{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:11:05Z","timestamp":1746115865257,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642398902"},{"type":"electronic","value":"9783642398919"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39891-9_17","type":"book-chapter","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T05:28:17Z","timestamp":1380605297000},"page":"264-282","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis"],"prefix":"10.1007","author":[{"given":"Shahzad","family":"Saleem","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Popov","sequence":"additional","affiliation":[]},{"given":"Oheneba Kwame","family":"Appiah-Kubi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Techsling, Personal Computers Outnumbered by Mobile Phones (2010), http:\/\/www.techsling.com\/2010\/10\/personal-computers-outnumbered-by-mobile-phones\/ (accessed March 28, 2012)"},{"key":"17_CR2","unstructured":"International Telecommunication Union (ITU), ICT Data and Statistics (IDS) (2011), http:\/\/www.itu.int\/ITU-D\/ict\/statistics\/material\/excel\/2011\/Mobile_cellular_01-11_2.xls (accessed March 28, 2012)"},{"key":"17_CR3","unstructured":"International Organization on Computer Evidence, IOCE - Guidelines for Best Practice in the Forensic Examination of Digital Technology (2002)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Brezinski, D., Killalea, T.: RFC 3227: Guidelines for Evidence Collection and Archiving (2002)","DOI":"10.17487\/rfc3227"},{"key":"17_CR5","unstructured":"Daubert v. Merrell Dow Pharmaceuticals (92-102), 509 U.S. 579 (1993), http:\/\/www.law.cornell.edu\/supct\/html\/92-102.ZS.html (accessed February 29, 2012)"},{"key":"17_CR6","unstructured":"Weissenberger, G., Duane, J.J.: Federal Rules of Evidence: Rules, Legislative History, Commentary, and Authority (2004)"},{"key":"17_CR7","unstructured":"Federal Evidence Review, Federal Rules of Evidence 2012 (2012), http:\/\/federalevidence.com\/downloads\/rules.of.evidence.pdf (accessed June 10, 2012)"},{"key":"17_CR8","unstructured":"National Institute of Standards and Technology (NIST), Smart Phone Tool Specification, Version 1.1 (2010)"},{"key":"17_CR9","unstructured":"National Institute of Standards and Technology (NIST), Smart Phone Tool Test Assertions and Test Plan, Version 1.1 (2010)"},{"key":"17_CR10","unstructured":"National Institute of Standards and Technology (NIST), CFTT- Mobile Devices, http:\/\/www.nist.gov\/itl\/ssd\/cs\/cftt\/cftt-mobile-devices.cfm (accessed June 6, 2012)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Kubi, A., Saleem, S., Popov, O.: Evaluation of some tools for extracting e-evidence from mobile devices. Application of Information and Communication Technologies\u00a0(10), 603\u2013608 (2011)","DOI":"10.1109\/ICAICT.2011.6110999"},{"key":"17_CR12","unstructured":"Baryamureeba, V., Tushabe, F.: The enhanced digital investigation process model. In: Proceedings of the 4th Annual Digital Forensic Research Workshop, pp. 1\u20139 (2004)"},{"key":"17_CR13","unstructured":"Noblett, M.G., Church, F., Pollitt, M.M., Presley, L.A.: Recovering and Examining Computer Forensic Evidence. \u00a02(4) (October 2000)"},{"key":"17_CR14","unstructured":"Palmer, G.: A Road Map for Digital Forensic Research, Utica, New York (2001)"},{"key":"17_CR15","unstructured":"Casey, E.: Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 3rd edn. Academic Press (2011)"},{"key":"17_CR16","unstructured":"United States Computer Emergency Response Team, Computer Forensics US-CERT (2008)"},{"issue":"2","key":"17_CR17","first-page":"1","volume":"3","author":"M. Meyers","year":"2004","unstructured":"Meyers, M., Rogers, M.: Computer forensics: the need for standardization and certification. International Journal of Digital Evidence\u00a03(2), 1\u201311 (2004)","journal-title":"International Journal of Digital Evidence"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response, pp. 80\u201386. NIST Special Publication (August 2006)","DOI":"10.6028\/NIST.SP.800-86"},{"key":"17_CR19","unstructured":"Carrier, B.: An event-based digital forensic investigation framework. In: Proceedings of Digital Forensic Research Workshop (2004)"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.diin.2006.06.004","volume":"3","author":"R.S.C. Ieong","year":"2006","unstructured":"Ieong, R.S.C.: FORZA \u2013 Digital forensics investigation framework that incorporate legal issues. Digital Investigation\u00a03, 29\u201336 (2006)","journal-title":"Digital Investigation"},{"issue":"2","key":"17_CR21","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.diin.2005.04.002","volume":"2","author":"N.L. Beebe","year":"2005","unstructured":"Beebe, N.L., Clark, J.G.: A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation\u00a02(2), 147\u2013167 (2005)","journal-title":"Digital Investigation"},{"issue":"1","key":"17_CR22","first-page":"118","volume":"5","author":"A. Agarwal","year":"2011","unstructured":"Agarwal, A., Gupta, M., Gupta, S., Chandra, S.: Systematic Digital Forensic Investigation Model. International Journal of Computer Science and Security\u00a05(1), 118\u2013131 (2011)","journal-title":"International Journal of Computer Science and Security"},{"issue":"2","key":"17_CR23","first-page":"1","volume":"2","author":"B. Carrier","year":"2003","unstructured":"Carrier, B.: Getting physical with the digital investigation process. International Journal of Digital Evidence\u00a02(2), 1\u201320 (2003)","journal-title":"International Journal of Digital Evidence"},{"issue":"3","key":"17_CR24","first-page":"1","volume":"1","author":"M. Reith","year":"2002","unstructured":"Reith, M., Carr, C., Gunsch, G.: An Examination of Digital Forensic Models. International Journal of Digital Evidence\u00a01(3), 1\u201312 (2002)","journal-title":"International Journal of Digital Evidence"},{"key":"17_CR25","unstructured":"National Institute of Justice, Electronic crime scene investigation: A guide for first responders (2001)"},{"issue":"4","key":"17_CR26","first-page":"102","volume":"2","author":"M.G. Noblett","year":"2000","unstructured":"Noblett, M.G., Pollitt, M.M., Presley, L.A.: Recovering and examining computer forensic evidence. Forensic Science Communications\u00a02(4), 102\u2013109 (2000)","journal-title":"Forensic Science Communications"},{"issue":"4","key":"17_CR27","first-page":"1","volume":"1","author":"B. Carrier","year":"2003","unstructured":"Carrier, B.: Defining digital forensic examination and analysis tools using abstraction layers. International Journal of Digital Evidence\u00a01(4), 1\u201312 (2003)","journal-title":"International Journal of Digital Evidence"},{"issue":"2","key":"17_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4156\/jnit.vol2.issue2.1","volume":"2","author":"Y.-D. Shin","year":"2011","unstructured":"Shin, Y.-D.: New Model for Cyber Crime Investigation Procedure. Journal of Next Generation Information Technology\u00a02(2), 1\u20137 (2011)","journal-title":"Journal of Next Generation Information Technology"},{"key":"17_CR29","unstructured":"Ramabhadran, A.: Forensic Investigation Process Model For Windows Mobile Devices. Tata Elxsi Security Group, pp. 1\u201316 (2007)"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Appiah-Kubi, O.K.: Evaluation of UFED Physical Pro 1.1.3.8 and XRY 5.0: Tools for Extracting e-Evidence from Mobile Devices. Stockholm University (2010)","DOI":"10.1109\/ICAICT.2011.6110999"},{"key":"17_CR31","unstructured":"Bishop, M.: Evaluating Systems. In: Computer Security: Art and Science, p. 571. Addison-Wesley Professional (2002)"},{"key":"17_CR32","unstructured":"Radatz, J., Geraci, A., Katki, F.: IEEE standard glossary of software engineering terminology. IEEE Standards Board, New York, Standard IEEE std (1990)"},{"key":"17_CR33","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-642-19513-6_9","volume":"53","author":"S. Saleem","year":"2011","unstructured":"Saleem, S., Popov, O.: Protecting Digital Evidence Integrity by Using Smart Cards. Digital Forensics and Cyber Crime\u00a053, 110\u2013119 (2011)","journal-title":"Digital Forensics and Cyber Crime"},{"key":"17_CR34","unstructured":"National Institute of Standards and Technology, \u201cComputer Forensics Tool Testing (CFTT) Project, http:\/\/www.cftt.nist.gov\/ (accessed: February 26, 2012)"},{"issue":"1","key":"17_CR35","first-page":"78","volume":"10","author":"A. Attia","year":"2005","unstructured":"Attia, A.: Why should researchers report the confidence interval in modern research. Middle East Fertility Society Journal\u00a010(1), 78\u201381 (2005)","journal-title":"Middle East Fertility Society Journal"},{"key":"17_CR36","unstructured":"Ross, S.M.: Interval Estimates. In: Introduction to Probability and Statistics for Engineers and Scientists, 3rd edn., pp. 240\u2013241. Elsevier Academic Press (2004)"},{"key":"17_CR37","unstructured":"University of Leicester, Online Statistics (2000), http:\/\/www.le.ac.uk\/bl\/gat\/virtualfc\/Stats\/ttest.html (accessed: June 16, 2012)"},{"key":"17_CR38","unstructured":"Ross, S.M.: Hypothesis Testing. In: Introduction to Probability and Statistics for Engineers and Scientists, 3rd edn., p. 291. Elsevier Academic Press (2004)"},{"key":"17_CR39","unstructured":"UCAL Academic Technology Services, What are the differences between one-tailed and two-tailed tests? http:\/\/www.ats.ucla.edu\/stat\/mult_pkg\/faq\/general\/tail_tests.htm (accessed: June 16, 2012)"},{"key":"17_CR40","unstructured":"Easton, V.J., McColl, J.H.: Statistics Glossary V1.1 (1997), http:\/\/www.stats.gla.ac.uk\/steps\/glossary\/index.html (accessed: June 16, 2012)"},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"Jansen, W., Delaitre, A.: Mobile forensic reference materials: A methodology and reification. US Department of Commerce, National Institute of Standards and Technology (2009)","DOI":"10.6028\/NIST.IR.7617"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39891-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T15:04:18Z","timestamp":1746025458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39891-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642398902","9783642398919"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39891-9_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}