AFDroid: Anti-Forensics Device To Protect Android System

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 9, Issue 3

Abstract

Mobile devices are among the most common new technologies of the year, gaining even more spread over and success in the day-to-day life of wide range of people. Unfortunately, while the number of mobile devices are used in crime activities is spreading and growing all over the world, the capability to perform the forensics analysis of such devices is limited both by technological and methodological problems. In this paper, we focus on anti forensics techniques applied to mobile device. Furthermore we observe the effectiveness of techniques. 

Authors and Affiliations

Ahmad Talha Siddiqui, Shoeb Ahad Siddiqui, Mohammad Ibrahim

Keywords

Related Articles

Persuasion Processes in Consumer Intent to Read Online Product Reviews: A Study Based on the Elaboration Likelihood Model

Studies have shown that many prospective consumers have the intention of reading online reviews of a product before purchasing that product online. How this intention arises, however, has not been extensively investigate...

A Survey of Wireless Sensor Network Routing Protocols based on SPIN

SPIN(Sensor Protocols for Information via Negotiation) comprises of a set of adaptive protocols that proficiently disseminate data in wireless sensor network(WSN).SPIN overcomes certain deficiencies associated with some...

PERFORMANCE ANALYSIS OF OPEN SOURCE STORAGE CLOUDS IN CLOUD COMPUTING

Cloud computing is one of the latest research area that helps in storing the information permanently on the servers and manages the different resources for the requested users to provide on-demand services. In order to c...

Enhanced LTrP For Image Retrieval

Local Tetra Pattern (LTrP) is an image retrieval and indexing algorithm for content based image retrieval (CBIR) which made a significant improvement in the precision and recall rates of the retrieved images. Enhanced LT...

A SIGNATURE IDENTIFICATION SYSTEM WITH PRINCIPAL COMPONENT ANALYSIS AND STENTIFORD THINNING ALGORITHMS

Several biometric security systems have been implemented. Biometric is the use of a person’s physiological or behavioural characteristics to identify the individual. An example of behavioural method of biometric is sig...

Download PDF file
  • EP ID EP650160
  • DOI 10.24297/ijct.v9i3.3339
  • Views 139
  • Downloads 0

How To Cite

Ahmad Talha Siddiqui, Shoeb Ahad Siddiqui, Mohammad Ibrahim (2013). AFDroid: Anti-Forensics Device To Protect Android System. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 9(3), 1134-1138. https://europub.co.uk/articles/-A-650160