measurements for whatsapp analysis using nist a

11
A Comparative Study of Forensic Tools For WhatsApp Analysis Using NIST Measurements By Imam Riadi WORD COUNT 3858 T IME SUBMIT T ED 16-NOV-2018 08:04AM PAPER ID 42008852

Upload: others

Post on 13-Jan-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

A Comparative Study of Forensic ToolsFor WhatsApp Analysis Using NIST

MeasurementsBy Imam Riadi

WORD COUNT 3858 TIME SUBMITTED 16-NOV-2018 08:04AM

PAPER ID 42008852

9%SIMILARITY INDEX

1

2

3

4

5

6

7

8

A Comparative Study of Forensic Tools For WhatsApp AnalysisUsing NIST MeasurementsORIGINALITY REPORT

PRIMARY SOURCES

icbbd2017.globalconf.orgInternet

www.ncjrs.govInternet

jubilaeumsportrait.deInternet

Sascha Alpers, Andreas Oberweis, Maria Pieper,Stefanie Betz, Andreas Fritsch, Gunther Schiefer,Manuela Wagner. "PRIVACY-AVARE: An approach to manageand distribute privacy settings", 2017 3rd IEEE InternationalConference on Computer and Communications (ICCC), 2017Crossref

droidors.comInternet

Jana Uramova, Pavel Segec, Marek Moravcik,Jozef Papan, Tomas Mokos, Marek Brodec."Packet capture infrastructure based on Moloch", 2017 15thInternational Conference on Emerging eLearning Technologiesand Applications (ICETA), 2017Crossref

www.ijcst.comInternet

K.-K.R. Choo, A. Dehghantanha. "ContemporaryDigital Forensics Investigations of Cloud and

28 words — 1%

25 words — 1%

25 words — 1%

20 words — < 1%

20 words — < 1%

19 words — < 1%

18 words — < 1%

17 words — < 1%

9

10

11

12

13

14

15

16

17

Mobile Applications", Elsevier BV, 2017Crossref

www.cs.cf.ac.ukInternet

Taniza Binti Tajuddin, Azizah Abd Manaf."Forensic investigation and analysis on digitalevidence discovery through physical acquisition on smartphone",2015 World Congress on Internet Security (WorldCIS), 2015Crossref

Saurav Yadav, Aviral Apurva, Pranshu Ranakoti,Shashank Tomer, Nihar Ranjan Roy. "Androidvulnerabilities and security", 2017 International Conference onComputing and Communication Technologies for Smart Nation(IC3TSN), 2017Crossref

www.strategicstudiesinstitute.army.milInternet

Alan J. Reid. "Chapter 2 A Brief History of theSmartphone", Springer Nature America, Inc, 2018Crossref

dblp.dagstuhl.deInternet

www.express.co.ukInternet

Radhika Padmanabhan, Karen Lobo, MrunaliGhelani, Dhanika Sujan, Mahesh Shirole."Comparative analysis of commercial and open source mobiledevice forensic tools", 2016 Ninth International Conference onContemporary Computing (IC3), 2016Crossref

cco.ndu.eduInternet

16 words — < 1%

15 words — < 1%

15 words — < 1%

15 words — < 1%

15 words — < 1%

14 words — < 1%

14 words — < 1%

14 words — < 1%

13 words — < 1%

18

19

20

21

22

23

EXCLUDE QUOTES OFF

EXCLUDE BIBLIOGRAPHY OFF

EXCLUDE MATCHES OFF

www.matec-conferences.orgInternet

www.faqs.orgInternet

mti.uad.ac.idInternet

ijain.orgInternet

www.thingser.comInternet

Ping Wang, Matt Rosenberg, Hubert D’Cruze."Chapter 13 Integration of Mobile Forensic ToolCapabilities", Springer Nature America, Inc, 2018Crossref

13 words — < 1%

13 words — < 1%

12 words — < 1%

11 words — < 1%

10 words — < 1%

9 words — < 1%