "publisher": "",
            "place": "",
            "date": "2011",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "120-125",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.1109/CTIT.2011.6107946",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "IEEE Xplore",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Blackberry Forensics",
                    "type": 1
                },
                {
                    "tag": "Data mining",
                    "type": 1
                },
                {
                    "tag": "Facebook",
                    "type": 1
                },
                {
                    "tag": "Forensics",
                    "type": 1
                },
                {
                    "tag": "IPhone forensics",
                    "type": 1
                },
                {
                    "tag": "Mobile communication",
                    "type": 1
                },
                {
                    "tag": "Reactive power",
                    "type": 1
                },
                {
                    "tag": "Social Networking",
                    "type": 1
                },
                {
                    "tag": "Twitter",
                    "type": 1
                },
                {
                    "tag": "Web sites",
                    "type": 1
                },
                {
                    "tag": "Wi-Fi signals",
                    "type": 1
                },
                {
                    "tag": "computer crime",
                    "type": 1
                },
                {
                    "tag": "computer forensics",
                    "type": 1
                },
                {
                    "tag": "crime investigation",
                    "type": 1
                },
                {
                    "tag": "electronic crimes",
                    "type": 1
                },
                {
                    "tag": "smart phones",
                    "type": 1
                },
                {
                    "tag": "social network",
                    "type": 1
                },
                {
                    "tag": "social networking (online)",
                    "type": 1
                },
                {
                    "tag": "touch interface",
                    "type": 1
                },
                {
                    "tag": "user interfaces",
                    "type": 1
                },
                {
                    "tag": "wireless LAN",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-18T19:24:10Z",
            "dateModified": "2013-05-18T21:05:36Z"
        }
    },
    {
        "key": "47UBPWRR",
        "version": 3,
        "library": {
            "type": "group",
            "id": 168936,
            "name": "Iphone Forensics",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/iphone_forensics",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/168936/items/47UBPWRR",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/iphone_forensics/items/47UBPWRR",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/168936/items/KVE9RMBX",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289032,
                "username": "oguio",
                "name": "Oscar Guio",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/oguio",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "47UBPWRR",
            "version": 3,
            "parentItem": "KVE9RMBX",
            "itemType": "attachment",
            "linkMode": "linked_url",
            "title": "IEEE Xplore Abstract Record",
            "accessDate": "2013-05-18T20:17:07Z",
            "url": "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6110999&queryText%3Dsmartphone+forensics",
            "note": "",
            "contentType": "text/html",
            "charset": "",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-05-18T20:17:07Z",
            "dateModified": "2013-05-18T20:17:07Z"
        }
    }
]