{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T15:34:51Z","timestamp":1764603291835,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/sadfe.2013.6911538","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:39:23Z","timestamp":1412095163000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Forensic artifacts of the ChatON Instant Messaging application"],"prefix":"10.1109","author":[{"given":"Asif","family":"Iqbal","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Marrington","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Baggili","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2011.41"},{"key":"17","article-title":"Phone forensics: Recovering evidence personal data and corporate assets","author":"zdziarski","year":"2010","journal-title":"Sebastopol Canada O'Reilly"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2012.6207740"},{"journal-title":"Android Forensics Investigation Analysis and Mobile Security for Google Android [Book]","year":"2011","author":"hoog","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.10.003"},{"key":"13","article-title":"Android forensics: Simplifying cell phone examinations","volume":"4","author":"lessard","year":"2010","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.003"},{"key":"11","article-title":"Acquisition of a symbian smart phone's content with an onphone forensic tool","author":"mokhonoana","year":"2007","journal-title":"Proceedings of the Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.010"},{"key":"21","article-title":"Phone 3gs forensics: Logical analysis using apple itunes backup utility","author":"bader","year":"2010","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"20","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/978-3-642-11534-9_2","article-title":"Forensics: Forensic analysis of instant messaging on smart phones","volume":"31","author":"husain","year":"2010","journal-title":"Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering Digital Forensics and Cyber Crime"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.440"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35515-8_6"},{"key":"24","first-page":"621","article-title":"Phone social networking for evidence investigations using itunes forensics","author":"tso","year":"2012","journal-title":"Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.10.009"},{"key":"26","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.diin.2006.10.004","article-title":"An examination into aol instant messenger 5.5 contact identification","volume":"3","author":"dickson","year":"2006","journal-title":"Digital Investigation"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84927-0_11"},{"key":"28","first-page":"771","article-title":"Forensic artifacts of facebook's instant messaging service","author":"al mutawa","year":"2011","journal-title":"Internet Technology and Secured Transactions (ICITST) 2011 International Conference for"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.08.019"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11534-9_10"},{"key":"10","first-page":"191","volume":"194","author":"willassen","year":"2005","journal-title":"Forensic Analysis of Mobile Phone Internal Memory"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412952583"},{"journal-title":"Forensic Examination of A RIM (BlackBerry) Wireless Device Rogers & Hardin","year":"2002","author":"burnette","key":"7"},{"key":"6","article-title":"Mobile handset forensic evidence: A challenge for law enforcement","author":"al zarouni","year":"2006","journal-title":"Proceedings of the 4th Australian Digital Forensics Conference"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.007"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.5120\/11602-6965"},{"key":"9","article-title":"Forensics and the gsm mobile telephone system","volume":"2","author":"willassen","year":"2003","journal-title":"International Journal of Digital Evidence"},{"journal-title":"Samsung ChatON","year":"0","key":"8"}],"event":{"name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","start":{"date-parts":[[2013,11,21]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2013,11,22]]}},"container-title":["2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6902669\/6911532\/06911538.pdf?arnumber=6911538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:31:45Z","timestamp":1498152705000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6911538\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/sadfe.2013.6911538","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}