{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:24:09Z","timestamp":1763724249968,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195129"},{"type":"electronic","value":"9783642195136"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_3","type":"book-chapter","created":{"date-parts":[[2011,3,7]],"date-time":"2011-03-07T01:58:50Z","timestamp":1299463130000},"page":"27-37","source":"Crossref","is-referenced-by-count":15,"title":["A Simple Cost-Effective Framework for iPhone Forensic Analysis"],"prefix":"10.1007","author":[{"given":"Mohammad Iftekhar","family":"Husain","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ibrahim","family":"Baggili","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ramalingam","family":"Sridhar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Milanesi, C., Gupta, A., Vergne, H., Sato, A., Nguyen, T., Zimmermann, A., Cozza, R.: Garner Technology Business Research Insight. In: Dataquest Insight: Market Share for Mobile Devices, 1Q09, \n                  \n                    http:\/\/www.gartner.com\/DisplayDocument?id=984612"},{"key":"3_CR2","unstructured":"Radio Tactics Ltd.: Aceso - Mobile forensics wrapped up. In: Radio Tactics | Mobile Phone Forensics, \n                  \n                    http:\/\/www.radio-tactics.com\/products\/aceso\/"},{"key":"3_CR3","unstructured":"Cellebrite Forensics: Cellebrite Mobile Data Synchronization UFED Standard Kit. In: Cellebrite Mobile Data Synchronization, \n                  \n                    http:\/\/www.cellebrite.com\/UFED-Standard-Kit.html"},{"key":"3_CR4","unstructured":"Paraben Corporation: Cell Phone Forensics. In: Paraben Corporation, Cell Phone Forensics Software, \n                  \n                    http:\/\/www.paraben-forensics.com\/cell_models.html"},{"key":"3_CR5","unstructured":"Micro Systemation: XRY Physical Software. In: XRY the complete mobile forensic solution, \n                  \n                    http:\/\/www.msab.com\/products\/xry0\/overview\/page.php"},{"key":"3_CR6","unstructured":"Logicube: Logicube CellDEK Cell Phone Data Extraction. In: Logicube.com, hard drive duplication, copying hard drive & computer forensics, \n                  \n                    http:\/\/www.logicubeforensics.com\/products\/hd_duplication\/celldek.asp"},{"key":"3_CR7","unstructured":"Lohmann, F.: Apple Says iPhone Jailbreaking is Illegal | Electronic Frontier Foundation. In: Electronice Frontier Foundation, Defending Freedom in the Digital World, \n                  \n                    http:\/\/www.eff.org\/deeplinks\/2009\/02\/apple-says-jailbreaking-illegal"},{"key":"3_CR8","unstructured":"Association of Chief Police Officers: Good Practice Guide for Computer based Electronic Evidence. In: Association of Chief Police Officers, \n                  \n                    http:\/\/www.dataclinic.co.uk\/ACPO%20Guide%20v3.0.pdf\n                  \n                  \n                 (accessed June 2010)"},{"key":"3_CR9","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-11534-9_2","volume-title":"Digital Forensics and Cyber Crime","author":"M. Husain","year":"2010","unstructured":"Husain, M., Sridhar, R.: iForensics: Forensic Analysis of Instant Messaging on Smart Phones. In: Goel, S. (ed.) ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol.\u00a031, pp. 9\u201318. Springer, Heidelberg (2010)"},{"key":"3_CR10","unstructured":"Paraben Corporation: Forensic Software Comparison Chart. In: Paraben Corporation, Cell Phone Forensics, \n                  \n                    http:\/\/www.paraben-forensics.com\/cell-phone-forensics-comparison.html"},{"key":"3_CR11","volume-title":"iPhone Forensics","author":"J. Zdziarski","year":"2008","unstructured":"Zdziarski, J.: iPhone Forensics. O\u2019reilly Media, Sebastopol (2008)"},{"key":"3_CR12","unstructured":"Hoog, A., Gaffaney, K.: iPhone Forensics. In: viaForensics, \n                  \n                    http:\/\/viaforensics.com\/wpinstall\/wp-content\/uploads\/2009\/03\/iPhone-Forensics-2009.pdf"},{"key":"3_CR13","unstructured":"Vaughn, S.: MobileSyncBrowser | View and Recover Your iPhone Data. In: MobileSyncBrowser | View and Recover Your iPhone Data, \n                  \n                    http:\/\/homepage.mac.com\/vaughn\/msync\/"},{"key":"3_CR14","unstructured":"Piacentini, M.: SQLite Database Browser. In: SQLite Database Browser, \n                  \n                    http:\/\/sqlitebrowser.sourceforge.net\/"},{"key":"3_CR15","unstructured":"VOWSoft Ltd.: Plist Editor For Windows. In: Download iPod software for Windows, \n                  \n                    http:\/\/www.icopybot.com\/plistset.exe"},{"key":"3_CR16","unstructured":"Gondrom, T., Brandner, R., Pordesch, U.: Electronic Record Syntex. Request For Comments 4998, Open Text Corporation (2007)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Brezinski, D., Killalea, T.: Guidelines for Evidence Collection and Archiving. Request For Comments 3227, In-Q-Tel (2002)","DOI":"10.17487\/rfc3227"},{"key":"3_CR18","unstructured":"Apple Inc.: About the security content of the IPhone 1.1.1 Update, \n                  \n                    http:\/\/support.apple.com\/kb\/HT1571"},{"key":"3_CR19","unstructured":"Apple Inc.: About the security content of IPhone v1.1.3 and iPod touch v1.1.3, \n                  \n                    http:\/\/support.apple.com\/kb\/HT1312"},{"key":"3_CR20","unstructured":"Apple Inc.: About the security content of IPhone v2.1, \n                  \n                    http:\/\/support.apple.com\/kb\/HT3129"},{"key":"3_CR21","unstructured":"Apple Inc.: About the security content of IPhone OS 3.0 Software Update, \n                  \n                    http:\/\/support.apple.com\/kb\/HT3639"},{"key":"3_CR22","unstructured":"Apple Inc.: About the security content of IPhone OS 3.1 and IPhone OS 3.1.1 for iPod touch, \n                  \n                    http:\/\/support.apple.com\/kb\/HT3860"},{"key":"3_CR23","unstructured":"Apple Inc.: Apple iPhone. In: Apple-iPhone-Mobile Phone, iPod, and Internet Device, \n                  \n                    http:\/\/www.apple.com\/iphone\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T10:08:28Z","timestamp":1558433308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}