Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
On the development of automated forensic analysis methods for mobile devices
Andriotis, Panagiotis; Tryfonas, Theo; Oikonomou, George; Li, Shancang; Tzermias, Zacharias; Xynos, Konstantinos; Read, Huw; Prevelakis, Vassilis
Authors
Theo Tryfonas
George Oikonomou
Shancang Li Shancang.Li@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Zacharias Tzermias
Konstantinos Xynos
Huw Read
Vassilis Prevelakis
Contributors
Thorsten Holz
Editor
Sotiris Ioannidis
Editor
Abstract
We live in a connected world where mobile devices are used by humans as valuable tools. The use of mobile devices leaves traces that can be treasured assets for a forensic analyst. Our aim is to investigate methods and exercise techniques that will merge all these valuable information in a way that will be efficient for a forensic analyst, producing graphical representations of the underlying data structures. We are using a framework able to collect and merge data from various sources and employ algorithms from a wide range of interdisciplinary areas to automate post-incident forensic analysis on mobile devices. © 2014 Springer International Publishing.
Citation
Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., …Prevelakis, V. (2014). On the development of automated forensic analysis methods for mobile devices. Lecture Notes in Artificial Intelligence, 8564 LNCS, 212-213. https://doi.org/10.1007/978-3-319-08593-7_17
Journal Article Type | Conference Paper |
---|---|
Acceptance Date | Jun 30, 2014 |
Publication Date | Jan 1, 2014 |
Journal | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Print ISSN | 0302-9743 |
Electronic ISSN | 1611-3349 |
Publisher | Springer Verlag |
Peer Reviewed | Peer Reviewed |
Volume | 8564 LNCS |
Pages | 212-213 |
Book Title | Trust and Trustworthy Computing |
DOI | https://doi.org/10.1007/978-3-319-08593-7_17 |
Keywords | steganalysis, smartphone, sentiment analysis, post-incident, SMS, social media, forensics, Android |
Public URL | https://uwe-repository.worktribe.com/output/822847 |
Publisher URL | http://dx.doi.org/10.1007/978-3-319-08593-7_17 |
Additional Information | Title of Conference or Conference Proceedings : 7th International Conference, TRUST 2014 |
You might also like
Bu-Dash: A universal and dynamic graphical password scheme
(2022)
Conference Proceeding
Feature vulnerability and robustness assessment against adversarial machine learning attacks
(2021)
Conference Proceeding
To allow, or deny? That is the question
(2020)
Conference Proceeding
Dataset: To Allow, or Deny? That is the Question
(2019)
Dataset
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search