{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:08:52Z","timestamp":1759961332805,"version":"3.37.3"},"reference-count":36,"publisher":"Elsevier","isbn-type":[{"type":"print","value":"9780128053034"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1016\/b978-0-12-805303-4.00015-0","type":"book-chapter","created":{"date-parts":[[2017,1,7]],"date-time":"2017-01-07T18:42:33Z","timestamp":1483814553000},"page":"285-305","source":"Crossref","is-referenced-by-count":6,"title":["An Android Cloud Storage Apps Forensic Taxonomy"],"prefix":"10.1016","author":[{"given":"M.","family":"Amine Chelihi","sequence":"first","affiliation":[]},{"given":"A.","family":"Elutilo","sequence":"additional","affiliation":[]},{"given":"I.","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"C.","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"A.","family":"Dehghantanha","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"author":"Hornyak","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0010"},{"year":"2012","series-title":"Handbook of Mobile Systems Applications and Services","author":"Kumar","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0015"},{"author":"Vincent","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0020"},{"author":"Stevenson","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0025"},{"author":"Tee","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0030"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0035","first-page":"1","article-title":"Cyber warfare trends and future","volume":"5","author":"Ganji","year":"2013","journal-title":"Adv. Inf. Sci. Serv. Sci."},{"issue":"4","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0040","first-page":"235","article-title":"A survey on digital forensics trends","volume":"3","author":"Damshenas","year":"2014","journal-title":"Int. J. Cyber-Secur. Digit. Forensic"},{"issue":"4","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0045","first-page":"209","article-title":"A survey on digital forensics trends","volume":"3","author":"Mohsen","year":"2014","journal-title":"Int. J. Cyber-Secur. Digit. Forensic"},{"issue":"9","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0050","first-page":"543","article-title":"Cloud computing and conflicts with digital forensic investigation","volume":"7","author":"Damshenas","year":"2013","journal-title":"Int. J. Digit. Content Technol. Appl."},{"issue":"4","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0055","first-page":"209","article-title":"Mobile forensic data acquisition in Firefox OS","volume":"3","author":"Yusoff","year":"2014","journal-title":"Cyber Secur. Cyber Warf. Digit. Forensic"},{"issue":"4","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0060","first-page":"76","article-title":"Cloud forensics issues and opportunities","volume":"4","author":"Aminnezhad","year":"2013","journal-title":"Int. J. Inf. Process. Manag."},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0065","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00450618.2015.1110620","article-title":"Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices","volume":"48","author":"Daryabar","year":"2016","journal-title":"Aust. J. Forensic Sci."},{"issue":"2","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0070","first-page":"504","article-title":"Defusing the hazards of social network services","volume":"1","author":"Mohtasebi","year":"2011","journal-title":"Int. J. Digit. Inf. Wirel. Commun."},{"issue":"3","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0075","first-page":"651","article-title":"Smartphone forensics: a case study with Nokia E5-00 mobile phone","volume":"1","author":"Mohtasebi","year":"2011","journal-title":"J. Digit. Forensic Secur. Law"},{"issue":"3","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0080","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0150300","article-title":"Windows instant messaging app forensics: Facebook and Skype as case studies","volume":"11","author":"Yang","year":"2016","journal-title":"PLoS ONE"},{"issue":"2","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0085","first-page":"77","article-title":"A review on impacts of cloud computing on digital forensics","volume":"2","author":"Daryabar","year":"2013","journal-title":"Int. J. Cyber-Secur. Digit. Forensic"},{"issue":"2","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0090","first-page":"77","article-title":"A survey about impacts of cloud computing on digital forensics","volume":"2","author":"Daryabar","year":"2013","journal-title":"Int. J. Cyber-Secur. Digit. Forensic"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0095","first-page":"5597","article-title":"An android social app forensics adversary model","author":"Azfar","year":"2016"},{"article-title":"Forensic taxonomy of popular android mHealth apps","year":"2015","author":"Azfar","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0100"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0105","doi-asserted-by":"crossref","DOI":"10.1111\/1556-4029.13164","article-title":"An android communication app forensic taxonomy","author":"Azfar","year":"2016","journal-title":"J. Forensic Sci."},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0110","unstructured":"S. Falk, A. Shyshka, The Cloud Marketplace: a capability-based framework for cloud ecosystem governance, Retrieved from: http:\/\/www.diva-portal.org\/smash\/get\/diva2:721103\/FULLTEXT01.pdf, 2014."},{"author":"Nammi","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0115"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0120","first-page":"66","article-title":"The significance of different backup applications in retrieving social networking forensic artifacts from android-based mobile devices","author":"Mushcab","year":"2015"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0125","doi-asserted-by":"crossref","DOI":"10.1080\/00450618.2015.1110620","article-title":"Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices","author":"Daryabar","year":"2016","journal-title":"Aust. J. Forensic Sci."},{"issue":"6","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0130","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1007\/s00779-013-0739-y","article-title":"Dangerous Wi-Fi access point: attacks to benign smartphone applications","volume":"18","author":"Park","year":"2014","journal-title":"Pers. Ubiquit. Comput."},{"year":"2013","series-title":"Performance Analysis of Video Call Application on Tablet Using 3G Network","author":"Ashraf","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0135"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0140","first-page":"111","article-title":"A low cost, portable platform for information assurance and security education","author":"Lo","year":"2015"},{"author":"EDRM","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0145"},{"author":"Microsoft","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0150"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0155","series-title":"Newnes","article-title":"The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic","author":"Shimonski","year":"2013"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0160","series-title":"The Cloud Security Ecosystem","first-page":"309","article-title":"Mobile cloud forensics: an analysis of seven popular Android apps","author":"Martini","year":"2015"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0165","series-title":"The Cloud Security Ecosystem","first-page":"285","article-title":"Conceptual evidence collection and analysis methodology for Android devices","author":"Martini","year":"2015"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0170","series-title":"The Cloud Security Ecosystem","first-page":"429","article-title":"Ubuntu one investigation: detecting evidences on client machines","author":"Shariati","year":"2015"},{"key":"10.1016\/B978-0-12-805303-4.00015-0_bb0175","doi-asserted-by":"crossref","unstructured":"F. Daryabar, A. Dehghantanha, K.-K.R. Choo, Cloud storage forensics: MEGA as a case study, Aust. J. Forensic Sci, http:\/\/dx.doi.org\/10.1080\/00450618.2016.1153714.","DOI":"10.1080\/00450618.2016.1153714"},{"issue":"2","key":"10.1016\/B978-0-12-805303-4.00015-0_bb0180","doi-asserted-by":"crossref","first-page":"351","DOI":"10.7763\/IJCTE.2013.V5.708","article-title":"Towards a unified forensic investigation framework of smartphones","volume":"5","author":"Mohtasebi","year":"2013","journal-title":"Int. J. Comput. Theory Eng"},{"issue":"3","key":"10.1016\/B978-0-12-805303-4.00015-0_bb9000","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/15536548.2015.1073510","article-title":"M0Droid: an android behavioural-based malware detection model","volume":"11","author":"Mohsen","year":"2015","journal-title":"J. Inf. Privacy Secur."}],"container-title":["Contemporary Digital Forensic Investigations of Cloud and Mobile Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128053034000150?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128053034000150?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T04:17:19Z","timestamp":1568693839000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128053034000150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9780128053034"],"references-count":36,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-805303-4.00015-0","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}