Return to Article Details Forensics Analysis of Lock Application on Mobile Devices Download Download PDF