DAFTAR PUSTAKA
Ajala, I., 2006, Spatial Analysis of GSM Subscriber Call Data Records, Directions Magazine. Alghafli, K.A, Jones, A. and Martin, T.A., 2011, Guidelines for the digital forensic processing of smartphones, Australian Digital Forensics Conference, Australia. Androulidakis, I.I., 2012, Mobile Phone Security and Forensics, Springer, New York. Ayers, R.,Jansen, W.,Cilleros, N. and Daniellou, R., 2005, Cell Phone Forensic Tools : an Overview and Analysis, National Institute of Standard of Technology, pp.1-188, Gethershburg. Bendredjem, D., 2007, Contributions to Cyber-Forensics: Processes and Email Analysis, Thesis, Concordia University, Canada. Chasta, M., 2012, Android Forensic, Mumbai, India. Casey, E., 2004, Digital Evidence and Computer Crime, Second Edition, Elsevier, ISBN 0-12-163104-4. Casey, E., 2009, Handbook of Digital Forensics and Investigation, Academic Press, pp. 567, ISBN 0-12-374267-6, Retrieved 27 August 2010. EC-COUNCIL., 2012, CHFI V 4 module 14:Linux Forensic, EC-Council. EC-COUNCIL., 2012, CHFI V 8 module 20:Mobile Forensic, EC-Council. Franke, K., 2010, Digital and Computational Forensics. Forensic Lab Testimon: NISlab. Garfinkel, S. L., Android Forensics Associate Professor, Naval School.
Postgraduate
Gavin, P., Robinson, L.A. and Ellis, R., 2010, Digital Forensic. Gonzalo, F., Mauricio, G. and Luciano, M., 2009, Introduccion al uso de Exiftool, Short Paper, Facultad de Ciencias Astronomicas Y Geoficas, Universidad Nacional de La Plata.
74
Guido, M., Ondricek, J., Grover, J.,Wilburn, D., Nguyen, T and Hunt, A., 2013, Automated Identification of Installed Malicious Android Applications, Int. J. digital investigation 10 S96-104, pp.1-9. Hoog, A., 2011, Android Forensics Investigation, Analysis and Mobile Security for Google Android, United State of America. Ho, W. C .C., 2010, E-Mail Forensics : Tracing and Mapping Digital Evidence from IP Address, Thesis,University of Auckland, New Zealand. Institute, SANS., 2005, Analyze an image and Perform Forensic GCFA (GIAC Certified Forensic Analysis) Practical Assignment Version 1.5, Paper, Francisco. Jansen, W. and Ayers, R., 2007, Guidelines on Cell Phone Forensics, National Institute of Standards and Technology, United State of America. John, J. L., 2012, Digital Forensics and Preservation, International Standard Serial Number: 2048-7916. Knight, B., 2010, Mobile Devices: iPhone Risks and Forensic Tool Capability, Thesis, faculty of Design and Creative Technologies AUT University, Auckland, New Zealand. Koen, Renico., 2009, The Development of an Open-Source Forensic Platform, Disertation, Engineering Bulit Environment and Information Technology, University of Pretoria. Lessard, J. and Kessler G.C., 2010, Android Forensics : Simplifying Cell Phone Examination, Int. J. small scale digital device forensics., Vol. 4(1), pp.1–12. Lestari, Meka., 2008, Sistem Keamanan Jaringan Komputer penyembunyian (steganografi) pesan menggunakan image dan mp3, Karya Ilmiah, Teknik Informatika, Universitas Sriwijaya, Palembang. Mahmoud, T.M. and Mahfouz, A.M., 2012, SMS Spam Filtering Technique Based on Artificial Immune System, Int. J. Computer Science Issues, Vol. 9, pp.589-597, Egypt. Maus, S., Höfken, H. and Schuba, M., 2011, Forensic Analysis of Geodata in Android Smartphones, Thesis, FH Aachen, University of Applied Sciences, Germany.
75
McCarthy, P., 2005, Forensic Analysis of Mobile Phones, Thesis, Computer and Information Science (Honours) Degree, University of South Australia. Mohindra, D., 2008, The Android Project Incident Response and Forensics, Spring, pp.1-18. Morrissey, S., 2010, Learn forensic methods and procedures for iOS data acquisition and analysis, Apress, United State of America. Mukhtidi, K., 2012, Sistem SMS Spam Detector untuk SMS Berbahasa Indonesia pada Smartphone Android, Skripsi, Ilmu Komputer, Institut Pertanian Bogor. Mutawa, N. Al., Baggili, I. and Marrington, A., 2012, Forensic Analysis of Social Networking Applications on Mobil Devices, Int. J. Dig. Inves,Vol. 9, pp.24–33. Nuh, A. M., 2012, Digital Forensic Panduan Praktis Investigasi Komputer, jilid I, Penerbit Salemba Infotek, Jakarta Selatan. Puspasari, J., 2012, Analisis Mobile Forensic pada Sistem Operasi Symbian, Skripsi, Teknik Informatika, Universitas Islam Indonesia, Yogyakarta. Putri, R.U., 2012, Network Forensic Analysis Case Study SQL Injection Attack on Server Gadjah Mada University, Thesis, Computer Science, Gadjah Mada University, Yogyakarta. Quick, D. and Alzaabi, M., 2011, Forensic Analysis of the Android File System YAFFS2, Conference Proceeding, pp.1-11. Racioppo, C. and Murthy, N., Android Forensics: A Case Study of the “HTC Incredible” Phone,Thesis, Seidenberg School of CSIS, Pace University, New York. Selamat, S.R., Yusof, R. and Sahib, R., 2008, Mapping Process of Digital Forensic Investigation Framework, Int. J. Comp. Science and Network Security, Vol. 8, pp. 163-169. Sobieraj, S.C., 2008, Mobile Device Forensics Case File Integrity thesis, Purdue University West Lafayette, Indiana.
Verification,
Spreitzenbarth, M.,2009, Mobile Phone Forensics, Thesis, University of Mannheim.
76
Syahputra, A., 2003, Forensik Komputer, Tesis, Universitas Gadjah Mada. Vidas, T., Zhang, C. and Christin, N., 2011, Towards a General Collection Methodology for Android Devices, Int. J. Digital Investigation,8, pp. S14S24. Vijayan, V., 2012, Android Forensic Capability and Evaluation of Extraction Tools, Tesis, Edinburgh Napier University. Waggoner, K., 2007, Handbook of Forensic Services, An FBI Laboratory Publication Federal Bureau of Investigation, Quantico, Virginia. Widyanto, D., 2004, Forensik Komputer: Evaluasi Autopsy dan Sleuthkit, Makalah, Departemen Teknik Elektro Institut Teknologi Bandung. Willassen, S.Y., 2003, Forensic Analysis of Mobile Phone Internal Memory, pp.1-23. Winarno, E. and Zaki, A., 2012, Windows Forensic, PT Elex Media Komputindo, Jakarta. Yates, M., 2010, Practical Investigations of Digital Forensics Tools for Mobile Devices, Department of Computer and Information Sciences, Florida Agricultural and Mechanical University, pp.156-162, Florida. Zhu (Monica), M., 2011, Mobile Cloud Computing: Implications to Smartphone Forensic Procedures and Methodologies, Thesis, Auckland University of Technology, New Zealand. Zimmermann, C., 2011, Mobile Phone Forensics: Analysis of the Android Filesystem (YAFFS2), Thesis, University of Mannheim. Zulfariansyah, M., 2012, Forensic Ipod Touch, Skripsi, Teknik Informatika, Universitas Islam Indonesia, Yogyakarta.