Description
Due to the shortcomings of modern Mobile Device Management solutions, businesses
have begun to incorporate forensics to analyze their mobile devices and respond
to any incidents of malicious activity in order to protect their sensitive data. Current
forensic tools, however, can only look a static image of the device being examined,
Download count: 0
Details
Contributors
- Whitaker, Jeremy (Author)
- Ahn, Gail-Joon (Thesis advisor)
- Doupe, Adam (Committee member)
- Yau, Stephen (Committee member)
- Arizona State University (Publisher)
Date Created
The date the item was original created (prior to any relationship with the ASU Digital Repositories.)
2015
Subjects
Resource Type
Collections this item is in
Note
- Partial requirement for: M.S., Arizona State University, 2015Note typethesis
- Includes bibliographical references (pages 70-71)Note typebibliography
- Field of study: Computer science
Citation and reuse
Statement of Responsibility
by Jeremy Whitaker