{"id":"https://openalex.org/W250543701","doi":"https://doi.org/10.4018/ijdcf.2015010101","title":"Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices","display_name":"Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W250543701","doi":"https://doi.org/10.4018/ijdcf.2015010101","mag":"250543701"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2015010101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2015010101","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020077102","display_name":"Xuejiao Wan","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuejiao Wan","raw_affiliation_strings":["School of Software Engineering, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032712488","display_name":"Jingsha He","orcid":"https://orcid.org/0000-0002-8122-8052"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingsha He","raw_affiliation_strings":["School of Software Engineering, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035244613","display_name":"Gongzheng Liu","orcid":"https://orcid.org/0000-0002-4324-6233"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gongzheng Liu","raw_affiliation_strings":["School of Software Engineering, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061069541","display_name":"Na Huang","orcid":"https://orcid.org/0000-0001-7009-4418"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Na Huang","raw_affiliation_strings":["School of Software Engineering, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021479320","display_name":"Xingye Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingye Zhu","raw_affiliation_strings":["School of Software Engineering, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100662780","display_name":"Bin Zhao","orcid":"https://orcid.org/0000-0001-9922-1409"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Zhao","raw_affiliation_strings":["School of Software Engineering, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016997196","display_name":"Yonghao Mai","orcid":null},"institutions":[{"id":"https://openalex.org/I75900474","display_name":"Hubei University","ror":"https://ror.org/03a60m280","country_code":"CN","type":"education","lineage":["https://openalex.org/I75900474"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yonghao Mai","raw_affiliation_strings":["Electronic Forensics Laboratory, Hubei University of Police, Hubei, China","Electronic Forensics Laboratory, Hubei University of Police, Hubei, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Electronic Forensics Laboratory, Hubei University of Police, Hubei, China","institution_ids":["https://openalex.org/I75900474"]},{"raw_affiliation_string":"Electronic Forensics Laboratory, Hubei University of Police, Hubei, China#TAB#","institution_ids":["https://openalex.org/I75900474"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5020077102"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.00397674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"7","issue":"1","first_page":"1","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8485946655273438},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.8334866762161255},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.78898024559021},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.6144018769264221},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.5059115290641785},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4820450246334076},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.42474985122680664},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.4105954170227051},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.389750212430954},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21616503596305847},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10999831557273865}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8485946655273438},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.8334866762161255},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78898024559021},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.6144018769264221},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.5059115290641785},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4820450246334076},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.42474985122680664},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.4105954170227051},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.389750212430954},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21616503596305847},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10999831557273865}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijdcf.2015010101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2015010101","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jdcf00:v:7:y:2015:i:1:p:1-25","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJDCF.2015010101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W34499976","https://openalex.org/W69212879","https://openalex.org/W86845558","https://openalex.org/W98704370","https://openalex.org/W184170192","https://openalex.org/W198332557","https://openalex.org/W1568587784","https://openalex.org/W1615839980","https://openalex.org/W1969238379","https://openalex.org/W1970399788","https://openalex.org/W1971764700","https://openalex.org/W1972940696","https://openalex.org/W1989037929","https://openalex.org/W1998518913","https://openalex.org/W1998964974","https://openalex.org/W2007965640","https://openalex.org/W2013043416","https://openalex.org/W2016924386","https://openalex.org/W2018099246","https://openalex.org/W2024713489","https://openalex.org/W2025461955","https://openalex.org/W2026083579","https://openalex.org/W2033156121","https://openalex.org/W2035172801","https://openalex.org/W2042299587","https://openalex.org/W2042897376","https://openalex.org/W2044165460","https://openalex.org/W2047216782","https://openalex.org/W2048668978","https://openalex.org/W2049231004","https://openalex.org/W2055466883","https://openalex.org/W2056141528","https://openalex.org/W2068332316","https://openalex.org/W2072761052","https://openalex.org/W2085684154","https://openalex.org/W2086310931","https://openalex.org/W2100248998","https://openalex.org/W2106965741","https://openalex.org/W2110054048","https://openalex.org/W2114381584","https://openalex.org/W2141688068","https://openalex.org/W2143318444","https://openalex.org/W2160727041","https://openalex.org/W2164890035","https://openalex.org/W2168154523","https://openalex.org/W2543785088"],"related_works":["https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4281834465","https://openalex.org/W3024263644","https://openalex.org/W3018602826","https://openalex.org/W4283205458","https://openalex.org/W4385257722","https://openalex.org/W1903637638","https://openalex.org/W3001565613","https://openalex.org/W4206448886"],"abstract_inverted_index":{"During":[0],"the":[1,10,21,27,66,80,86,91,105,118],"rapid":[2,38],"development":[3,24],"of":[4,56,65,83,107,120],"mobile":[5],"wireless":[6],"technologies":[7,108],"and":[8,85,113,123,128,137],"applications,":[9],"Android":[11,84],"operating":[12],"system,":[13],"due":[14],"to":[15,70],"its":[16],"open-source":[17],"characteristics,":[18],"has":[19],"become":[20,48],"most":[22],"popular":[23,115],"platform":[25],"in":[26,40,90,96,109,117,143],"smartphone":[28],"market.":[29],"Meanwhile,":[30],"as":[31],"Android-based":[32,97,110,144],"intelligent":[33],"mobiles":[34],"devices":[35,46],"experience":[36],"a":[37],"increase":[39],"numbers,":[41],"high-tech":[42],"crimes":[43],"involving":[44],"such":[45],"have":[47],"more":[49],"versatile,":[50],"affecting":[51],"an":[52,62],"ever":[53],"increasing":[54],"amount":[55],"data,":[57],"thus":[58],"making":[59],"digital":[60,98,111,145],"evidence":[61,67],"indispensable":[63],"part":[64],"that":[68],"needs":[69],"be":[71],"seriously":[72],"dealt":[73],"with":[74],"during":[75],"crime":[76],"investigations.":[77],"Consequently,":[78],"understanding":[79],"internal":[81],"structure":[82],"various":[87],"data":[88,121,129],"operations":[89],"file":[92,125],"systems":[93],"becomes":[94],"necessary":[95],"forensics.":[99,146],"In":[100],"this":[101],"paper,":[102],"we":[103],"survey":[104],"state-of-the-art":[106],"forensics":[112],"some":[114,134],"tools":[116],"aspects":[119],"recovery":[122],"acquisition,":[124],"system":[126],"analysis":[127],"analysis.":[130],"We":[131],"also":[132],"discuss":[133],"technical":[135],"challenges":[136],"point":[138],"out":[139],"future":[140],"research":[141],"directions":[142]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
