{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:04:16Z","timestamp":1753520656076,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,22]]},"DOI":"10.1109\/acit57182.2022.9994221","type":"proceedings-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T13:38:43Z","timestamp":1672839523000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Examining Digital Forensic Evidence for Android Applications"],"prefix":"10.1109","author":[{"given":"Mohammad Rasmi","family":"Al-Mousa","sequence":"first","affiliation":[{"name":"Zarqa University,Department of Cyber Security,Zarqa,Jordan"}]},{"given":"Qutaiba","family":"Al-Zaqebah","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]},{"given":"Ala'a","family":"Saeb Al-Sherideh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cyber Security,Zarqa,Jordan"}]},{"given":"Mohammed","family":"Al-Ghanim","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cyber Security,Zarqa,Jordan"}]},{"given":"Ghassan","family":"Samara","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]},{"given":"Sattam","family":"Al-Matarneh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Data Science and Artificial Intelligence"}]},{"given":"Mahmoud","family":"Asassfeh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cyber Security,Zarqa,Jordan"}]}],"member":"263","reference":[{"journal-title":"Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics","year":"2007","author":"al-zarouni","key":"ref13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17781\/P002472"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32493\/informatika.v5i1.4578"},{"key":"ref14","article-title":"Overview of potential forensic analysis of an Android smartphone","author":"stefan","year":"2012","journal-title":"Multimedia on Mobile Devices 2012 and Multimedia Content Access Algorithms and Systems VI Vol 8304 International Society for Optics and Photonics"},{"key":"ref11","first-page":"85","article-title":"Guidelines on mobile device forensics","volume":"1","author":"brothers","year":"2014","journal-title":"NIST Spec Publ"},{"key":"ref10","first-page":"1","article-title":"Evidence gathering of LINE messenger on iPhones","volume":"4","author":"jain","year":"2015","journal-title":"International Journal For Innovative Engineering and Management"},{"key":"ref17","first-page":"2355","article-title":"Perbandingan Tool Forensik Data Recovery Berbasis Android MenggunakanMetode NIST","volume":"7","author":"riadi","year":"2020","journal-title":"Jurnal teknologi Informasi dan Ilmu Komputer (JTIIK)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.30872\/jurti.v3i1.2292"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.5.28"},{"key":"ref18","article-title":"Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning","author":"al-mousa","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/18\/3\/11"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i4.1.19492"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT53391.2021.9677345"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1080\/23311886.2022.2062095"},{"key":"ref47","article-title":"Motivating path between security and privacy factors on the actual use of mobile government applications in Jordan","author":"al-sherideh","year":"2020","journal-title":"International Journal on Emerging Technologies"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.8.3.3591"},{"journal-title":"Forensic Analysis of Whatsapp on Android Smartphones","year":"2013","author":"thakur","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/GC-ElecEng52322.2021.9788230"},{"journal-title":"New and emerging mobile apps among teens-are forensic tools keeping up?","year":"2020","author":"billups","key":"ref43"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/19\/1\/5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17781\/P002306"},{"key":"ref7","article-title":"Forensic examination of digital evidence: a guide for law enforcement","author":"ashcroft","year":"2004","journal-title":"National Institute of Justice"},{"key":"ref9","article-title":"LINE IM app forensic analysis","author":"iqbal","year":"2015","journal-title":"2015 12th International Conference on High-Capacity Optical Networks and Enabling\/Emerging Technologies (HONET)"},{"key":"ref4","first-page":"701","author":"chen","year":"2016","journal-title":"Contextual binding and intelligent targeting In Proceedings of the 2016 IEEE\/WIC\/ ACM International Conference on Web Intelligence"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICTER.2017.8257836"},{"key":"ref6","first-page":"337","article-title":"Examination of Digital Evidence on Android-based LINE Messenger","author":"imam","year":"0","journal-title":"International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7 3 (2018)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/fi6030584"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.10.003"},{"key":"ref35","first-page":"1","article-title":"Forensics and SIM cards: an Overview","volume":"5","author":"casadei","year":"2006","journal-title":"International Journal of Digital Evidence"},{"key":"ref34","first-page":"191","article-title":"Forensic analysis of mobile phone internal memory","author":"willassen","year":"2005","journal-title":"IFIP Int Conf Digital Forensics"},{"key":"ref37","first-page":"29","article-title":"Data acquisition from cell phone using logical approach","volume":"26","author":"kim","year":"0","journal-title":"Proceedings of World Academy of Science Engineering and Technology"},{"key":"ref36","article-title":"Acquisition of a Symbian smart phone's content with an on-phone forensic tool","volume":"8","author":"mokhonoana","year":"0","journal-title":"Proceedings of the Southern African Telecommunication Networks and Applications Conference"},{"key":"ref31","article-title":"pdd: memory imaging and forensic analysis of palm OS devices","author":"grand","year":"0","journal-title":"Proceedings of the 14th Annual First Conference on Computer Security Incident Handling and Response"},{"journal-title":"Forensic Examination of a RIM (BlackBerry) Wireless Device June","year":"2002","author":"burnette","key":"ref30"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2004.11.007"},{"key":"ref32","first-page":"1","article-title":"Forensics and the GSM mobile telephone system","volume":"2","author":"willassen","year":"2003","journal-title":"International Journal of Digital Evidence"},{"key":"ref2","first-page":"691","article-title":"Intelligent security in the era of AI: The key vulnerability of RC4 algorithm","author":"al-arjan","year":"0","journal-title":"2021 International Conference on Information Technology (ICIT) ICIT"},{"key":"ref1","volume":"101","author":"cohen","year":"2009","journal-title":"Digital Forensic Evidence Examination"},{"key":"ref39","first-page":"168","article-title":"Mobile phone forensics tool testing: A database driven approach","volume":"6","author":"baggili","year":"2007","journal-title":"International Journal of Digital Evidence"},{"journal-title":"Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics","year":"2007","author":"al-zarouni","key":"ref38"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.091024"},{"key":"ref23","first-page":"654","article-title":"Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics","author":"al-mousa","year":"0","journal-title":"2021 International Conference on Information Technology (ICIT) ICIT"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23547-5_10"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.016"},{"key":"ref20","first-page":"1","article-title":"A proposed wireless intrusion detection prevention and attack system","author":"nada","year":"0","journal-title":"2018 International Arab Conference on Information Technology (ACIT)"},{"key":"ref22","article-title":"Using Chaotic Stream Cipher to Enhance Data Hiding in Digital Images","author":"haimour","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref21","first-page":"654","article-title":"Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics","author":"al-mousa","year":"0","journal-title":"2021 International Conference on Information Technology (ICIT) ICIT"},{"key":"ref28","article-title":"Mobile Forensics","author":"rivera","year":"2018","journal-title":"Mercyhurst College"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014615"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.081210"}],"event":{"name":"2022 International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2022,11,22]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2022,11,24]]}},"container-title":["2022 International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9994070\/9994081\/09994221.pdf?arnumber=9994221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T15:14:02Z","timestamp":1675091642000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9994221\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/acit57182.2022.9994221","relation":{},"subject":[],"published":{"date-parts":[[2022,11,22]]}}}