Abstract
In the past few years mobile devices have advanced in a variety of ways such as internal power source capacity, internal memory storage, and CPU capabilities thereby increasing computing capacity while still maintaining a portable size for the owners of mobile devices, this essentially turning it into a portable data storage device where people store their personal information. These changes in the nature and sage of the mobile devices have led to their increased importance in areas such as legal implications in police or company investigations. In this paper we will conduct a bibliometric analysis of the subject of mobile forensics which will enable us to examine the degree to which this new development can become potential evidence, the advances investigators have made over time on the subject, the possible future technologies that could influence more changes in the field of mobile forensics and its impact, covering also the difference between mobile forensics and computer forensics.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
F. Daryabar, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices,” Aust. J. Forensic Sci., vol. 48, no. 6, pp. 615–642, 2016.
G. Grispos, T. Storer, and W. B. Glisson, “A comparison of forensic evidence recovery techniques for a windows mobile smart phone,” Digit. Investig., vol. 8, no. 1, pp. 23–36, 2011.
B. C. Ogazi-Onyemaechi, A. Dehghantanha, K. R. R. Choo, and others, “Performance of android forensics data recovery tools,” 2016.
F. Norouzizadeh Dezfouli, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms,” Aust. J. Forensic Sci., vol. 48, no. 4, pp. 469–488, 2016.
M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C. Wolf, “Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices,” in Proceedings - IEEE Symposium on Security and Privacy, 2011, pp. 96–111.
M. Petraityte, A. Dehghantanha, and others, “Mobile phone forensics: an investigative framework based on user impulsivity and secure collaboration errors,” 2016.
M. Yates, “Practical investigations of digital forensics tools for mobile devices,” 2010 Inf. Secur. Curric. Dev. Conf., pp. 156–162, 2010.
O. Ellegaard and J. A. Wallin, “The bibliometric analysis of scholarly production: How great is the impact?,” Scientometrics, vol. 105, no. 3, pp. 1809–1831, 2015.
A. F. Choudhri, A. Siddiqui, N. R. Khan, and H. L. Cohen, “Understanding Bibliometric Parameters and Analysis,” RadioGraphics, vol. 35, no. 3, pp. 736–746, 2015.
M. Olensky, M. Schmidt, and N. J. van Eck, “Evaluation of the citation matching algorithms of CWTS and iFQ in comparison to the Web of science,” J. Assoc. Inf. Sci. Technol., vol. 67, no. 10, pp. 2550–2564, Oct. 2016.
M. K. McBurney and P. L. Novak, “What is bibliometrics and why should you care?,” Proc. IEEE Int. Prof. Commun. Conf., pp. 108–114, 2002.
J. L. Howland, T. C. Wright, R. A. Boughan, and B. C. Roberts, “How Scholarly Is Google Scholar? A Comparison to Library Databases,” Coll. Res. Libr., vol. 70, no. 3, pp. 227–234, 2009.
E. Lopez-Cozar, Delgado, N. Robinson-Garcia, and D. Torres-Salinas, “Manipulating Google Scholar Citations and Google Scholar Metrics: simple, easy and tempting,” 2012.
A. Aghaei Chadegani et al., “A comparison between two main academic literature collections: Web of science and scopus databases,” Asian Soc. Sci., vol. 9, no. 5, pp. 18–26, 2013.
A. W. Harzing and S. Alakangas, “Google Scholar, Scopus and the Web of Science: a longitudinal and cross-disciplinary comparison,” Scientometrics, vol. 106, no. 2, pp. 787–804, 2016.
H. Pasula, B. Marthi, B. Milch, S. Russell, and I. Shpitser, “Identity uncertainty and citation matching,” Adv. Neural Inf. Process. Syst., pp. 1425–1432, 2003.
M. E. Mcveigh, “Citation Indexes and the Web of Science,” Encycl. Libr. Inf. Sci. Third Ed., no. August 2013, pp. 37–41, 2009.
T. Reuters, “WEB OF SCIENCE, Citation Report, Thomson Reuters,” Thomson Reuters, 2014.
A. A. for the A. of Science., “Historical Trends in Federal R&D | AAAS - The World’s Largest General Scientific Society,” Historical Trends in Federal R&D, 2016. [Online]. Available: https://www.aaas.org/page/historical-trends-federal-rd.
Tooska Dargahi, Ali Dehghantanha, and Mauro Conti, “Forensics Analysis of Android Mobile VoIP Apps,” in Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications, Elsevier, pp. 7–20.
M. N. Yusoff, R. Mahmod, A. Dehghantanha, and M. T. Abdullah, “An approach for forensic investigation in Firefox OS,” in Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2014 Third International Conference on, 2014, pp. 22–26.
A. Dehghantanha and K. Franke, “Privacy-respecting digital investigation,” in Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on, 2014, pp. 129–138.
M. Damshenas, A. Dehghantanha, K.-K. R. Choo, and R. Mahmud, “M0Droid: An Android Behavioral-Based Malware Detection Model,” J. Inf. Priv. Secur., vol. 11, no. 3, pp. 141–157, Jul. 2015.
K. Shaerpour, A. Dehghantanha, and R. Mahmod, “Trends In Android Malware Detection,” J. Digit. Forensics Secur. Law, vol. 8, no. 3, pp. 21–40, Sep. 2013.
N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng.
Amin Azmoudeh, Ali Dehghantanha and Kim-Kwang Raymond Choo, “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning”, IEEE Transactions on Sustainable Computing, 2017,
Hamed HaddadPajouh, Ali Dehghantanha, Raouf Khayami, and Kim-Kwang Raymond Choo, “Intelligent OS X Malware Threat Detection”, Journal of Computer Virology and Hacking Techniques, 2017
Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami, "Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence", IEEE Transactions on Emerging Topics in Computing, 2017 - DOI: 10.1109/TETC.2017.2756908
Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson, “Internet of Things Security and Forensics: Challenges and Opportunities”, Future Generation Computer Systems Journal, DoI: https://doi.org/10.1016/j.future.2017.07.060, 2017
Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Raymond Choo, “Detecting Crypto-Ransomware in IoT Networks Based On Energy Consumption Footprint”, Journal of Ambient Intelligence and Humanized Computing, DOI: 10.1007/s12652-017-0558-5, 2017
Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, and Mohd Taufik Abdullah, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Transactions on Sustainable Computing, DOI: 10.1109/TSUSC.2017.2687103, 2017.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Gill, J., Okere, I., HaddadPajouh, H., Dehghantanha, A. (2018). Mobile Forensics: A Bibliometric Analysis. In: Dehghantanha, A., Conti, M., Dargahi, T. (eds) Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-319-73951-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-73951-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73950-2
Online ISBN: 978-3-319-73951-9
eBook Packages: Computer ScienceComputer Science (R0)