Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/11614
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOjeniyi, J.A-
dc.contributor.authorAlhassan, J. K-
dc.contributor.authorAhmad, s-
dc.contributor.authorOjeniyi, A. A.-
dc.date.accessioned2021-07-26T11:05:12Z-
dc.date.available2021-07-26T11:05:12Z-
dc.date.issued2016-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/11614-
dc.description.abstractIn the earlier years, there has been an exponential growth in the figure of smartphone users. Smartphone protects and manages enormous amount of evidence pertaining to its owner. the tenacity of this work is to evaluate forensically TECNO S3 running the Jelly Bean Android Operating System, using forensic tools, which is important for investigators as it offers greater safety relating to an individual's privacy rights. furthermore, smartphones are moderately new form of digital devices that are intensifying speedily in the public. The smartphone is evaluated with the following forensic tools: Paraben device seizure, Mobiledit, AFLogical - OSE. The work minimises manual user interaction, delivers an outline of what can be acquired and the forensic integrity of such items upon recovery, and the reason for any changes to the device.en_US
dc.language.isoenen_US
dc.publisherIsteams Cross-Border Multidisciplinary Conferenceen_US
dc.subjectForensically sound, operating system,en_US
dc.subjectimage, logical acquisition, physical acquisitionen_US
dc.titleIntegrity-Based Evaluation of Forensic Tools on Android Jelly Beanen_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
iSteam 2016.pdf1.33 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.