{"id":"https://openalex.org/W4360585188","doi":"https://doi.org/10.1109/ic3i56241.2022.10072726","title":"Forensics-as-a-service: A Review of Mobile Forensics","display_name":"Forensics-as-a-service: A Review of Mobile Forensics","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585188","doi":"https://doi.org/10.1109/ic3i56241.2022.10072726"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10072726","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10072726","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101526817","display_name":"Yogesh Kumar Sharma","orcid":"https://orcid.org/0000-0003-1934-4535"},"institutions":[{"id":"https://openalex.org/I29855585","display_name":"Engie (United States)","ror":"https://ror.org/03n8fxy07","country_code":"US","type":"company","lineage":["https://openalex.org/I29855585","https://openalex.org/I4210124897"]},{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]}],"countries":["IN","US"],"is_corresponding":true,"raw_author_name":"Yogesh Kumar Sharma","raw_affiliation_strings":["Koneru Lakshmaiah Education Foundation,Department of Computer Science &#x0026; Engieering,Vaddeswaram,Guntur"],"affiliations":[{"raw_affiliation_string":"Koneru Lakshmaiah Education Foundation,Department of Computer Science &#x0026; Engieering,Vaddeswaram,Guntur","institution_ids":["https://openalex.org/I875944469","https://openalex.org/I29855585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069003512","display_name":"Syed Shagufta Noval","orcid":null},"institutions":[{"id":"https://openalex.org/I29855585","display_name":"Engie (United States)","ror":"https://ror.org/03n8fxy07","country_code":"US","type":"company","lineage":["https://openalex.org/I29855585","https://openalex.org/I4210124897"]},{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]}],"countries":["IN","US"],"is_corresponding":false,"raw_author_name":"Syed Shagufta Noval","raw_affiliation_strings":["Koneru Lakshmaiah Education Foundation,Department of Computer Science &#x0026; Engieering,Vaddeswaram,Guntur"],"affiliations":[{"raw_affiliation_string":"Koneru Lakshmaiah Education Foundation,Department of Computer Science &#x0026; Engieering,Vaddeswaram,Guntur","institution_ids":["https://openalex.org/I875944469","https://openalex.org/I29855585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075344903","display_name":"Arpit Jain","orcid":"https://orcid.org/0000-0003-2325-5893"},"institutions":[{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]},{"id":"https://openalex.org/I29855585","display_name":"Engie (United States)","ror":"https://ror.org/03n8fxy07","country_code":"US","type":"company","lineage":["https://openalex.org/I29855585","https://openalex.org/I4210124897"]}],"countries":["IN","US"],"is_corresponding":false,"raw_author_name":"Arpit Jain","raw_affiliation_strings":["Koneru Lakshmaiah Education Foundation,Department of Computer Science &#x0026; Engieering,Vaddeswaram,Guntur"],"affiliations":[{"raw_affiliation_string":"Koneru Lakshmaiah Education Foundation,Department of Computer Science &#x0026; Engieering,Vaddeswaram,Guntur","institution_ids":["https://openalex.org/I875944469","https://openalex.org/I29855585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073396554","display_name":"B. Sabitha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. Sabitha","raw_affiliation_strings":["CVR College of Engineering,Department of Computer Science &#x0026; Engieering,Hyderabad,India"],"affiliations":[{"raw_affiliation_string":"CVR College of Engineering,Department of Computer Science &#x0026; Engieering,Hyderabad,India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018473344","display_name":"T. Ramya","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"T. Ramya","raw_affiliation_strings":["Sreyas Institute of Engineering and Technology,Department of Computer Science &#x0026; Engieering,Hyderabad,India"],"affiliations":[{"raw_affiliation_string":"Sreyas Institute of Engineering and Technology,Department of Computer Science &#x0026; Engieering,Hyderabad,India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101526817"],"corresponding_institution_ids":["https://openalex.org/I29855585","https://openalex.org/I875944469"],"apc_list":null,"apc_paid":null,"fwci":1.5944,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.87916144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"486","last_page":"491"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8438273668289185},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.7880739569664001},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6791645288467407},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.6598079204559326},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.6546558737754822},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.6476302146911621},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5470820069313049},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5461457967758179},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4861178398132324},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.48123669624328613},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4397943615913391},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32951605319976807},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3240576386451721},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21481448411941528},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.07595664262771606}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8438273668289185},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.7880739569664001},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6791645288467407},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.6598079204559326},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.6546558737754822},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.6476302146911621},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5470820069313049},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5461457967758179},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4861178398132324},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.48123669624328613},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4397943615913391},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32951605319976807},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3240576386451721},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21481448411941528},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.07595664262771606},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10072726","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10072726","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2156350103","https://openalex.org/W2608711422","https://openalex.org/W2961414252","https://openalex.org/W2995912165","https://openalex.org/W2999472659","https://openalex.org/W3011944234","https://openalex.org/W3044715981","https://openalex.org/W3098311144","https://openalex.org/W3169534941","https://openalex.org/W3175779934","https://openalex.org/W3211864648","https://openalex.org/W4200046080","https://openalex.org/W4213423307","https://openalex.org/W4221106512","https://openalex.org/W4221133785","https://openalex.org/W4236707645","https://openalex.org/W4238389034","https://openalex.org/W4306149489","https://openalex.org/W4306951121","https://openalex.org/W4309778239"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W2480188389","https://openalex.org/W4240498326","https://openalex.org/W4283205458","https://openalex.org/W3018602826","https://openalex.org/W3001565613","https://openalex.org/W4391002340","https://openalex.org/W3186279996","https://openalex.org/W2904082727"],"abstract_inverted_index":{"Digital":[0,53],"forensics":[1,54,58],"is":[2,16,56],"the":[3,17,22,29,36,50,84,89,92,105,117],"scientific":[4],"acquisition,":[5],"analysis,":[6],"and":[7,88,96,103,113,119],"preservation":[8],"of":[9,21,38,49,52,86,116],"data":[10,67,106],"contained":[11],"in":[12,35,72],"electronic":[13],"media.":[14],"It":[15],"most":[18,41],"intricate":[19],"step":[20],"cybercrime":[23],"investigation":[24],"process":[25,95],"often":[26],"used":[27,100],"as":[28],"evidence":[30,64],"that":[31,59,75,98],"can":[32],"be":[33],"presented":[34],"court":[37],"law":[39],"for":[40,101],"prosecutable":[42],"cases.":[43],"This":[44,79],"article":[45,80],"briefs":[46],"about":[47,91],"one":[48],"branches":[51],"which":[55],"Mobile":[57,108],"aims":[60,81],"to":[61,82],"recover":[62],"digital":[63],"or":[65,110],"relevant":[66],"from":[68,107],"a":[69,73],"mobile":[70],"device":[71],"way":[74],"will":[76],"preserve":[77],"evidence.":[78],"provide":[83],"review":[85],"state-of-art":[87],"brief":[90],"forensic":[93],"lifecycle,":[94],"methodologies":[97],"are":[99],"extracting":[102],"preserving":[104],"phones":[109,112],"smart":[111],"also":[114],"some":[115],"tools":[118],"software\u2019s.":[120]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
