1 |
Namheun Son, "A study of user data integrity during acquisition of Android devices," Digital Investigationm, vol. 10, pp, 3-11, Aug. 2013
DOI
ScienceOn
|
2 |
M.Guido, "Automated identification of installed malicious Android applicatons," vol. 10, Digital Investigation, pp. 96-104, Oct. 2013
DOI
ScienceOn
|
3 |
http://www.appbrain.com/stats/android-market-app-categories
|
4 |
Sohail Khan, "Analysis of Dalvik Virtual Machine and Class Path Library Constrained," Security Engineering Research Group, Institute of Management SciencesPeshawar, Pakistan, Nov. 2009
|
5 |
Timothy Vidas, "Toward a general collection methodology for Android devices," Digital Investigation, vol. 8, pp. 14-24, Aug. 2011
DOI
ScienceOn
|
6 |
Steve Mead, "Unique File Identification in the National Software Reference Library," Digital Investigation, vol. 8, no. 3, pp. 138-150, Sep. 2006
|
7 |
Ralf D. Brown, "Reconstructing corrupt DEFLATEd files," Digital Investigation, vol. 8, pp. 125-131. Aug. 2011
DOI
ScienceOn
|
8 |
Steve Mead, "Unique File Identification in the National Software Reference Library," Digital Investigation, vol. 3, No. 3, pp. 138-150, Sep. 2006
DOI
ScienceOn
|
9 |
Jungheum Park and Hyunji Chung, Sangjin Lee, "Forensic analysis techniques for fragmented flash memory pages in smartphones," Digital Investigation, vol. 9, No. 2, pp. 109-118, Nov. 2012
DOI
ScienceOn
|