4Me G, Rossi M. Internal forensic acquisition for mobile equip-ments [C]. IEEE International Symposium on Parallel and Distributed Processing, 2008. 被引量:1
5Wayne Jansen, Rick Ayers. Guidelines on cell phone forensics [EB/OL]. http: //csrc. nist. gov/publications/nistpubs/800- 101/SP800-101. PDF, 2007. 被引量:1
6Paul Owen, Paula Thomas, Duncan Mcphee. An analysis of the digital forensic examination of mobile phones [C]. Inf Security Res Group, Univ of Glamorgan, Pontypridd, UK: Fourth International Conference on Next Generation Mobile Applications, Services and Technologies, 2010: 25-29. 被引量:1
7The Common Digital Evidence Storage Format Working Group. Standardizing digital evidence storage [J]. Communication of the ACM, 2006, 49 (2), 67-68. 被引量:1
8Shira Danker, Rick Ayers, Richard P Mislan. Hashing techniques for mobile device forensics [J]. Small Scale Digital Device ForensicsJournal, 2009, 6 (3): 1-6. 被引量:1
9Alessandro Distefano, Antonio Grillo, Alessandro Lentini, et al. Mobile forensics data integrity assessment by event monitoring [J]. Small Scale Digital Device Forensics Journal, 2010, 4 (1): 1-7. http://www. ssddfj.org/papers/SSDDFJ. 被引量:1
10Verma R K, Tomar D S, Rathore S K. Extraction and Verifi cation of Mobile Message Integrity [C]. Katra, Jammu: International Conference on Communication Systems and Network Technologies, 2011: 49-53. 被引量:1