{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:22:04Z","timestamp":1730211724969,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679486","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"139-145","source":"Crossref","is-referenced-by-count":0,"title":["A Survey of Digital Forensic Tools for Android and iOS Smart Phones"],"prefix":"10.1109","author":[{"given":"Sthembile","family":"Ntshangase","sequence":"first","affiliation":[{"name":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"}]},{"given":"Norman","family":"Nelufule","sequence":"additional","affiliation":[{"name":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"}]},{"given":"David","family":"Mulihase","sequence":"additional","affiliation":[{"name":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"}]},{"given":"Mamello","family":"Mtshali","sequence":"additional","affiliation":[{"name":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"}]},{"given":"Chantel","family":"Mokoena","sequence":"additional","affiliation":[{"name":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"}]},{"given":"Palesa","family":"Moloi","sequence":"additional","affiliation":[{"name":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cellphone theft: another indicator of South Africas policing gaps","author":"Lancaster","year":"2023","journal-title":"Pretoria"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301169"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301177"},{"key":"ref4","article-title":"Digital Forensics Tools Used in Cybercrime Investigation-Comparative Analysis","volume":"XIV","author":"Hamad","year":"2022","journal-title":"Journal of Xian University of Architecture & Technology,"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.130102"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JAC-ECC61002.2023.10479652"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IDCIoT59759.2024.10467482"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO60963.2024.10569461"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/mipro60963.2024.10569922"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.56215\/naia-herald\/2.2023.52"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/20\/4\/11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2021921076"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.06.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.51201\/Jusst12621"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1136\/BMJ.N71"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.n160"},{"volume-title":"Oxygen Forensics: Digital Forensic Solutions","year":"2024","key":"ref17"},{"volume-title":"Cellebrite Inseyets | Leading Forensic Examination Software","year":"2024","key":"ref18"},{"volume-title":"MOBILedit Forensic - MOBILedit.","year":"2024","key":"ref19"},{"article-title":"Andriller","volume-title":"Cyber Security Consulting","year":"2024","key":"ref20"},{"volume-title":"XRY - MSAB - Mobile Data Forensic Phone Extraction & Recovery | MSAB. MSAB.","year":"2024","key":"ref21"},{"volume-title":"SOTI MobiControl. Using Location Services","year":"2024","key":"ref22"},{"volume-title":"IMEI Tracker | Find your mobile with IMEI.","year":"2024","key":"ref23"},{"volume-title":"AirDroid Sand Studio, Locate Your Family AnyTime | AirDroid Parental Control. AirDroid","year":"2024","key":"ref24"},{"volume-title":"Mobile Free Tracker","year":"2024","key":"ref25"},{"article-title":"mSpy Cooperation. mSpyTM Cell Phone Tracker","volume-title":"23] mSpy Cooperation. (2024). mSpyTM Cell Phone Tracker: Your #1 Monitoring Tool. mSpy","year":"2024","key":"ref26"},{"volume-title":"uMobix Admin ERSTEN GROUP LTD. How to Find a Lost Phone with IMEI Tracker?","year":"2024","key":"ref27"},{"article-title":"Magnet Axiom | Digital Forensic Software | Magnet Forensics","volume-title":"[25] Magnet Axiom | Digital Forensic Software | Magnet Forensics","year":"2024","key":"ref28"},{"volume-title":"International Mobile Equipment Identity Information. IMEI.INFO. IMEI.info.","year":"2024","key":"ref29"},{"volume-title":"Magnet Graykey | Mobile forensic access tool","year":"2024","key":"ref30"},{"volume-title":"Paraben E3: DS. Forensic Store","year":"2024","key":"ref31"},{"volume-title":"Dr. Fone Mobile Store - Purchase Any Tool for Your Phone Device-copy. Wondershare","year":"2024","key":"ref32"},{"volume-title":"Rubber Ducky Attack - Plurilock","year":"2024","key":"ref33"},{"volume-title":"Flipper Devices Inc. Flipper Zero - Portable Multi-tool Device for Geeks","year":"2024","key":"ref34"},{"volume-title":"Elcomsoft iOS Forensic Toolkit | Elcomsoft Co. Ltd. Elcomsoft Co. Ltd.","year":"2024","key":"ref35"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679486.pdf?arnumber=10679486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:00:39Z","timestamp":1727240439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679486","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}