{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T10:00:38Z","timestamp":1761991238226,"version":"build-2065373602"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/iscc.2015.7405508","type":"proceedings-article","created":{"date-parts":[[2016,2,16]],"date-time":"2016-02-16T00:54:13Z","timestamp":1455584053000},"page":"146-151","source":"Crossref","is-referenced-by-count":7,"title":["Forensic analysis of instagram and path on an iPhone 5s mobile device"],"prefix":"10.1109","author":[{"given":"Reema Al","family":"Mushcab","sequence":"first","affiliation":[]},{"given":"Pavel","family":"Gladyshev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Android forensics: simplifying cell phone examinations","volume":"4","author":"lessard","year":"2010","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"ref11","article-title":"Mobile handset forensic evidence: a challenge for law enforcement","author":"al-zarouni","year":"2011","journal-title":"Australian Digital Forensics Conference"},{"journal-title":"IPhone Forensics","year":"2008","author":"zdziarski","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.10.003"},{"journal-title":"IPhone Forensics","year":"2009","author":"hoog","key":"ref14"},{"key":"ref15","article-title":"iForensics: forensics analysis of instant messaging on smartphones","author":"husain","year":"2009","journal-title":"4th International Conference on Digital Forensics & Cyber Crime"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-3343-5"},{"key":"ref17","first-page":"120","article-title":"Smart phones forensics and social networks","volume":"6","author":"yousif","year":"2011","journal-title":"IEEE Multidisciplinary Engineering Education Magazine"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22339-6_21"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2184751.2184827"},{"year":"2012","key":"ref4","article-title":"Smartphones overtake client PCs in 2011"},{"key":"ref3","article-title":"Global Internet, mobile and social media engagement and usage stats and facts","author":"ahmad","year":"2013","journal-title":"Social Media Today"},{"key":"ref6","article-title":"Social network statistics 2013- growth rates and numbers of users","author":"frazier","year":"2013","journal-title":"Ethority"},{"key":"ref5","article-title":"iPhone 3GS forensics: logical analysis using apple iTunes backup utility","volume":"4","author":"bader","year":"2010","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.007"},{"key":"ref7","article-title":"Messaging and social app use triple in 2013","author":"richter","year":"2014","journal-title":"Statista-The statistics portal"},{"key":"ref2","article-title":"Complete history of social media: then and now","author":"hendricks","year":"2013","journal-title":"Small Business Trends"},{"key":"ref1","article-title":"The Internet and the right to communicate","volume":"8","author":"mclver","year":"2003","journal-title":"First Monday"},{"key":"ref9","article-title":"Mobile device analysis","volume":"2","author":"punja","year":"2012","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19513-6_3"},{"year":"0","key":"ref22","article-title":"SQLite's use of temporary disk files"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22339-6"},{"journal-title":"Forensic analysis of instagram and path on an Android-based HTC one-m8","year":"2014","author":"almushcab","key":"ref23"}],"event":{"name":"2015 20th IEEE Symposium on Computers and Communication (ISCC)","start":{"date-parts":[[2015,7,6]]},"location":"Larnaca","end":{"date-parts":[[2015,7,9]]}},"container-title":["2015 IEEE Symposium on Computers and Communication (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7397314\/7405441\/07405508.pdf?arnumber=7405508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T07:15:17Z","timestamp":1490339717000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7405508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iscc.2015.7405508","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}