You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[Center for Information Security University of Tulsa](http://www.cis.utulsa.edu/)
37
36
*[West Virginia University](https://forensics.wvu.edu/)
38
37
39
38
## Europe
40
39
41
40
* Cranfield University, UK
42
41
* Limerick Institute of Technology
43
-
*[University of Amsterdam](http://www.studeren.uva.nl/ma-forensic-science)
42
+
* University of Amsterdam
44
43
* University of Bradford
45
44
* University of East London
46
45
* University College Dublin
47
46
*[University of Technology, Mauritius](https://www.utm.ac.mu/)
48
-
*[University of Strathclyde](http://www.strath.ac.uk/science/forensicinformatics/)
47
+
* University of Strathclyde
49
48
* University of Glamorgan, Wales, UK
50
-
*[University of Applied Sciences Albstadt-Sigmaringen, Germany](http://www.digitaleforensik.com),
49
+
* University of Applied Sciences Albstadt-Sigmaringen, Germany
51
50
Master of Science, Digital Forensics, in cooperation with University of
52
51
Mannheim and University of Tübingen, Germany
53
52
54
53
## Asia
55
54
56
-
*[Zayed University UAE](http://www.zu.ac.ae/main/en/colleges/colleges/college_information_technology/graduate_certificate_programs/cr_invest/intro.aspx)
55
+
* Zayed University UAE
57
56
58
57
## Australasia
59
58
@@ -67,5 +66,3 @@ tags:
67
66
68
67
*[American Academy of Forensic Sciences (AAFS)](https://www.aafs.org/)
69
68
*[Digital Forensics Association List](http://www.digitalforensicsassociation.org/formal-education/)
*[Master's Thesis: The Development of a Standard Digital Forensics Master's Curriculum](https://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1010&context=techmasters&sei-redir=1#search=%22katie%20strzempka%20thesis%22)
Copy file name to clipboardExpand all lines: docs/caselaw.md
-8Lines changed: 0 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,13 +92,5 @@ for interfering with the discovery process.
92
92
## External links
93
93
94
94
-[SETEC Investigations: Case Summaries](http://www.setecinvestigations.com/resources/casesummaries.php)
95
-
-[How to Evaluate a Digital Forensic Report – Part 1: A Brief History of Digital Forensics](http://www.lawandforensics.com/evaluate-digital-forensic-report-part-1-4/),
96
-
by Daniel B. Garrie, January 31, 2014
97
-
-[How to Evaluate a Digital Forensic Report – Part 2: Daubert](http://www.lawandforensics.com/evaluate-digital-forensic-report-part-2-4/),
98
-
by Daniel B. Garrie, February 4, 2014
99
-
-[How to Evaluate a Digital Forensic Report – Part 3: Experts](http://www.lawandforensics.com/evaluate-digital-forensic-report-part-3-4/),
100
-
by Daniel B. Garrie, February 10, 2014
101
-
-[How to Evaluate a Digital Forensic Report – Part 4 & Conclusion](http://www.lawandforensics.com/evaluate-digital-forensic-report-part-4-4/),
102
-
by Daniel B. Garrie, February 14, 2014
103
95
-[The Laptop, Slack Space and Child Pornography](http://cyb3rcrim3.blogspot.com/2015/08/the-laptop-slack-space-and-child.html),
Copy file name to clipboardExpand all lines: docs/cell_phone_forensics_research.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ forensics with the right mix of methods, techniques, and tools.
11
11
12
12
[The Future of Mobile Forensics](https://belkasoft.com/future-of-mobile-forensics), Oleg Afonin, Danil Nikolaev, Yuri Gubanov by [Belkasoft](belkasoft.md) Research, June 2015
13
13
14
-
[Data Acquisition from Cell Phone using Logical Approach](http://www.waset.org/pwaset/v26/v26-6.pdf), Keonwoo Kim, Dowon Hong, Kyoil Chung, and Jae-Cheol Ryou, PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY VOLUME 26 DECEMBER 2007 ISSN 1307-6884
14
+
[Data Acquisition from Cell Phone using Logical Approach](https://publications.waset.org/7561/data-acquisition-from-cell-phone-using-logical-approach), Keonwoo Kim, Dowon Hong, Kyoil Chung, and Jae-Cheol Ryou, PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY VOLUME 26 DECEMBER 2007 ISSN 1307-6884
15
15
This article discusses three approaches for acquiring data from cell phones:
16
16
physically removing the flash RAM chips and reading them directly; reading the
17
17
data out using the JTAG interface, and running software on the cell phone to
@@ -25,6 +25,6 @@ by James Luck & Mark Stokes, SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL.
25
25
26
26
## US Government Publications
27
27
28
-
[Guidelines on Cell Phone Forensics](https://csrc.nist.gov/publications/detail/sp/800-101/archive/2007-05-30) (NIST SP 800-101), May 2007
29
-
[Cell Phone Forensic Tools: An Overview and Analysis](https://csrc.nist.gov/publications/detail/nistir/7250/final) (NISTIR 7250)
30
-
[PDA Forensic Tools: An Overview and Analysis](https://csrc.nist.gov/publications/detail/nistir/7100/final) (NISTIR 7100)
28
+
*[Guidelines on Cell Phone Forensics](https://csrc.nist.gov/pubs/sp/800/101/final) (NIST SP 800-101), May 2007
29
+
*[Cell Phone Forensic Tools: An Overview and Analysis](https://csrc.nist.gov/pubs/ir/7250/final) (NISTIR 7250)
30
+
*[PDA Forensic Tools: An Overview and Analysis](https://csrc.nist.gov/pubs/ir/7100/final) (NISTIR 7100)
0 commit comments