{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:44Z","timestamp":1750307504155,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000138","name":"U.S. Department of Education","doi-asserted-by":"publisher","award":["P120A080094"],"award-info":[{"award-number":["P120A080094"]}],"id":[{"id":"10.13039\/100000138","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940972","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"156-162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Practical investigations of digital forensics tools for mobile devices"],"prefix":"10.1145","author":[{"suffix":"II","given":"Maynard","family":"Yates","sequence":"first","affiliation":[{"name":"Florida Agricultural and Mechanical University, Tallahassee, FL"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Rules of Digital Evidence and AccessData Technology. Retrieved","author":"AccessData Corporation","year":"2010","unstructured":"AccessData Corporation . (n.d.). The Rules of Digital Evidence and AccessData Technology. Retrieved May 10, 2010 , from AccessData Corporation : http:\/\/www.accessdata.com\/mobilephoneexaminer.html AccessData Corporation. (n.d.). The Rules of Digital Evidence and AccessData Technology. Retrieved May 10, 2010, from AccessData Corporation: http:\/\/www.accessdata.com\/mobilephoneexaminer.html"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"AccessData","year":"2010","unstructured":"AccessData . (n.d.). Mobile Phone Examiner . Retrieved May 15, 2010 , from AccessData : http:\/\/www.accessdata.com\/mobilephoneexaminer.html AccessData. (n.d.). Mobile Phone Examiner. Retrieved May 15, 2010, from AccessData: http:\/\/www.accessdata.com\/mobilephoneexaminer.html"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Android Inc. (n.d.).","year":"2010","unstructured":"Android Inc. (n.d.). What is Android|Android Developers . Retrieved May 23, 2010 , from Android Developers : http:\/\/developer.android.com\/guide\/basics\/what-is-android.html Android Inc. (n.d.). What is Android|Android Developers. Retrieved May 23, 2010, from Android Developers: http:\/\/developer.android.com\/guide\/basics\/what-is-android.html"},{"key":"e_1_3_2_1_4_1","volume-title":"iPhone Technologies Overview. Retrieved","author":"Apple Inc. (n.d.).","year":"2010","unstructured":"Apple Inc. (n.d.). iPhone Technologies Overview. Retrieved May 22, 2010 , from iPhone Reference Library : http:\/\/developer.apple.com\/iphone\/library\/documentation\/Miscellaneous\/Conceptual\/iPhoneOSTechOverview\/iPhoneOSTechnologies\/iPhoneOSTechnologies.html#\/\/apple_ref\/doc\/uid\/TP40007898-CH3-SW1 Apple Inc. (n.d.). iPhone Technologies Overview. Retrieved May 22, 2010, from iPhone Reference Library: http:\/\/developer.apple.com\/iphone\/library\/documentation\/Miscellaneous\/Conceptual\/iPhoneOSTechOverview\/iPhoneOSTechnologies\/iPhoneOSTechnologies.html#\/\/apple_ref\/doc\/uid\/TP40007898-CH3-SW1"},{"key":"e_1_3_2_1_5_1","unstructured":"Guidance Software. (n.d.). EnCase Neutrino. Retrieved May 28 2010 from Guidance Software: http:\/\/www.guidancesoftware.com\/product.aspx?B=Product&amp;Product_S=AccordianTwo&amp;menu_id=117&amp;id=348&amp;terms=mobile+devices  Guidance Software. (n.d.). EnCase Neutrino . Retrieved May 28 2010 from Guidance Software: http:\/\/www.guidancesoftware.com\/product.aspx?B=Product&amp;Product_S=AccordianTwo&amp;menu_id=117&amp;id=348&amp;terms=mobile+devices"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516046.1516080"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"Oxygen Forensic","year":"2010","unstructured":"Oxygen Forensic . (n.d.). Oxygen Forensic Suite 2010 . Retrieved May 15, 2010 , from Oxygen Forensic : http:\/\/www.oxygen-forensic.com Oxygen Forensic. (n.d.). Oxygen Forensic Suite 2010. Retrieved May 15, 2010, from Oxygen Forensic: http:\/\/www.oxygen-forensic.com"},{"key":"e_1_3_2_1_8_1","volume-title":"Device Seizure. Retrieved","author":"Paraben Corporation","year":"2010","unstructured":"Paraben Corporation . (n.d.). Device Seizure. Retrieved May 29, 2010 , from Paraben Corporation http:\/www.paraben-forensics.com\/device-seizure.htm Paraben Corporation. (n.d.). Device Seizure. Retrieved May 29, 2010, from Paraben Corporation http:\/www.paraben-forensics.com\/device-seizure.htm"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"Symbian Foundation","year":"2010","unstructured":"Symbian Foundation . (n.d.). Symbian Software Model . Retrieved May 23, 2010 , from Symbian Developer Community : http:\/\/developer.symbian.org\/wiki\/index.php\/Symbian_System_Model Symbian Foundation. (n.d.). Symbian Software Model. Retrieved May 23, 2010, from Symbian Developer Community: http:\/\/developer.symbian.org\/wiki\/index.php\/Symbian_System_Model"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.01.004"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.02.001"},{"volume-title":"retrieved from  Cell Phone Forensic Tools: An Overview and Analysis","author":"Rick Ayers Wayne Jansen","key":"e_1_3_2_1_13_1","unstructured":"Rick Ayers , Wayne Jansen , Nicolas Cilleros , and Ronan Daniellou . (October 2007). retrieved from Cell Phone Forensic Tools: An Overview and Analysis . National Institute of Standards and Technology http:\/\/csrc.nist.gov\/publications\/nistir\/nistir-7100-PDAForensics.pdf Rick Ayers, Wayne Jansen, Nicolas Cilleros, and Ronan Daniellou. (October 2007). retrieved from Cell Phone Forensic Tools: An Overview and Analysis . National Institute of Standards and Technology http:\/\/csrc.nist.gov\/publications\/nistir\/nistir-7100-PDAForensics.pdf"},{"volume-title":"Mobile Forensic Reference Materials: A Methodology and Reification","author":"Aur\u00e9lien Delaitre","key":"e_1_3_2_1_14_1","unstructured":"Wayne Janson and Aur\u00e9lien Delaitre , Mobile Forensic Reference Materials: A Methodology and Reification , National Institute of Standards and Technology , http:\/\/csrc.nist.gov\/publications\/nistir\/ir7617\/nistir-7617.pdf Wayne Janson and Aur\u00e9lien Delaitre, Mobile Forensic Reference Materials: A Methodology and Reification, National Institute of Standards and Technology, http:\/\/csrc.nist.gov\/publications\/nistir\/ir7617\/nistir-7617.pdf"},{"key":"e_1_3_2_1_15_1","volume-title":"Mobile Device Analysis. Small Scale Digital Device Forensics Journal","author":"Mislan R.","year":"2008","unstructured":"Mislan , R. ( 2008 ). Mobile Device Analysis. Small Scale Digital Device Forensics Journal . Mislan, R. (2008). Mobile Device Analysis. Small Scale Digital Device Forensics Journal."},{"key":"e_1_3_2_1_16_1","volume-title":"Prodeedings of the 5th Australian Digital Forensics Conference (pp. 34--51)","author":"Sansurooah K.","year":"2007","unstructured":"Sansurooah , K. ( 2007 ). An overview and examination of digital PDA devices under forensics toolkits . Prodeedings of the 5th Australian Digital Forensics Conference (pp. 34--51) . Perth, Western Australia : School of Computer and Information Science, Edith Cowan University. Sansurooah, K. (2007). An overview and examination of digital PDA devices under forensics toolkits. Prodeedings of the 5th Australian Digital Forensics Conference (pp. 34--51). Perth, Western Australia: School of Computer and Information Science, Edith Cowan University."}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '10"},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:51Z","timestamp":1750249071000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":15,"alternative-id":["10.1145\/1940941.1940972","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940972","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}