10.07.2015 Views

dissertation

dissertation

dissertation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[53] ACPO e-crime working group. Good practice guide for computer-basedelectronic evidence.[54] MQP Electronics Ltd. USB made simple. http://www.usbmadesimple.co.uk/, retrieved 2012-06-29, 2008.[55] George Grispos, William Bradley Glisson, and Tim Storer. Using smartphonesas a proxy for forensic evidence contained in cloud storage services.Submitted to the 46th Hawaii International Conference on SystemSciences, 2012.[56] Josh Grunzweig. Defeating Flame string obfuscation with IDAPython.http://blog.spiderlabs.com/2012/06/defeating-flame-stringobfuscation-with-idapython.html,retrieved 2012-07-12, June 2012.[57] Jerry Hildenbrand. Android A to A: Nandroid backup. http://www.androidcentral.com/android-z-nandroid-backup, retrieved2012-07-24, June 2012.[58] Jerry Hildenbrand. What is fastboot? http://www.androidcentral.com/android-z-what-fastboot, retrieved 2012-09-01, January 2012.[59] Jerry Hildenbrand. What is recovery? http://www.androidcentral.com/what-recovery-android-z, retrieved 2012-06-29, February 2012.[60] Andrew Hoog. Android Forensics: Investigation, Analysis and MobileSecurity for Google Android. Elsevier, 2011.[61] Susteen Inc. Secure view. http://www.secureview.us/secureview3,retrieved 2012-06-29.[62] International Telecommunications Union. The world in 2011: ICT factsand figures, October 2011.[63] Wayne Janse and Rick Ayers. Guidelines on cell phone forensics. Recommendationof the National Institute of Standards and TechnologyInformation, NIST Special Publication 800-101, 2007.145

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!