Using network traffic to verify mobile device forensic artifacts | IEEE Conference Publication | IEEE Xplore