{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:51:31Z","timestamp":1759092691478},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304354"},{"type":"electronic","value":"9783642304361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30436-1_21","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T16:20:29Z","timestamp":1338913229000},"page":"249-260","source":"Crossref","is-referenced-by-count":22,"title":["Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition"],"prefix":"10.1007","author":[{"given":"Alexios","family":"Mylonas","sequence":"first","affiliation":[]},{"given":"Vasilis","family":"Meletiadis","sequence":"additional","affiliation":[]},{"given":"Bill","family":"Tsoumas","sequence":"additional","affiliation":[]},{"given":"Lilian","family":"Mitrou","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-24212-0_2","volume-title":"Advances in Digital Forensics, Part VII","author":"C. Blackwell","year":"2011","unstructured":"Blackwell, C.: An Investigative Framework for Incident Analysis. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics, Part VII, pp. 23\u201334. Springer, Heidelberg (2011)"},{"key":"21_CR2","unstructured":"Brown, I.: Regulation of Converged Communications Surveillance. In: Nyeland, D., Goold, B. (eds.) New Directions in Surveillance and Privacy, pp. 39\u201373. Willan (2009)"},{"key":"21_CR3","unstructured":"European Telecommunications Standards Institute (ETSI): Lawful Interception; Require-ments of Law Enforcement Agencies. Technical Specification 101: 331 (2009)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Gershowitz, A.: The iPhone meets the Fourth Amendment (2008), \n                    \n                      http:\/\/works.bepress.com\/adam_gershowitz\/3\/","DOI":"10.2139\/ssrn.1084503"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Grobler, C., Louwrens, C., Von Solms, S.: A Multi-component View of Digital Forensics. In: Aleksy, M., Ghernaouti-Helie, S., Quirchmayr, G. (eds.) International Conference on Avaiability Reliability and Security (ARES 2010), pp. 647\u2013652 (2010)","DOI":"10.1109\/ARES.2010.61"},{"issue":"suppl.1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.diin.2006.06.004","volume":"3","author":"S.C.R. Ieong","year":"2006","unstructured":"Ieong, S.C.R.: FORZA \u2013 Digital forensics investigation framework that incorporate legal issues. Digital Investigation\u00a03(suppl.1), 29\u201336 (2006)","journal-title":"Digital Investigation"},{"issue":"9","key":"21_CR7","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/MCOM.2010.5560598","volume":"48","author":"N. Lane","year":"2010","unstructured":"Lane, N., Miluzzo, E., Ly, H., Peebles, D., Choudhury, T., Campbell, A.: A survey of mobile phone sensing. IEEE Communications Magazine\u00a048(9), 140\u2013150 (2010)","journal-title":"IEEE Communications Magazine"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Jansen, W., Ayers, R.: Guidelines on cell phone forensics. NIST Special Publication 800: 101 (2007)","DOI":"10.6028\/NIST.SP.800-101"},{"issue":"3-4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.diin.2010.03.001","volume":"6","author":"R.P. Mislan","year":"2010","unstructured":"Mislan, R.P., Casey, E., Kessler, G.C.: The growing need for on-scene triage of mobile devices. Digital Investigation\u00a06(3-4), 112\u2013124 (2010)","journal-title":"Digital Investigation"},{"key":"21_CR10","unstructured":"Mitrou, L.: Data Retention: a Pandora Box for Rights and Liberties? In: Acquisti, A., De Capitani di Vimercati, S., Gritzalis, S., Lambrinoudakis, C. (eds.) Digital Privacy: Theory, Technologies and Practices, pp. 410\u2013433. Auerbach Publications (2008)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Morrissey, S.: IOS Forensic Analysis: for IPhone, IPad and IPod Touch. Apress (2010)","DOI":"10.1007\/978-1-4302-3343-5"},{"key":"21_CR12","unstructured":"Mylonas, A.: Smartphone spying tools. M.Sc. Thesis, Royal Holloway, University of London (2008)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Rogers, M., Goldman, J., Mislan, R., Wedge, T., Debrota, S.: Computer forensics field tri-age process model. In: Proceeding of the Conference on Digital Forensics Security and Law, pp. 27\u201340 (2006)","DOI":"10.15394\/jdfsl.2006.1004"},{"issue":"3","key":"21_CR14","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/1368506.1368516","volume":"42","author":"I. Sutherland","year":"2008","unstructured":"Sutherland, I., Evans, J., Tryfonas, T., Blyth, A.: Acquiring Volatile Operating System Data Tools and Techniques. SIGOPS Operating System Review\u00a042(3), 6\u201373 (2008)","journal-title":"SIGOPS Operating System Review"},{"key":"21_CR15","unstructured":"Tan, J.: Forensic readiness. @ Stake Technical Report (2001)"},{"issue":"suppl.1","key":"21_CR16","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.diin.2010.05.010","volume":"7","author":"V. Thing","year":"2010","unstructured":"Thing, V., Ng, K.-Y., Chang, E.-C.: Live memory forensics of mobile phones. Digital Investigation\u00a07(suppl.1), 74\u201382 (2010)","journal-title":"Digital Investigation"},{"key":"21_CR17","unstructured":"Walls, J.: Forensic Triage for Mobile Phones with DEC0DE. In: USENIX Security Symposium (2011)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Wiebe, A.: The new Fundamental Right to IT Security - First evaluation and comparative view at the U.S., Datenschutz und Datensicherheit, pp. 713\u2013716 (2008)","DOI":"10.1007\/s11623-008-0171-z"},{"issue":"1-2","key":"21_CR19","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1080\/13600860902836869","volume":"23","author":"A. Wiebke","year":"2009","unstructured":"Wiebke, A.: Agents, Trojans and tags: The next generation of investigators. International Review of Law, Computers & Technology\u00a023(1-2), 99\u2013108 (2009)","journal-title":"International Review of Law, Computers & Technology"},{"issue":"3","key":"21_CR20","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1147\/sj.263.0276","volume":"26","author":"J.A. Zachman","year":"1987","unstructured":"Zachman, J.A.: A framework for information systems architecture. IBM Systems Journal\u00a026(3), 276\u2013292 (1987)","journal-title":"IBM Systems Journal"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security and Privacy Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30436-1_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:39:26Z","timestamp":1620128366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30436-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304354","9783642304361"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30436-1_21","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}