{"id":"https://openalex.org/W4386066542","doi":"https://doi.org/10.1109/smartnets58706.2023.10216267","title":"Forensics Investigation on Social Media Apps and Web Apps Messaging in Android Smartphone","display_name":"Forensics Investigation on Social Media Apps and Web Apps Messaging in Android Smartphone","publication_year":2023,"publication_date":"2023-07-25","ids":{"openalex":"https://openalex.org/W4386066542","doi":"https://doi.org/10.1109/smartnets58706.2023.10216267"},"language":"en","primary_location":{"id":"doi:10.1109/smartnets58706.2023.10216267","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets58706.2023.10216267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091566364","display_name":"Ruwa F. Abu Hweidi","orcid":null},"institutions":[{"id":"https://openalex.org/I2799716270","display_name":"Palestine Technical University - Kadoorie","ror":"https://ror.org/00cfa1c07","country_code":"PS","type":"education","lineage":["https://openalex.org/I2799716270"]}],"countries":["PS"],"is_corresponding":true,"raw_author_name":"Ruwa F. Abu Hweidi","raw_affiliation_strings":["College of IT Palestine Technical University &#x2013; Kadoorie,Dept. of Computer Science,Tulkarem,Palestine"],"affiliations":[{"raw_affiliation_string":"College of IT Palestine Technical University &#x2013; Kadoorie,Dept. of Computer Science,Tulkarem,Palestine","institution_ids":["https://openalex.org/I2799716270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112656929","display_name":"Mahmmoud Jazzar","orcid":null},"institutions":[{"id":"https://openalex.org/I2799716270","display_name":"Palestine Technical University - Kadoorie","ror":"https://ror.org/00cfa1c07","country_code":"PS","type":"education","lineage":["https://openalex.org/I2799716270"]}],"countries":["PS"],"is_corresponding":false,"raw_author_name":"Mahmmoud Jazzar","raw_affiliation_strings":["College of IT Palestine Technical University &#x2013; Kadoorie,Dept. of Computer Science,Tulkarem,Palestine"],"affiliations":[{"raw_affiliation_string":"College of IT Palestine Technical University &#x2013; Kadoorie,Dept. of Computer Science,Tulkarem,Palestine","institution_ids":["https://openalex.org/I2799716270"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040655055","display_name":"Amna Eleyan","orcid":"https://orcid.org/0000-0002-2025-3027"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Amna Eleyan","raw_affiliation_strings":["Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,UK","Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"Manchester Metropolitan University,Department of Computing and Mathematics,Manchester,UK","institution_ids":["https://openalex.org/I11983389"]},{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, UK","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079374330","display_name":"Tarek Bejaoui","orcid":"https://orcid.org/0000-0003-2501-8939"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Tarek Bejaoui","raw_affiliation_strings":["University of Carthage,Computer Engineering Department,Tunisia","Computer Engineering Department, University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage,Computer Engineering Department,Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Computer Engineering Department, University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091566364"],"corresponding_institution_ids":["https://openalex.org/I2799716270"],"apc_list":null,"apc_paid":null,"fwci":1.8378,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.88401438,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7583765983581543},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7249721884727478},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6754077672958374},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6739907264709473},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6407017111778259},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.5500397682189941},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5111532807350159},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.506009042263031},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4496304988861084},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.43221527338027954},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.42906302213668823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3827804625034332},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3144150972366333}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7583765983581543},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7249721884727478},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6754077672958374},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6739907264709473},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6407017111778259},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.5500397682189941},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5111532807350159},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.506009042263031},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4496304988861084},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.43221527338027954},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.42906302213668823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3827804625034332},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3144150972366333},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartnets58706.2023.10216267","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets58706.2023.10216267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2061569780","https://openalex.org/W2138143450","https://openalex.org/W2163130763","https://openalex.org/W2189149214","https://openalex.org/W2246897765","https://openalex.org/W2716664989","https://openalex.org/W2737459085","https://openalex.org/W3016800184","https://openalex.org/W3094127989","https://openalex.org/W3104357017","https://openalex.org/W3170947218","https://openalex.org/W3179513174","https://openalex.org/W3183429647","https://openalex.org/W3210059387","https://openalex.org/W3217238677","https://openalex.org/W4200363398","https://openalex.org/W4206945280","https://openalex.org/W4213282560","https://openalex.org/W4281488805","https://openalex.org/W4285617314","https://openalex.org/W4312779492","https://openalex.org/W4313492204","https://openalex.org/W4313590956","https://openalex.org/W4366775414","https://openalex.org/W4367319238","https://openalex.org/W6633275648","https://openalex.org/W6687091535","https://openalex.org/W6741041869"],"related_works":["https://openalex.org/W2338899373","https://openalex.org/W4252285266","https://openalex.org/W199254545","https://openalex.org/W2476504758","https://openalex.org/W4248464163","https://openalex.org/W2997836625","https://openalex.org/W2921504876","https://openalex.org/W111175386","https://openalex.org/W4362572734","https://openalex.org/W197818113"],"abstract_inverted_index":{"The":[0,32,112],"widespread":[1],"usage":[2],"of":[3,23,29,67,73],"smartphones":[4],"in":[5,106,159,201],"many":[6],"domains":[7],"such":[8],"as":[9],"education,":[10],"finance,":[11],"organizations,":[12],"and":[13,19,26,69,75,89,108,123,131,161,167,173,198],"gaming":[14],"makes":[15],"hackers":[16],"covet":[17],"them":[18],"raises":[20],"the":[21,51,77,99,124,135,138,142,185],"challenge":[22],"facing":[24],"cybercrime":[25],"forensic":[27,52,110],"investigation":[28,53,193],"these":[30],"devices.":[31],"devices":[33,43],"run":[34],"apps":[35],"that":[36,148],"can":[37,165],"be":[38],"sophisticatedly":[39],"linked":[40,179],"to":[41,62,97],"other":[42],"or":[44,46,155,181],"platforms,":[45],"Web":[47,129,182,199],"Apps,":[48,122],"which":[49,178],"duplicate":[50],"problem.":[54],"Each":[55],"social":[56,116,195],"media":[57,117,196],"application":[58],"has":[59,70],"its":[60,71],"feature":[61],"deal":[63],"with":[64],"various":[65],"types":[66],"messages":[68,78],"method":[72,105],"receiving":[74],"storing":[76],"depending":[79],"on":[80,94,194],"their":[81],"type,":[82],"i.e.,":[83],"text,":[84],"video,":[85],"contact":[86,174],"file,":[87],"image,":[88],"record.":[90],"This":[91,145],"study":[92,146],"works":[93],"two":[95,120,136],"scenarios":[96],"track":[98],"recovered":[100],"data":[101,170],"by":[102],"logical":[103,149,163],"acquisition":[104,150,164],"MOBILedit":[107],"FINALmobile":[109],"tools.":[111],"first":[113],"scenario":[114],"is":[115,127,141,188],"massaging":[118],"between":[119,128],"smartphone":[121,132],"second":[125],"one":[126],"Apps":[130,197,200],"Apps.":[133],"In":[134],"scenarios,":[137],"acquired":[139],"device":[140,180],"receiver\u2019s":[143],"smartphone.":[144],"finds":[147],"cannot":[151],"recover":[152],"any":[153],"Facebook":[154],"Instagram":[156],"data,":[157],"but":[158],"WhatsApp":[160],"Telegram,":[162],"extract":[166],"analyze":[168],"all":[169],"except":[171],"text":[172],"files,":[175],"without":[176],"knowing":[177],"App":[183],"sent":[184],"message.":[186],"There":[187],"a":[189],"need":[190],"for":[191],"more":[192],"future":[202],"works.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
