{"id":"https://openalex.org/W4402811693","doi":"https://doi.org/10.1109/csr61664.2024.10679486","title":"A Survey of Digital Forensic Tools for Android and iOS Smart Phones","display_name":"A Survey of Digital Forensic Tools for Android and iOS Smart Phones","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4402811693","doi":"https://doi.org/10.1109/csr61664.2024.10679486"},"language":"en","primary_location":{"id":"doi:10.1109/csr61664.2024.10679486","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/csr61664.2024.10679486","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009773186","display_name":"Sthembile Ntshangase","orcid":null},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Sthembile Ntshangase","raw_affiliation_strings":["Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"],"affiliations":[{"raw_affiliation_string":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa","institution_ids":["https://openalex.org/I21360634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055196005","display_name":"Norman Nelufule","orcid":"https://orcid.org/0000-0003-1509-4866"},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Norman Nelufule","raw_affiliation_strings":["Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"],"affiliations":[{"raw_affiliation_string":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa","institution_ids":["https://openalex.org/I21360634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107530134","display_name":"David Mulihase","orcid":null},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"David Mulihase","raw_affiliation_strings":["Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"],"affiliations":[{"raw_affiliation_string":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa","institution_ids":["https://openalex.org/I21360634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107616072","display_name":"Mamello Mtshali","orcid":null},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Mamello Mtshali","raw_affiliation_strings":["Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"],"affiliations":[{"raw_affiliation_string":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa","institution_ids":["https://openalex.org/I21360634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107511733","display_name":"Chantel Mokoena","orcid":null},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Chantel Mokoena","raw_affiliation_strings":["Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"],"affiliations":[{"raw_affiliation_string":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa","institution_ids":["https://openalex.org/I21360634"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107577112","display_name":"Palesa Moloi","orcid":null},"institutions":[{"id":"https://openalex.org/I21360634","display_name":"Council for Scientific and Industrial Research","ror":"https://ror.org/05j00sr48","country_code":"ZA","type":"funder","lineage":["https://openalex.org/I21360634"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Palesa Moloi","raw_affiliation_strings":["Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa"],"affiliations":[{"raw_affiliation_string":"Information and Cybersecurity Centre, Council for Scientific and Industrial Research (CSIR),Pretoria,South Africa","institution_ids":["https://openalex.org/I21360634"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5009773186"],"corresponding_institution_ids":["https://openalex.org/I21360634"],"apc_list":null,"apc_paid":null,"fwci":0.8118,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79419005,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"XIV","issue":null,"first_page":"139","last_page":"145"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7539738416671753},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.7386106848716736},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7006756067276001},{"id":"https://openalex.org/keywords/smart-phone","display_name":"Smart phone","score":0.45257750153541565},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3632420301437378},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.325361430644989},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3100581169128418},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10709899663925171}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7539738416671753},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.7386106848716736},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7006756067276001},{"id":"https://openalex.org/C2984771860","wikidata":"https://www.wikidata.org/wiki/Q22645","display_name":"Smart phone","level":2,"score":0.45257750153541565},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3632420301437378},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.325361430644989},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3100581169128418},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10709899663925171}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr61664.2024.10679486","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/csr61664.2024.10679486","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2954192807","https://openalex.org/W3118615836","https://openalex.org/W3123893780","https://openalex.org/W3129848542","https://openalex.org/W3142098412","https://openalex.org/W3169098502","https://openalex.org/W3170947218","https://openalex.org/W4361267500","https://openalex.org/W4380354413","https://openalex.org/W4387193637","https://openalex.org/W4393106532","https://openalex.org/W4393407292","https://openalex.org/W4400113644","https://openalex.org/W4400113787"],"related_works":["https://openalex.org/W87260417","https://openalex.org/W1991580985","https://openalex.org/W2165251242","https://openalex.org/W2418291489","https://openalex.org/W2235224865","https://openalex.org/W2198066681","https://openalex.org/W4285788712","https://openalex.org/W2067681493","https://openalex.org/W1565885216","https://openalex.org/W2241816416"],"abstract_inverted_index":{"Mobile":[0],"theft":[1],"has":[2,26],"been":[3],"an":[4,104],"increasing":[5],"problem":[6],"in":[7,30,108],"South":[8],"African":[9],"cities":[10],"and":[11,41,43,72,93,113,115],"townships.":[12],"This":[13,62,80],"is":[14,35,60,63,101],"also":[15],"motivated":[16],"by":[17,122],"the":[18,33,39,45,55,66,73,77,118,125],"black":[19],"market":[20],"for":[21],"cellphone":[22],"sales,":[23],"but":[24],"it":[25],"recently":[27],"emerged":[28],"that":[29],"many":[31],"instances,":[32],"phone":[34],"stolen":[36],"to":[37,65,102,116],"harvest":[38],"credential":[40],"defraud":[42],"clean":[44],"victims'":[46],"bank":[47],"account.":[48],"Such":[49],"cases":[50],"are":[51],"hardly":[52],"reported":[53],"as":[54],"success":[56],"rate":[57],"of":[58,68,76,85,97,106,110,120],"prosecution":[59],"low.":[61],"due":[64],"lack":[67],"capacity,":[69],"investigative":[70,78,89],"tools,":[71,90],"financial":[74],"constraints":[75],"authorities.":[79],"paper":[81],"presents":[82],"a":[83],"review":[84],"modern":[86],"mobile":[87],"forensic":[88],"both":[91],"open-source":[92],"commercialized.":[94],"The":[95],"purpose":[96],"this":[98],"survey":[99],"article":[100],"present":[103],"analysis":[105],"tools":[107,127],"terms":[109],"their":[111],"strengths":[112],"weaknesses":[114],"simplify":[117],"work":[119],"investigators":[121],"bringing":[123],"all":[124],"latest":[126],"into":[128],"one":[129],"article.":[130]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
