308
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      One-Click Submission System Now Available for SO Preprints, learn more on how this works in our blog post and don't forget to check the video, too!

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Mobile forensics techniques, tools and intrusion detection : : Mobile devices, mobile forensics, forensics tool, Forensics law.

      Preprint
      In review
      research-article
        1 ,
      ScienceOpen Preprints
      ScienceOpen
      Mobile devices, mobile forensics, forensics tool, Forensics law
      Bookmark

            Abstract

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            9 March 2023
            Affiliations
            [1 ] ;
            Author notes
            Author information
            https://orcid.org/0009-0000-4589-7331
            Article
            10.14293/S2199-1006.1.SOR-.PPTQSCP.v1
            78497899-eadf-4f7e-bf3e-9ab312c00fb4

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 9 March 2023
            Categories

            All data generated or analysed during this study are included in this published article (and its supplementary information files).
            Security & Cryptology,General computer science
            Mobile devices, mobile forensics,forensics tool,Forensics law

            Comments

            Comment on this article