Skip to main content

Mobile Forensics: A Bibliometric Analysis

  • Chapter
  • First Online:
Cyber Threat Intelligence

Part of the book series: Advances in Information Security ((ADIS,volume 70))

Abstract

In the past few years mobile devices have advanced in a variety of ways such as internal power source capacity, internal memory storage, and CPU capabilities thereby increasing computing capacity while still maintaining a portable size for the owners of mobile devices, this essentially turning it into a portable data storage device where people store their personal information. These changes in the nature and sage of the mobile devices have led to their increased importance in areas such as legal implications in police or company investigations. In this paper we will conduct a bibliometric analysis of the subject of mobile forensics which will enable us to examine the degree to which this new development can become potential evidence, the advances investigators have made over time on the subject, the possible future technologies that could influence more changes in the field of mobile forensics and its impact, covering also the difference between mobile forensics and computer forensics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. F. Daryabar, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices,” Aust. J. Forensic Sci., vol. 48, no. 6, pp. 615–642, 2016.

    Google Scholar 

  2. G. Grispos, T. Storer, and W. B. Glisson, “A comparison of forensic evidence recovery techniques for a windows mobile smart phone,” Digit. Investig., vol. 8, no. 1, pp. 23–36, 2011.

    Google Scholar 

  3. B. C. Ogazi-Onyemaechi, A. Dehghantanha, K. R. R. Choo, and others, “Performance of android forensics data recovery tools,” 2016.

    Google Scholar 

  4. F. Norouzizadeh Dezfouli, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms,” Aust. J. Forensic Sci., vol. 48, no. 4, pp. 469–488, 2016.

    Google Scholar 

  5. M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C. Wolf, “Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices,” in Proceedings - IEEE Symposium on Security and Privacy, 2011, pp. 96–111.

    Google Scholar 

  6. M. Petraityte, A. Dehghantanha, and others, “Mobile phone forensics: an investigative framework based on user impulsivity and secure collaboration errors,” 2016.

    Google Scholar 

  7. M. Yates, “Practical investigations of digital forensics tools for mobile devices,” 2010 Inf. Secur. Curric. Dev. Conf., pp. 156–162, 2010.

    Google Scholar 

  8. O. Ellegaard and J. A. Wallin, “The bibliometric analysis of scholarly production: How great is the impact?,” Scientometrics, vol. 105, no. 3, pp. 1809–1831, 2015.

    Google Scholar 

  9. A. F. Choudhri, A. Siddiqui, N. R. Khan, and H. L. Cohen, “Understanding Bibliometric Parameters and Analysis,” RadioGraphics, vol. 35, no. 3, pp. 736–746, 2015.

    Google Scholar 

  10. M. Olensky, M. Schmidt, and N. J. van Eck, “Evaluation of the citation matching algorithms of CWTS and iFQ in comparison to the Web of science,” J. Assoc. Inf. Sci. Technol., vol. 67, no. 10, pp. 2550–2564, Oct. 2016.

    Google Scholar 

  11. M. K. McBurney and P. L. Novak, “What is bibliometrics and why should you care?,” Proc. IEEE Int. Prof. Commun. Conf., pp. 108–114, 2002.

    Google Scholar 

  12. J. L. Howland, T. C. Wright, R. A. Boughan, and B. C. Roberts, “How Scholarly Is Google Scholar? A Comparison to Library Databases,” Coll. Res. Libr., vol. 70, no. 3, pp. 227–234, 2009.

    Google Scholar 

  13. E. Lopez-Cozar, Delgado, N. Robinson-Garcia, and D. Torres-Salinas, “Manipulating Google Scholar Citations and Google Scholar Metrics: simple, easy and tempting,” 2012.

    Google Scholar 

  14. A. Aghaei Chadegani et al., “A comparison between two main academic literature collections: Web of science and scopus databases,” Asian Soc. Sci., vol. 9, no. 5, pp. 18–26, 2013.

    Google Scholar 

  15. A. W. Harzing and S. Alakangas, “Google Scholar, Scopus and the Web of Science: a longitudinal and cross-disciplinary comparison,” Scientometrics, vol. 106, no. 2, pp. 787–804, 2016.

    Google Scholar 

  16. H. Pasula, B. Marthi, B. Milch, S. Russell, and I. Shpitser, “Identity uncertainty and citation matching,” Adv. Neural Inf. Process. Syst., pp. 1425–1432, 2003.

    Google Scholar 

  17. M. E. Mcveigh, “Citation Indexes and the Web of Science,” Encycl. Libr. Inf. Sci. Third Ed., no. August 2013, pp. 37–41, 2009.

    Google Scholar 

  18. T. Reuters, “WEB OF SCIENCE, Citation Report, Thomson Reuters,” Thomson Reuters, 2014.

    Google Scholar 

  19. A. A. for the A. of Science., “Historical Trends in Federal R&D | AAAS - The World’s Largest General Scientific Society,” Historical Trends in Federal R&D, 2016. [Online]. Available: https://www.aaas.org/page/historical-trends-federal-rd.

  20. Tooska Dargahi, Ali Dehghantanha, and Mauro Conti, “Forensics Analysis of Android Mobile VoIP Apps,” in Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications, Elsevier, pp. 7–20.

    Google Scholar 

  21. M. N. Yusoff, R. Mahmod, A. Dehghantanha, and M. T. Abdullah, “An approach for forensic investigation in Firefox OS,” in Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2014 Third International Conference on, 2014, pp. 22–26.

    Google Scholar 

  22. A. Dehghantanha and K. Franke, “Privacy-respecting digital investigation,” in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014, pp. 129–138.

    Google Scholar 

  23. M. Damshenas, A. Dehghantanha, K.-K. R. Choo, and R. Mahmud, “M0Droid: An Android Behavioral-Based Malware Detection Model,” J. Inf. Priv. Secur., vol. 11, no. 3, pp. 141–157, Jul. 2015.

    Google Scholar 

  24. K. Shaerpour, A. Dehghantanha, and R. Mahmod, “Trends In Android Malware Detection,” J. Digit. Forensics Secur. Law, vol. 8, no. 3, pp. 21–40, Sep. 2013.

    Google Scholar 

  25. N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng.

    Google Scholar 

  26. Amin Azmoudeh, Ali Dehghantanha and Kim-Kwang Raymond Choo, “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning”, IEEE Transactions on Sustainable Computing, 2017,

    Google Scholar 

  27. Hamed HaddadPajouh, Ali Dehghantanha, Raouf Khayami, and Kim-Kwang Raymond Choo, “Intelligent OS X Malware Threat Detection”, Journal of Computer Virology and Hacking Techniques, 2017

    Google Scholar 

  28. Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami, "Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence", IEEE Transactions on Emerging Topics in Computing, 2017 - DOI: 10.1109/TETC.2017.2756908

    Google Scholar 

  29. Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson, “Internet of Things Security and Forensics: Challenges and Opportunities”, Future Generation Computer Systems Journal, DoI: https://doi.org/10.1016/j.future.2017.07.060, 2017

  30. Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Raymond Choo, “Detecting Crypto-Ransomware in IoT Networks Based On Energy Consumption Footprint”, Journal of Ambient Intelligence and Humanized Computing, DOI: 10.1007/s12652-017-0558-5, 2017

    Google Scholar 

  31. Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, and Mohd Taufik Abdullah, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Transactions on Sustainable Computing, DOI: 10.1109/TSUSC.2017.2687103, 2017.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Dehghantanha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gill, J., Okere, I., HaddadPajouh, H., Dehghantanha, A. (2018). Mobile Forensics: A Bibliometric Analysis. In: Dehghantanha, A., Conti, M., Dargahi, T. (eds) Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-319-73951-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73951-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73950-2

  • Online ISBN: 978-3-319-73951-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics