Presents work from thought leaders who provide cutting-edge research in digital forensic investigations for cloud and mobile device applications
Chapter 1: Contemporary Digital Forensics Investigations of Cloud
and Mobile Applications
Chapter 2: Forensics Analysis of Android Mobile VoIP Apps
Chapter 3: Investigating America Online Instant Messaging
Application: Data Remnants on Windows 8.1 Client Machine
Chapter 4: Forensic Investigation of Social Media and Instant
Messaging Services in Firefox OS: Facebook, Twitter, Google+,
Telegram, OpenWapp, and Line as Case Studies
Chapter 5: Network Traffic Forensics on Firefox Mobile OS:
Facebook, Twitter, and Telegram as Case Studies
Chapter 6: Mobile Phone Forensics: An Investigative Framework Based
on User Impulsivity and Secure Collaboration Errors
Chapter 7: Performance of Android Forensics Data Recovery Tools
Chapter 8: Honeypots for Employee Information Security Awareness
and Education Training: A Conceptual EASY Training Model
Chapter 9: Implications of Emerging Technologies to Incident
Handling and Digital Forensic Strategies: A Routine Activity
Theory
Chapter 10: Forensic Readiness: A Case Study on Digital CCTV
Systems Antiforensics
Chapter 11: Forensic Visualization: Survey and Future Research
Directions
Chapter 12: Investigating Storage as a Service Cloud Platform:
pCloud as a Case Study
Chapter 13: Cloud Storage Forensics: Analysis of Data Remnants on
SpiderOak, JustCloud, and pCloud
Chapter 14: Residual Cloud Forensics: CloudMe and 360Yunpan as Case
Studies
Chapter 15: An Android Cloud Storage Apps Forensic Taxonomy
Kim-Kwang Raymond Choo is currently a cloud technology endowed associate professor at University of Texas at San Antonio, an associate professor at the University of South Australia, and a guest professor at China University of Geosciences. He has been an invited speaker for a number of events, such as the 2011 UNODC-ITU Asia-Pacific Regional Workshop on Fighting Cybercrime, the Korean (Government) Institute of Criminology (2013), the UNAFEI and UAE Government conference in 2014, and the World Internet Conference (Wuzhen Summit) in 2014, jointly organized by the Cyberspace Administration of China and the People's Government of Zhejiang Province. He has also been a Keynote/Plenary Speaker at conferences such as SERENE-RISC Spring 2016 Workshop, IEEE International Conference on Data Science and Data Intensive Systems (DSDIS 2015) and those organised by Infocomm Development Authority of Singapore, A*Star, Nanyang Technological University and Singapore Management University (2015) , Cloud Security Alliance New Zealand (2015), CSO Australia and Trend Micro (2015) , Anti-Phishing Working Group (2014), National Taiwan University of Science and Technology (2014), Asia Pacific University of Technology & Innovation (Malaysia; 2014), Nanyang Technological University (Singapore; 2011), and National Chiayi University (Taiwan; 2010); and an Invited Expert at UNAFEI Criminal Justice Training in 2015, at INTERPOL Cyber Research Agenda Workshop 2015, and at Taiwan Ministry of Justice Investigation Bureau’s 2015 International Symposium on Regional Security and Transnational Crimes . He was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine / Microsoft’s Next 100 series in 2009, and is the recipient of various awards including ESORICS 2015 Best Research Paper Award, Winning Team in Germany's University of Erlangen-Nuremberg (FAU) Digital Forensics Research Challenge 2015, Highly Commended Award from Australia New Zealand Policing Advisory Agency in 2014, Fulbright Scholarship in 2009, British Computer Society’s Wilkes Award in 2008, and 2008 Australia Day Achievement Medallion. He is a Fellow of the Australian Computer Society, and a Senior Member of the IEEE. Ali Dehghantanha is serving as a Mari-Curie International Incoming Research Fellow in cyber forensics at University of Salford, Manchester, UK. Ali has served for several years in a variety of industrial and academic positions with leading players in Cyber-Security and Digital Forensics. He has a long history of working in different areas of computer security as a security researcher, malware analyzer, penetration tester, security consultant, and forensic analyst. He regularly travels the globe on speaking, teaching, and consulting engagements and assist clients in securing their information assets. Ali is imminently qualified in the field of cyber-security; he holds Ph.D in Security in Computing and a number of professional qualifications namely GREM, CCFP,CISSP, CISM ISMS L.A, CEH, CHFI, ECSA, and ECIH and he is the founder of annual “International Conference in Cyber-Security, Cyber Warfare and Digital Forensics (CyberSec).
![]() |
Ask a Question About this Product More... |
![]() |