{"id":"https://openalex.org/W2012697748","doi":"https://doi.org/10.1109/wifs.2012.6412634","title":"Forensic analysis of wireless networking evidence of Android smartphones","display_name":"Forensic analysis of wireless networking evidence of Android smartphones","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W2012697748","doi":"https://doi.org/10.1109/wifs.2012.6412634","mag":"2012697748"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2012.6412634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://eprints.uwe.ac.uk/29733/","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034683400","display_name":"Panagiotis Andriotis","orcid":"https://orcid.org/0000-0002-3490-3123"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Panagiotis Andriotis","raw_affiliation_strings":["Bristol Cryptography Group, University of Bristol, Bristol, UK","Bristol Cryptography Group, Faculty of Engineering, University of Bristol Queen's Building, University Walk, Bristol, BS8 1TR, UK"],"affiliations":[{"raw_affiliation_string":"Bristol Cryptography Group, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"Bristol Cryptography Group, Faculty of Engineering, University of Bristol Queen's Building, University Walk, Bristol, BS8 1TR, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072981915","display_name":"George Oikonomou","orcid":"https://orcid.org/0000-0002-1684-6989"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"George Oikonomou","raw_affiliation_strings":["Bristol Cryptography Group, University of Bristol, Bristol, UK","Bristol Cryptography Group, Faculty of Engineering, University of Bristol Queen's Building, University Walk, Bristol, BS8 1TR, UK"],"affiliations":[{"raw_affiliation_string":"Bristol Cryptography Group, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"Bristol Cryptography Group, Faculty of Engineering, University of Bristol Queen's Building, University Walk, Bristol, BS8 1TR, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084471326","display_name":"Theo Tryfonas","orcid":"https://orcid.org/0000-0003-4024-8003"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Theo Tryfonas","raw_affiliation_strings":["Bristol Cryptography Group, University of Bristol, Bristol, UK","Bristol Cryptography Group, Faculty of Engineering, University of Bristol Queen's Building, University Walk, Bristol, BS8 1TR, UK"],"affiliations":[{"raw_affiliation_string":"Bristol Cryptography Group, University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"Bristol Cryptography Group, Faculty of Engineering, University of Bristol Queen's Building, University Walk, Bristol, BS8 1TR, UK","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034683400"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":null,"apc_paid":null,"fwci":15.3672,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.98708921,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.8460804224014282},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8222974538803101},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7200880646705627},{"id":"https://openalex.org/keywords/suspect","display_name":"Suspect","score":0.6850379705429077},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6279309391975403},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5781183838844299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5523197054862976},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.492645800113678},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.42256537079811096},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.3973767161369324},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25231873989105225},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17872199416160583},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1467246115207672}],"concepts":[{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.8460804224014282},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8222974538803101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7200880646705627},{"id":"https://openalex.org/C2778223634","wikidata":"https://www.wikidata.org/wiki/Q224952","display_name":"Suspect","level":2,"score":0.6850379705429077},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6279309391975403},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5781183838844299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5523197054862976},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.492645800113678},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.42256537079811096},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.3973767161369324},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25231873989105225},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17872199416160583},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1467246115207672},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/wifs.2012.6412634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:1479411","is_oa":false,"landing_page_url":"http://discovery.ucl.ac.uk/1479411/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"     In:    (pp. pp. 109-114).  IEEE (2012)     ","raw_type":"Proceedings paper"},{"id":"pmh:oai:eprints.uwe.ac.uk:29733","is_oa":true,"landing_page_url":"http://eprints.uwe.ac.uk/29733/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401464","display_name":"UWE Research Repository (UWE Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I178535277","host_organization_name":"University of the West of England","host_organization_lineage":["https://openalex.org/I178535277"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/23e279c8-10f7-4d47-b4f0-0039bd9e322c","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/23e279c8-10f7-4d47-b4f0-0039bd9e322c","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Andriotis, P, Oikonomou, G & Tryfonas, T 2012, Forensic analysis of wireless networking evidence of Android smartphones. in 2012 IEEE International Workshop on Information Forensics and Security (WIFS). https://doi.org/10.1109/wifs.2012.6412634","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/a6d533fc-7cfc-4bc1-b5e9-1a3702150dd3","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/a6d533fc-7cfc-4bc1-b5e9-1a3702150dd3","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Andriotis, P, Oikonomou, G & Tryfonas, T 2012, Forensic Analysis of Wireless Networking Evidence of Android Smartphones. in Workshop on Information Forensics and Security - WIFS 2012. Institute of Electrical and Electronics Engineers (IEEE), pp. 109-114. https://doi.org/10.1109/WIFS.2012.6412634","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:eprints.uwe.ac.uk:29733","is_oa":true,"landing_page_url":"http://eprints.uwe.ac.uk/29733/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401464","display_name":"UWE Research Repository (UWE Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I178535277","host_organization_name":"University of the West of England","host_organization_lineage":["https://openalex.org/I178535277"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W964073400","https://openalex.org/W1541594294","https://openalex.org/W1554958084","https://openalex.org/W1972940696","https://openalex.org/W2002978100","https://openalex.org/W2012032815","https://openalex.org/W2106628680","https://openalex.org/W2127718853","https://openalex.org/W6633275648"],"related_works":["https://openalex.org/W5341801","https://openalex.org/W2548287415","https://openalex.org/W2598491911","https://openalex.org/W4247205791","https://openalex.org/W2181728705","https://openalex.org/W4288054526","https://openalex.org/W3122539278","https://openalex.org/W1604717907","https://openalex.org/W4205890227","https://openalex.org/W2611755027"],"abstract_inverted_index":{"This":[0,91],"paper":[1],"introduces":[2],"a":[3,66,87],"method":[4,92,125],"for":[5,69,138,155],"acquiring":[6],"forensic-grade":[7],"evidence":[8,141],"from":[9],"Android":[10,56,89],"smartphones":[11],"using":[12,82,103,126],"open":[13],"source":[14],"tools.":[15],"We":[16,34,122],"investigate":[17],"in":[18,49,112],"particular":[19],"cases":[20],"where":[21],"the":[22,28,36,50,83,127],"suspect":[23,88],"has":[24],"made":[25,147],"use":[26],"of":[27,39,53,78,86,100,129,135,149,153],"smartphone's":[29],"Wi-Fi":[30,165],"or":[31],"Bluetooth":[32,163],"interfaces.":[33],"discuss":[35],"forensic":[37,70,157],"analysis":[38],"four":[40],"case":[41],"studies,":[42],"which":[43],"revealed":[44],"traces":[45],"that":[46,144],"were":[47],"left":[48],"inner":[51],"structure":[52],"three":[54],"mobile":[55,156],"devices":[57],"and":[58,106,142,164],"also":[59],"indicated":[60],"security":[61],"vulnerabilities.":[62],"Subsequently,":[63],"we":[64],"propose":[65],"detailed":[67],"plan":[68],"examiners":[71],"to":[72,96,108,114],"follow":[73],"when":[74],"dealing":[75],"with":[76,119],"investigations":[77],"potential":[79],"crimes":[80],"committed":[81],"wireless":[84,120],"facilities":[85],"smartphone.":[90],"can":[93],"be":[94],"followed":[95],"perform":[97],"physical":[98],"acquisition":[99],"data":[101],"without":[102],"commercial":[104],"tools":[105],"then":[107],"examine":[109],"them":[110],"safely":[111],"order":[113],"discover":[115],"any":[116],"activity":[117],"associated":[118],"communications.":[121],"evaluate":[123],"our":[124],"Association":[128],"Chief":[130],"Police":[131],"Officers'":[132],"(ACPO)":[133],"guidelines":[134],"good":[136],"practice":[137],"computer-based,":[139],"electronic":[140],"demonstrate":[143],"it":[145],"is":[146],"up":[148],"an":[150],"acceptable":[151],"host":[152],"procedures":[154],"analysis,":[158],"focused":[159],"specifically":[160],"on":[161],"device":[162],"facilities.":[166]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
