{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T03:57:14Z","timestamp":1754020634853,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/isdfs.2019.8757527","type":"proceedings-article","created":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T00:20:00Z","timestamp":1562890800000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria"],"prefix":"10.1109","author":[{"given":"Iliyasu Yahaya","family":"Adam","sequence":"first","affiliation":[]},{"given":"Cihan","family":"Varol","sequence":"additional","affiliation":[]},{"given":"Asaf","family":"Varol","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5121\/ijci.2016.5223"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5171\/2010.566928"},{"key":"ref12","first-page":"2319","article-title":"Mobile Tracking Application","volume":"2","author":"kinage","year":"2013","journal-title":"International Journal of Innovative Research in Science Engineering and Technology"},{"journal-title":"SAFE HANDS A Review of Mobile PhoneAnti-theft Designs","year":"2007","author":"whitehead","key":"ref13"},{"key":"ref14","first-page":"167","article-title":"ThiefTrap - An Anti-theft Framework for Android","author":"gro?","year":"2018","journal-title":"Security and Privacy in Communication Networks"},{"key":"ref15","article-title":"SMART THEFT ALERT FOR ANDROID BASED DEVICES","volume":"3","author":"sharmila","year":"2016","journal-title":"International Journal of Computers and Technology"},{"journal-title":"Reducing Mobile Phone Theft and Improving Security","year":"0","key":"ref16"},{"key":"ref17","first-page":"620","article-title":"Mobile Theft Tracking Application","author":"shedge","year":"2017","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref18","first-page":"1","article-title":"Security Analysis of Consumer-Grade Anti-Theft Solutions Provided by Android Mobile Anti-Virus Apps","author":"simon","year":"2015","journal-title":"4th Mobile Security Technologies Workshop"},{"key":"ref19","article-title":"Mobile Theft Tracking Application","author":"shedge","year":"2017","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"journal-title":"Craig","article-title":"RADIO RESOURCE LOCATION SERVICES (LCS) PROTOCOL (RRLP) - THE THEORY","year":"2013","key":"ref4"},{"key":"ref3","article-title":"Mobile Phone Tracking & Positioning","volume":"2","author":"arigela","year":"2013","journal-title":"International Journal of Innovative Research in Science Engineering and Technology"},{"journal-title":"HOW TO&#x2026; FIND A STOLEN CELL PHONE (EVEN AFTER IT IS WIPED AND ISSUED A NEW NUMBER!)","year":"2018","author":"young","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISNE.2015.7132023"},{"key":"ref8","first-page":"197","article-title":"Architecture for Lost Mobile Tracker Application","volume":"2","author":"martinez","year":"2012","journal-title":"International Journal of e-Education e-Business e-Management and e-Learning"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5120\/8513-2515"},{"journal-title":"The 3 Best Ways to Legally Track a Cell Phone","year":"2018","author":"smith","key":"ref2"},{"key":"ref1","first-page":"1","article-title":"Mobile Phones and Adult Education in Nigeria","volume":"8","author":"adenubi","year":"2012","journal-title":"International Institute for Science Technology and Education (IISTE)"},{"key":"ref9","article-title":"Anti-theft application for android based devices","author":"shan khan","year":"2012","journal-title":"IEEE International Advance Computing Conference (IACC)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2991\/ameii-16.2016.102"}],"event":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2019,6,10]]},"location":"Barcelos, Portugal","end":{"date-parts":[[2019,6,12]]}},"container-title":["2019 7th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8750993\/8757466\/08757527.pdf?arnumber=8757527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:20:59Z","timestamp":1658262059000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8757527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isdfs.2019.8757527","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}