{"id":"https://openalex.org/W4313459302","doi":"https://doi.org/10.1109/iccr56254.2022.9995930","title":"Cloud-based Data Extraction From Mobile Devices: A Preliminary Analysis","display_name":"Cloud-based Data Extraction From Mobile Devices: A Preliminary Analysis","publication_year":2022,"publication_date":"2022-10-06","ids":{"openalex":"https://openalex.org/W4313459302","doi":"https://doi.org/10.1109/iccr56254.2022.9995930"},"language":"en","primary_location":{"id":"doi:10.1109/iccr56254.2022.9995930","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9995930","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108828122","display_name":"Muhammad Haziq Mohd Zainudin","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Muhammad Haziq Mohd Zainudin","raw_affiliation_strings":["Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Malaysia","Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034364966","display_name":"Khairul Akram Zainol Ariffin","orcid":"https://orcid.org/0000-0003-3627-556X"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Khairul Akram Zainol Ariffin","raw_affiliation_strings":["Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Malaysia","Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077467878","display_name":"Dahlia Asyiqin Ahmad Zainaddin","orcid":null},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Dahlia Asyiqin Ahmad Zainaddin","raw_affiliation_strings":["German Malaysian Institute,Network Security, Electrical Engineering Department,Malaysia","Network Security, Electrical Engineering Department, German Malaysian Institute, Malaysia"],"affiliations":[{"raw_affiliation_string":"German Malaysian Institute,Network Security, Electrical Engineering Department,Malaysia","institution_ids":["https://openalex.org/I4528857"]},{"raw_affiliation_string":"Network Security, Electrical Engineering Department, German Malaysian Institute, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006915237","display_name":"Ahmad Tarmizi Abdul Ghani","orcid":"https://orcid.org/0000-0001-9765-1835"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ahmad Tarmizi Abdul Ghani","raw_affiliation_strings":["Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Malaysia","Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051653696","display_name":"Siti Norul Huda Sheikh Abdullah","orcid":"https://orcid.org/0000-0002-2602-7805"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Siti Norul Huda Sheikh Abdullah","raw_affiliation_strings":["Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Malaysia","Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5108828122"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27929234,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"01","last_page":"05"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7306894063949585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7140442132949829},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6720746755599976},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5542477965354919},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4978766441345215},{"id":"https://openalex.org/keywords/sync","display_name":"sync","score":0.49457046389579773},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4839920997619629},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.4254140853881836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40355998277664185},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.299504816532135},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19991499185562134},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13555628061294556}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7306894063949585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7140442132949829},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6720746755599976},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5542477965354919},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4978766441345215},{"id":"https://openalex.org/C3913047","wikidata":"https://www.wikidata.org/wiki/Q1956265","display_name":"sync","level":3,"score":0.49457046389579773},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4839920997619629},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.4254140853881836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40355998277664185},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.299504816532135},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19991499185562134},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13555628061294556},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccr56254.2022.9995930","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9995930","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2062876416","https://openalex.org/W2249958513","https://openalex.org/W2283349340","https://openalex.org/W2334541668","https://openalex.org/W2566984423","https://openalex.org/W2770618228","https://openalex.org/W2924496443","https://openalex.org/W3091139866","https://openalex.org/W3123435920","https://openalex.org/W3130242345","https://openalex.org/W3214111360","https://openalex.org/W4301491479"],"related_works":["https://openalex.org/W2063547430","https://openalex.org/W2524993630","https://openalex.org/W2607244263","https://openalex.org/W2234430299","https://openalex.org/W1831690014","https://openalex.org/W1561022130","https://openalex.org/W1995263003","https://openalex.org/W2241816416","https://openalex.org/W3202001241","https://openalex.org/W2271302663"],"abstract_inverted_index":{"Most":[0],"people":[1],"nowadays":[2],"are":[3,83],"always":[4],"occupied":[5],"with":[6,141],"their":[7],"mobile":[8,57,105,115,151,236],"devices.":[9],"Mobile":[10],"devices":[11,106,132],"were":[12],"utilized":[13],"not":[14],"just":[15],"as":[16,75,148,197,199,206],"a":[17,94,183,207,227],"means":[18],"of":[19,33,44,121,166,182,202,235],"communication":[20],"but":[21],"also":[22],"to":[23,27,37,69,179,217,225],"launch":[24],"applications":[25,36,139],"installed":[26],"aid":[28],"routine":[29],"activities.":[30],"The":[31,150,176],"deployment":[32],"cloud":[34,39,53,81,124,237],"storage":[35,40,54,125,238],"access":[38],"accounts":[41],"is":[42,107,223],"one":[43],"the":[45,62,114,122,135,164,180,200,203,212],"most":[46],"popular":[47],"uses.":[48],"Consumers":[49],"have":[50],"rapidly":[51],"adopted":[52],"services":[55,82],"from":[56,104],"devices,":[58],"often":[59],"available":[60],"over":[61],"internet.":[63],"However,":[64],"this":[65],"situation":[66],"allows":[67],"criminals":[68],"engage":[70],"in":[71,97,145,209],"illegal":[72],"acts":[73],"such":[74,99],"child":[76],"pornography":[77],"and":[78,86,117,133,137,173,193],"violence.":[79],"Since":[80],"virtual,":[84],"non-local,":[85],"primarily":[87],"proprietary":[88],"technologies,":[89],"digital":[90,218,232],"forensics":[91,219],"investigators":[92],"encounter":[93],"significant":[95],"challenge":[96],"resolving":[98],"issues.":[100],"For":[101],"investigators,":[102],"data":[103,143,169,184,213],"vital.":[108],"It":[109],"will":[110,153],"be":[111,155],"stored":[112],"on":[113,130],"device":[116,152],"provide":[118],"an":[119],"overview":[120],"user's":[123],"contents.":[126],"This":[127,221],"study":[128,177],"focuses":[129],"Android":[131],"employs":[134],"MediaFire":[136],"Sync.com":[138],"along":[140],"20":[142],"sets":[144],"various":[146,161],"formats":[147],"samples.":[149],"then":[154],"extracted":[156],"using":[157],"MSAB":[158],"XRY":[159],"under":[160],"circumstances":[162],"(after":[163],"process":[165,215],"file":[167],"modification,":[168],"cleanup,":[170],"cache":[171],"clearance,":[172],"application":[174],"removal).":[175],"contributes":[178],"design":[181],"extraction":[185,204,214],"framework":[186],"guided":[187],"by":[188],"NIST":[189],"800\u2013101":[190],"rev":[191],"1":[192],"SWGDE":[194],"Best":[195],"Practices,":[196],"well":[198],"documentation":[201],"procedure,":[205],"step":[208],"ensuring":[210],"that":[211],"adheres":[216],"standards.":[220],"research":[222],"projected":[224],"offer":[226],"fundamental":[228],"reference":[229],"for":[230],"conducting":[231],"forensic":[233],"investigations":[234],"services.":[239]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
