Journal Articles 2018(2 publications) [publication]Barbatsalou, K. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "Current and Future Trends in Mobile Device Forensics: A Survey", ACM Computing Surveys, vol. 51, pp. 46, 2018 [citation][year=2020]Dohyun Kim, Sangjin Lee, Study of identifying and managing the potential evidence for effective Android forensics, Forensic Science International: Digital Investigation, 2020, 200897, ISSN 2666-2817, https://doi.org/10.1016/j.fsidi.2019.200897. [citation][year=2019]Kruger, Jaco-Louis, and Hein Venter. "State of the art in Digital Forensics for the Internet of Things." International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 2019. [citation][year=2019]S. Duarte, C. Paisner, A. Tian, J. Yuen, "Development of STC Corporate Mobile Application", Worcester Polytechnic Institute Digital WPI, BSc project. Available at: https://web.wpi.edu/Pubs/E-project/Available/E-project-022719-022919/ [citation][year=2019]Xiaolu Zhang, Kim-Kwang Raymond Choo, Nicole Lang Beebe, "How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform", IEEE Internet of Things Journal, 2019. DOI: 10.1109/JIOT.2019.2912118. [citation][year=2019]Zhang X., Yuen T.T., Choo KK.R. (2020) Experiential Learning in Digital Forensics. In: Zhang X., Choo KK. (eds) Digital Forensic Education. Studies in Big Data, vol 61. Springer, Cham, 25 july 2019. [citation][year=2019]Abdullahi Aminu Kazaure, Aman Jantan, Mohd Najwadi Yusoff, Aminu Maigari, Mohamad Khairi Ishak, Nor Rizuan Mar Noor, "Evidence Collection and Forensic Challenges in Cloud Environment", MACE Technical Journal, Vol.1(01), pp. 19-24, eISSN: 2710-6632, December 2019. [citation][year=2019]Yan Jiang, Youwen Zhu, Jian Wang, Yong Xiang, Efficient authentication protocol with anonymity and key protection for mobile Internet users, Journal of Parallel and Distributed Computing, Volume 137, 2020, Pages 179-191, ISSN 0743-7315, DOI: 10.1016/j.jpdc.2019.11.010. [citation][year=2018]Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Arif Ahmed, S.M. Ahsan Kazmi, Choong Seon Hong, Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges, Future Generation Computer Systems, 2018, ISSN 0167-739X, https://doi.org/10.1016/j.future.2018.09.058. [citation][year=2018]Li, C.-Y., Huang, C.-C., Lai, F., Lee, S.-L., Wu, J., "A Comprehensive Overview of Government Hacking Worldwide", (2018) IEEE Access, 6, art. no. 8470931, pp. 55053-55073. DOI: 10.1109/ACCESS.2018.2871762 [citation][year=2018]Umair A., Nanda P., He X., Choo KK.R. (2018) User Relationship Classification of Facebook Messenger Mobile Data using WEKA. In: Au M. et al. (eds) Network and System Security. NSS 2018. Lecture Notes in Computer Science, vol 11058. Springer, Cham. DOI: 10.1007/978-3-030-02744-5_25 [citation][year=2018]Atkinson, Jamiella. "Mobile Device Forensics: Overview, Challenges, and Guideline Developmental Opportunities." MsC thesis, Utica College, ProQuest Dissertations Publishing, 2018. 13422253. Available at: https://search.proquest.com/openview/a88b32750ae71056cbd608202fa18f12 [publication]Barbatsalou, K. and Tiago Cruz and Simões, P. and Edmundo Monteiro , "Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence", IEEE Access (Open Access), vol. 6, pp. 59705-59727, 2018