International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 5, May 2017


A Survey on Forensic Analysis of Android Memory

Kousthubha Balachandra | Dr Aravinda C V


Abstract: Today when there are more than 1 billion Android clients everywhere throughout the world, it demonstrates that its prominence has no equivalent. Nowadays' cell phones have turned out to be so intrusive in our day by day experience that when they required can give colossal measure of data to criminological inspectors. We likewise found that IOS are all the more effective when contrasted with Android working framework. The paper expects to unite them under a similar review with the goal that this paper could fill in as a beginning stage for a few android clients, future criminological analysts and examiners.


Keywords: Security, Android forensic, verification, Android tools


Edition: Volume 6 Issue 5, May 2017,


Pages: 2179 - 2183


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Kousthubha Balachandra, Dr Aravinda C V, "A Survey on Forensic Analysis of Android Memory", International Journal of Science and Research (IJSR), Volume 6 Issue 5, May 2017, pp. 2179-2183, https://www.ijsr.net/get_abstract.php?paper_id=ART20173700

Similar Articles with Keyword 'Security'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article
Top