-
1
-
-
84885172209
-
Got an iPhone or 3G iPad?
-
accessed November
-
Allan A, Warden P. Got an iPhone or 3G iPad? Apple is recording your moves. http://radar.oreilly.com/2011/04/apple-locationtracking.html [accessed November 2012].
-
(2012)
Apple Is Recording Your Moves
-
-
Allan, A.1
Warden, P.2
-
2
-
-
84961346783
-
Smudge attacks on smartphone touch screens
-
In: USENIX Association
-
Aviv A, Gibson K, Mossop E, Blaze M, Smith J. Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX conference onoffensive technologies. USENIX Association; 2010. p. 1-7.
-
(2010)
Proceedings of the 4th USENIX Conference Onoffensive Technologies
, pp. 1-7
-
-
Aviv, A.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.5
-
3
-
-
85030497980
-
Das IT-Grundrecht: Funktion, Schutzgehalt, Auswirkungeb auf staatliche Ermittlungen
-
In: Uerpmann-Wittzack, editor. Berlin
-
Bäcker M. Das IT-Grundrecht: Funktion, Schutzgehalt, Auswirkungeb auf staatliche Ermittlungen. In: Uerpmann-Wittzack, editor. Das neue Computergrundrecht, Recht der Informationsgesellschaft 2009;Bd 15. p. 53-60. Berlin.
-
(2009)
Das Neue Computergrundrecht, Recht der Informationsgesellschaft
, vol.15
, pp. 53-60
-
-
Bäcker, M.1
-
5
-
-
35048842427
-
Activity recognition from user-annotated acceleration data
-
In: Ferscha A, Mattern F, editors. Springer; LNCS-3001
-
Bao L, Intille S. Activity recognition from user-annotated acceleration data. In: Ferscha A, Mattern F, editors. Pervasive computing. Springer; 2004. p. 1-17. LNCS-3001.
-
(2004)
Pervasive Computing
, pp. 1-17
-
-
Bao, L.1
Intille, S.2
-
6
-
-
19844379355
-
A hierarchical, objectives-based framework for the digital investigations process
-
Beebe N, Clark J. A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation 2005;2(2):147-67.
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 147-167
-
-
Beebe, N.1
Clark, J.2
-
7
-
-
84862208081
-
The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations
-
Bennett D. The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations. Information Security Journal: A Global Perspective 2012;21(3):159-68.
-
(2012)
Information Security Journal: A Global Perspective
, vol.21
, Issue.3
, pp. 159-168
-
-
Bennett, D.1
-
13
-
-
77952104315
-
Introduction to windows mobile forensics
-
Casey E, Bann M, Doyle J. Introduction to windows mobile forensics. Digital Investigation 2010;6(34):136-46.
-
(2010)
Digital Investigation
, vol.6
, Issue.34
, pp. 136-146
-
-
Casey, E.1
Bann, M.2
Doyle, J.3
-
14
-
-
78650219914
-
Online gesture recognition for user interface on accelerometer built-in mobile phones
-
In: Wong K, et al., editors. Springer; LNCS-6444
-
Choe B, Min J, Cho S. Online gesture recognition for user interface on accelerometer built-in mobile phones. In: Wong K, et al., editors. Neural information processing. Models and applications. Springer; 2010. p. 650-7. LNCS-6444.
-
(2010)
Neural Information Processing. Models and Applications
, pp. 650-657
-
-
Choe, B.1
Min, J.2
Cho, S.3
-
15
-
-
42549108326
-
The mobile sensing platform: An embedded activity recognition system
-
Choudhury T, Consolvo S, Harrison B, Hightower J, LaMarca A, LeGrand L, et al. The mobile sensing platform: an embedded activity recognition system. IEEE Pervasive Computing 2008;7(2):32-41.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.2
, pp. 32-41
-
-
Choudhury, T.1
Consolvo, S.2
Harrison, B.3
Hightower, J.4
Lamarca, A.5
Legrand, L.6
-
18
-
-
84885178134
-
Green paper on detection technologies in the work of law enforcement, customs and other security authorities
-
Commission of the European Communities
-
Commission of the European Communities. Green paper on detection technologies in the work of law enforcement, customs and other security authorities. Technical report COM(2006) 474 final 2006.
-
(2006)
Technical Report COM(2006) 474 Final
-
-
-
20
-
-
84885175873
-
A theoretical process model for smartphones
-
In: Meghanathan N, et al., editors. Springer; AISC-178
-
Dancer F, Dampier D, Jackson J, Meghanathan N. A theoretical process model for smartphones. In: Meghanathan N, et al., editors. Advances in computing and information technology. Springer; 2013. p. 279-90. AISC-178.
-
(2013)
Advances in Computing and Information Technology
, pp. 279-290
-
-
Dancer, F.1
Dampier, D.2
Jackson, J.3
Meghanathan, N.4
-
23
-
-
48749091043
-
An overall assessment of mobile internal acquisition tool
-
Distefano A, Me G. An overall assessment of mobile internal acquisition tool. Digital Investigation 2008;5(Suppl.):121-7.
-
(2008)
Digital Investigation
, vol.5
, Issue.SUPPL.
, pp. 121-127
-
-
Distefano, A.1
Me, G.2
-
25
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
Felt A, Ha E, Egelman S, Haney A, Chin E, Wagner D. Android permissions: user attention, comprehension, and behavior. In: Proceedings of the symposium on usable privacy and security (SOUPS 2012); 2012b.
-
(2012)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2012)
-
-
Felt, A.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
26
-
-
85046879731
-
Permission redelegation: Attacks and defenses
-
In: USA
-
Felt A, Wang H, Moshchuk A, Hanna S, Chin E. Permission redelegation: attacks and defenses. In: Proceedings of the 20th USENIX security symposium, USA; 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Felt, A.1
Wang, H.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
28
-
-
84885174387
-
-
Google. [accessed November]
-
Google. Android security overview. http://source.android.com/tech/ security/index.html [accessed November 2012].
-
(2012)
Android Security Overview
-
-
-
30
-
-
80051672577
-
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
-
Grispos G, Storer T, Glisson WB. A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation 2011;8(1):23-36.
-
(2011)
Digital Investigation
, vol.8
, Issue.1
, pp. 23-36
-
-
Grispos, G.1
Storer, T.2
Glisson, W.B.3
-
31
-
-
84885181958
-
Market share analysis: Mobile devices, worldwide, 2Q12
-
Gartner
-
Gupta A, Cozza R, Milanesi C, Lu C. Market share analysis: mobile devices, worldwide, 2Q12. Technical report G00238277. Gartner; 2012.
-
(2012)
Technical Report G00238277
-
-
Gupta, A.1
Cozza, R.2
Milanesi, C.3
Lu, C.4
-
32
-
-
77954766268
-
Freiheit und Sicherheit im Angesicht terroristischer Anschläge
-
Hoffmann-Riem W. Freiheit und Sicherheit im Angesicht terroristischer Anschläge. Zeitschrift für Rechtspolitik 2002;35:497.
-
(2002)
Zeitschrift für Rechtspolitik
, vol.35
, pp. 497
-
-
Hoffmann-Riem, W.1
-
33
-
-
84885172816
-
Android forensic techniques
-
In: Boston: Syngress
-
Hoog A. Android forensic techniques. In: Android forensics. Boston: Syngress; 2011. p. 195-284.
-
(2011)
Android Forensics
, pp. 195-284
-
-
Hoog, A.1
-
34
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications
-
In: USA: ACM
-
Hornyack P, Han S, Jung J, Schechter S, Wetherall D. These aren't the droids you're looking for: retrofitting Android to protect data from imperious applications. In: Proceedings of the 18th ACM conference on computer and communications security (ACM CCS 2011). USA: ACM; 2011. p. 639-52.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011)
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
35
-
-
84885890014
-
IForensics: Forensic analysis of instant messaging on smart phones
-
In: Goel S, et al., editors. Springer; LNICST-31
-
Husain MI, Sridhar R. iForensics: forensic analysis of instant messaging on smart phones. In: Goel S, et al., editors. Digital forensics and cyber crime. Springer; 2010. p. 9-18. LNICST-31.
-
(2010)
Digital Forensics and Cyber Crime
, pp. 9-18
-
-
Husain, M.I.1
Sridhar, R.2
-
36
-
-
33746255206
-
Digital forensics investigation framework that incorporate legal issues
-
Ieong R, Forza A. Digital forensics investigation framework that incorporate legal issues. Digital Investigation 2006;3(Suppl.):29-36.
-
(2006)
Digital Investigation
, vol.3
, Issue.SUPPL.
, pp. 29-36
-
-
Ieong, R.1
Forza, A.2
-
37
-
-
0034446783
-
Evaluating certificate status information mechanisms
-
In: ACM
-
Iliadis J, Spinellis D, Gritzalis D, Preneel B, Katsikas S. Evaluating certificate status information mechanisms. In: Proceedings of the 7th ACM conference on computer and communications security (CCS '00). ACM;2000. p. 1-8.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS '00)
, pp. 1-8
-
-
Iliadis, J.1
Spinellis, D.2
Gritzalis, D.3
Preneel, B.4
Katsikas, S.5
-
39
-
-
79960138845
-
Sensitive privacy data acquisition in the iPhone for digital forensic analysis
-
In: Park J, et al., editors. Springer; CCIS-186
-
Jung J, Jeong C, Byun K, Lee S. Sensitive privacy data acquisition in the iPhone for digital forensic analysis. In: Park J, et al., editors. Secure and trust computing, data management and applications. Springer; 2011. p. 172-86. CCIS-186.
-
(2011)
Secure and Trust Computing, Data Management and Applications
, pp. 172-186
-
-
Jung, J.1
Jeong, C.2
Byun, K.3
Lee, S.4
-
40
-
-
78049354490
-
An insider threat prediction model
-
In: Katsikas S, et al., editors. Springer; LNCS 6264
-
Kandias M, Mylonas A, Virvilis N, Theoharidou M, Gritzalis D. An insider threat prediction model. In: Katsikas S, et al., editors. Proceedings of the 7th international conference on trust, privacy, and security in digital business (TrustBus 2010). Springer; 2010. p. 26-37. LNCS 6264.
-
(2010)
Proceedings of the 7th International Conference on Trust, Privacy, and Security in Digital Business (TrustBus 2010)
, pp. 26-37
-
-
Kandias, M.1
Mylonas, A.2
Virvilis, N.3
Theoharidou, M.4
Gritzalis, D.5
-
42
-
-
84867438639
-
A conundrum of permissions: Installing applications on an Android smartphone
-
Kelley P, Consolvo S, Cranor L, Jung J, Sadeh N, Wetherall D. A conundrum of permissions: installing applications on an Android smartphone. In: Proceedings of the workshop on usable security (USEC); 2012.
-
(2012)
Proceedings of the Workshop on Usable Security (USEC)
-
-
Kelley, P.1
Consolvo, S.2
Cranor, L.3
Jung, J.4
Sadeh, N.5
Wetherall, D.6
-
43
-
-
26944499607
-
Wearable sensing to annotate meeting recordings
-
Kern N, Schiele B, Junker H, Lukowicz P, Trster G. Wearable sensing to annotate meeting recordings. Personal and Ubiquitous Computing 2003;7:263-74.
-
(2003)
Personal and Ubiquitous Computing
, vol.7
, pp. 263-274
-
-
Kern, N.1
Schiele, B.2
Junker, H.3
Lukowicz, P.4
Trster, G.5
-
44
-
-
30644459230
-
Searches and seizures in a digital world
-
Kerr OS. Searches and seizures in a digital world. Harvard Law Review 2005;119:531-86.
-
(2005)
Harvard Law Review
, vol.119
, pp. 531-586
-
-
Kerr, O.S.1
-
45
-
-
77956366233
-
A triaxial accelerometer-based physical-activity recognition via augmented-signal features and a hierarchical recognizer
-
Khan A, Lee YK, Lee S, Kim TS. A triaxial accelerometer-based physical-activity recognition via augmented-signal features and a hierarchical recognizer. IEEE Transactions on Information Technology in Biomedicine 2010;14(5):1166-72.
-
(2010)
IEEE Transactions on Information Technology in Biomedicine
, vol.14
, Issue.5
, pp. 1166-1172
-
-
Khan, A.1
Lee, Y.K.2
Lee, S.3
Kim, T.S.4
-
46
-
-
77952241813
-
Windows mobile advanced forensics
-
Klaver C. Windows mobile advanced forensics. Digital Investigation 2010;6(34):147-67.
-
(2010)
Digital Investigation
, vol.6
, Issue.34
, pp. 147-167
-
-
Klaver, C.1
-
48
-
-
84872701603
-
On the creation of reliable digital evidence
-
In: Peterson G, et al., editors. Springer; AICT-383
-
Kuntze N, Rudolph C, Alva A, Endicott-Popovsky B, Christiansen J, Kemmerich T. On the creation of reliable digital evidence. In: Peterson G, et al., editors. Advances in digital forensics. Springer; 2012. p. 3-17. AICT-383.
-
(2012)
Advances in Digital Forensics
, pp. 3-17
-
-
Kuntze, N.1
Rudolph, C.2
Alva, A.3
Endicott-Popovsky, B.4
Christiansen, J.5
Kemmerich, T.6
-
50
-
-
23444459747
-
Secure electronic voting: The current landscape
-
In: Gritzalis D, editor. Springer: Advances in Information Security
-
Lambrinoudakis C, Gritzalis D, Tsoumas V, Karyda M, Ikonomopoulos S. Secure electronic voting: the current landscape. In: Gritzalis D, editor. Secure electronic voting. Springer: Advances in Information Security; 2003. p. 101-22.
-
(2003)
Secure Electronic Voting
, pp. 101-122
-
-
Lambrinoudakis, C.1
Gritzalis, D.2
Tsoumas, V.3
Karyda, M.4
Ikonomopoulos, S.5
-
51
-
-
77956382087
-
A survey of mobile phone sensing
-
Lane N, Miluzzo E, Lu H, Peebles D, Choudhury T, Campbell A. A survey of mobile phone sensing. IEEE Communications Magazine 2010;48(9):140-50.
-
(2010)
IEEE Communications Magazine
, vol.48
, Issue.9
, pp. 140-150
-
-
Lane, N.1
Miluzzo, E.2
Lu, H.3
Peebles, D.4
Choudhury, T.5
Campbell, A.6
-
52
-
-
84885178475
-
Android forensics: Simplifying cell phone examinations
-
Purdue University
-
Lessard J, Kessler G. Android forensics: simplifying cell phone examinations. Purdue University; 2010. Technical report.
-
(2010)
Technical Report
-
-
Lessard, J.1
Kessler, G.2
-
53
-
-
33745906533
-
A practical approach to recognizing physical activities
-
In: Fishkin K, et al., editors. Springer; LNCS-3968
-
Lester J, Choudhury T, Borriello G. A practical approach to recognizing physical activities. In: Fishkin K, et al., editors. Pervasive computing. Springer; 2006. p. 1-16. LNCS-3968.
-
(2006)
Pervasive Computing
, pp. 1-16
-
-
Lester, J.1
Choudhury, T.2
Borriello, G.3
-
54
-
-
70449645004
-
Uwave: Accelerometer-based personalized gesture recognition and its applications
-
Liu J, Zhong L, Wickramasuriya J, Vasudevan V. Uwave: accelerometer-based personalized gesture recognition and its applications. Pervasiveand Mobile Computing 2009;5(6):657-75.
-
(2009)
Pervasiveand Mobile Computing
, vol.5
, Issue.6
, pp. 657-675
-
-
Liu, J.1
Zhong, L.2
Wickramasuriya, J.3
Vasudevan, V.4
-
56
-
-
33646811518
-
Identifying users of portable devices from gait pattern with accelerometers
-
Mantyjarvi J, Lindholm M, Vildjiounaite E, Makela SM, Ailisto H. Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP '05); 2005. p. 973-6.
-
(2005)
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05)
, pp. 973-976
-
-
Mantyjarvi, J.1
Lindholm, M.2
Vildjiounaite, E.3
Makela, S.M.4
Ailisto, H.5
-
59
-
-
48749093257
-
Acquisition of a Symbian smart phones content with an on-phone forensic tool
-
Mokhonoana P, Olivier M. Acquisition of a Symbian smart phones content with an on-phone forensic tool 2007. Technical report.
-
(2007)
Technical Report
-
-
Mokhonoana, P.1
Olivier, M.2
-
62
-
-
72449162905
-
Electronic crime scene investigation: A guide for first responders
-
National Institute of Justice
-
Mukasey M, Sedgwick J, Hagy D. Electronic crime scene investigation: a guide for first responders. Technical report NCJ 219941. National Institute of Justice; 2008.
-
(2008)
Technical Report NCJ 219941
-
-
Mukasey, M.1
Sedgwick, J.2
Hagy, D.3
-
63
-
-
84864628454
-
Forensic analysis of social networking applications on mobile devices
-
Mutawa N, Baggili I, Marrington A. Forensic analysis of social networking applications on mobile devices. Digital Investigation 2012;9(Suppl.):S24-33.
-
(2012)
Digital Investigation
, vol.9
, Issue.SUPPL.
-
-
Mutawa, N.1
Baggili, I.2
Marrington, A.3
-
64
-
-
84863964653
-
-
Master's thesis, Royal Holloway, University of London
-
Mylonas A. Smartphone spying tools. Master's thesis, Royal Holloway, University of London; 2008.
-
(2008)
Smartphone Spying Tools
-
-
Mylonas, A.1
-
65
-
-
80052493767
-
Smartphone security evaluation: The malware attack case
-
In: Samarati P, Lopez J, editors. SciTePress
-
Mylonas A, Dritsas S, Tsoumas B, Dimitris G. Smartphone security evaluation: the malware attack case. In: Samarati P, Lopez J, editors. Proceedings of the international conference of security and cryptography (SECRYPT 2011). SciTePress; 2011a. p. 25-36.
-
(2011)
Proceedings of the International Conference of Security and Cryptography (SECRYPT 2011)
, pp. 25-36
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Dimitris, G.4
-
66
-
-
80052791491
-
A secure smartphone applications roll-out scheme
-
In: France: Springer; LNCS-6863
-
Mylonas A, Tsoumas B, Dritsas S, Gritzalis D. A secure smartphone applications roll-out scheme. In: Proc. of the 8th international conference on trust, privacy & security in digital business (TRUST-2011). France: Springer; 2011b. p. 49-61. LNCS-6863.
-
(2011)
Proc. Of the 8th International Conference on Trust, Privacy & Security in Digital Business (TRUST-2011)
, pp. 49-61
-
-
Mylonas, A.1
Tsoumas, B.2
Dritsas, S.3
Gritzalis, D.4
-
67
-
-
84882242289
-
On the feasibility of malware attacks in smartphone platforms
-
In: Obaidad M, et al., editors. CCIS: Springer
-
Mylonas A, Dritsas S, Tsoumas B, Gritzalis D. On the feasibility of malware attacks in smartphone platforms. In: Obaidad M, et al., editors. Security and cryptography. CCIS: Springer; 2012a. p. 217-32.
-
(2012)
Security and Cryptography
, pp. 217-232
-
-
Mylonas, A.1
Dritsas, S.2
Tsoumas, B.3
Gritzalis, D.4
-
68
-
-
84891843335
-
Delegate the smartphone user? Security awareness in smartphone platforms
-
Mylonas A, Kastania A, Gritzalis D. Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security 2013;34:47-66.
-
(2013)
Computers & Security
, vol.34
, pp. 47-66
-
-
Mylonas, A.1
Kastania, A.2
Gritzalis, D.3
-
69
-
-
84863931121
-
Smartphone forensics: A proactive investigation scheme for evidence acquisition
-
In: Gritzalis D, et al., editors. Springer; AICT-376
-
Mylonas A, Meletiadis V, Tsoumas B, Mitrou L, Gritzalis D. Smartphone forensics: a proactive investigation scheme for evidence acquisition. In: Gritzalis D, et al., editors. Proceedings of the 27th IFIP international information security and privacy conference. Springer; 2012b. p. 249-60. AICT-376.
-
(2012)
Proceedings of the 27th IFIP International Information Security and Privacy Conference
, pp. 249-260
-
-
Mylonas, A.1
Meletiadis, V.2
Tsoumas, B.3
Mitrou, L.4
Gritzalis, D.5
-
71
-
-
84870255379
-
Forensic analysis techniques for fragmented flash memory pages in smartphones
-
Park J, Chung H, Lee S. Forensic analysis techniques for fragmented flash memory pages in smartphones. Digital Investigation 2012.
-
(2012)
Digital Investigation
-
-
Park, J.1
Chung, H.2
Lee, S.3
-
72
-
-
77952103184
-
Full user data acquisition from Symbian smart phones
-
Pooters I. Full user data acquisition from Symbian smart phones. Digital Investigation 2010;6(34):125-35.
-
(2010)
Digital Investigation
, vol.6
, Issue.34
, pp. 125-135
-
-
Pooters, I.1
-
73
-
-
77954889333
-
Forensic investigation process model for windows mobile devices
-
Security Group - Tata Elxsi
-
Ramabhadran A. Forensic investigation process model for windows mobile devices. Technical report. Security Group - Tata Elxsi; 2009.
-
(2009)
Technical Report
-
-
Ramabhadran, A.1
-
75
-
-
78449255925
-
Windows mobile advanced forensics: An alternative to existing tools
-
Rehault F. Windows mobile advanced forensics: an alternative to existing tools. Digital Investigation 2010;7(1-2):38-47.
-
(2010)
Digital Investigation
, vol.7
, Issue.1-2
, pp. 38-47
-
-
Rehault, F.1
-
78
-
-
50849087527
-
Computer forensics field triage process model
-
Rogers M, Goldman J, Mislan R, Wedge T, Debrota S. Computer forensics field triage process model. In: Proceedings of the conference on digital forensics security and law; 2006. p. 27-40.
-
(2006)
Proceedings of the Conference on Digital Forensics Security and Law
, pp. 27-40
-
-
Rogers, M.1
Goldman, J.2
Mislan, R.3
Wedge, T.4
Debrota, S.5
-
79
-
-
85030496146
-
Ubiquitous smartphones, zero privacy
-
Rose C. Ubiquitous smartphones, zero privacy. Review of Business Information Systems 2012;16(4):187-92.
-
(2012)
Review of Business Information Systems
, vol.16
, Issue.4
, pp. 187-192
-
-
Rose, C.1
-
80
-
-
85030490194
-
The judicial response to mass police surveillance
-
Rushin S. The judicial response to mass police surveillance. Journal of Law, Technology & Policy 2011;2011(2):282-328.
-
(2011)
Journal of Law, Technology & Policy
, vol.2011
, Issue.2
, pp. 282-328
-
-
Rushin, S.1
-
81
-
-
84916607248
-
Fourth amendment search and the power of the hash
-
Salgado RP. Fourth amendment search and the power of the hash. Harvard Law Review 2005;119:38-46.
-
(2005)
Harvard Law Review
, vol.119
, pp. 38-46
-
-
Salgado, R.P.1
-
82
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound Trojan for smartphones
-
Schlegel R, Zhang K, Zhou X, Intwala M, Kapadia A, Wang X. Soundcomber: a stealthy and context-aware sound Trojan for smartphones. In: Proceedings of the 18th annual network and distributed system security symposium (NDSS2011);2011. p. 17-33.
-
(2011)
Proceedings of the 18th Annual Network and distributed system security symposium (NDSS2011)
, pp. 17-33
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
83
-
-
84857917909
-
Acquisition and analysis of volatile memory from Android devices
-
Sylve J, Case A, Marziale L, Richard G. Acquisition and analysis of volatile memory from Android devices. Digital Investigation 2012;8(34):175-84.
-
(2012)
Digital Investigation
, vol.8
, Issue.34
, pp. 175-184
-
-
Sylve, J.1
Case, A.2
Marziale, L.3
Richard, G.4
-
85
-
-
84863927277
-
A risk assessment method for smartphones
-
In: Gritzalis D, et al., editors. Springer; AICT-376
-
Theoharidou M, Mylonas A, Gritzalis D. A risk assessment method for smartphones. In: Gritzalis D, et al., editors. Proceedings of the 27th IFIP information security and privacy conference. Springer; 2012. p. 428-40. AICT-376.
-
(2012)
Proceedings of the 27th IFIP Information Security and Privacy Conference
, pp. 428-440
-
-
Theoharidou, M.1
Mylonas, A.2
Gritzalis, D.3
-
86
-
-
84869795641
-
Symbian smartphone forensics: Linear bitwise data acquisition and fragmentation analysis
-
In: Kim T, et al., editors. Springer
-
Thing V, Chua TW. Symbian smartphone forensics: linear bitwise data acquisition and fragmentation analysis. In: Kim T, et al., editors. Computer applications for security, control and system engineering. Communications in computer and information science. Springer; 2012. p. 62-9.
-
(2012)
Computer Applications for Security, Control and System Engineering. Communications in Computer and Information Science
, pp. 62-69
-
-
Thing, V.1
Chua, T.W.2
-
88
-
-
84868333843
-
Symbian smartphone forensics and security: Recovery of privacy-protected deleted data
-
In: Chim T, Yuen T, editors. Springer; LNCS-7618
-
Thing V, Tan D. Symbian smartphone forensics and security: recovery of privacy-protected deleted data. In: Chim T, Yuen T, editors. Information and communications security. Springer; 2012. p. 240-51. LNCS-7618.
-
(2012)
Information and Communications Security
, pp. 240-251
-
-
Thing, V.1
Tan, D.2
-
89
-
-
84885182761
-
The right in confidentiality and integrity of information technology systems according to the German Federal Constitutional Court: Old wine in new bottles?
-
In: Bottis M, editor. Athens
-
Togias S. The right in confidentiality and integrity of information technology systems according to the German Federal Constitutional Court: old wine in new bottles? In: Bottis M, editor. An information law for the 21st century 2010. p. 530-40. Athens.
-
(2010)
An Information Law for the 21st Century
, pp. 530-540
-
-
Togias, S.1
-
90
-
-
79961091178
-
Toward a general collection methodology for Android devices
-
Vidas T, Zhang C, Christin N. Toward a general collection methodology for Android devices. Digital Investigation 2011;8(Suppl. 1):S14-24.
-
(2011)
Digital Investigation
, vol.8
, Issue.SUPPL. 1
-
-
Vidas, T.1
Zhang, C.2
Christin, N.3
-
92
-
-
84867385708
-
Using computer forensics when investigating system attacks
-
Sun Client Solutions Security Expertise Center
-
Weise J, Powell B. Using computer forensics when investigating system attacks. Technical report 819-2262-10. Sun Client Solutions Security Expertise Center; 2005.
-
(2005)
Technical Report 819-2262-10
-
-
Weise, J.1
Powell, B.2
-
93
-
-
84863943450
-
The new fundamental right to IT security - First evaluation and comparative view at the U.S
-
Wiebe A. The new fundamental right to IT security - first evaluation and comparative view at the U.S. Datenschutz und Datensicherheit 2008;32(11):713-6.
-
(2008)
Datenschutz und Datensicherheit
, vol.32
, Issue.11
, pp. 713-716
-
-
Wiebe, A.1
-
94
-
-
67849089096
-
Agents, Trojans and tags: The next generation of investigators
-
Wiebke A. Agents, Trojans and tags: the next generation of investigators. International Review of Law, Computers & Technology 2009;23(1-2):99-108.
-
(2009)
International Review of Law, Computers & Technology
, vol.23
, Issue.1-2
, pp. 99-108
-
-
Wiebke, A.1
-
95
-
-
33745186968
-
Good practice guide for computerbased electronic evidence
-
UK Association of Chief Police Officers
-
Wilkinson S, Haagman D. Good practice guide for computerbased electronic evidence. Technical report v. 4. UK Association of Chief Police Officers; 2007.
-
(2007)
Technical Report V. 4
-
-
Wilkinson, S.1
Haagman, D.2
-
96
-
-
70349263625
-
Stealthy video capturer: A new video-based spyware in 3G smartphones
-
In: USA: ACM
-
Xu N, Zhang F, Luo Y, Jia W, Xuan D, Teng J. Stealthy video capturer: a new video-based spyware in 3G smartphones. In: Proceedings of the 2nd ACM conference on wireless network security. USA: ACM; 2009. p. 69-78.
-
(2009)
Proceedings of the 2nd ACM Conference on Wireless Network Security
, pp. 69-78
-
-
Xu, N.1
Zhang, F.2
Luo, Y.3
Jia, W.4
Xuan, D.5
Teng, J.6
-
97
-
-
78049361506
-
A process model for forensic analysis of Symbian smart phones
-
In: Springer; CCIS-59
-
Yu X, Jiang LH, Shu H, Yin Q, Liu TM. A process model for forensic analysis of Symbian smart phones. In: Advances in software engineering. Springer; 2009. p. 86-93. CCIS-59.
-
(2009)
Advances in Software Engineering
, pp. 86-93
-
-
Yu, X.1
Jiang, L.H.2
Shu, H.3
Yin, Q.4
Liu, T.M.5
-
98
-
-
0001134191
-
A framework for information systems architecture
-
Zachman J. A framework for information systems architecture. IBM Systems Journal 1987;26(3):276-92.
-
(1987)
IBM Systems Journal
, vol.26
, Issue.3
, pp. 276-292
-
-
Zachman, J.1
-
99
-
-
84886370864
-
IPhone forensics: Recovering evidence, personal data, and corporate assets
-
Zdziarski J. iPhone forensics: recovering evidence, personal data, and corporate assets. O'Reilly Media; 2008.
-
(2008)
O'Reilly Media
-
-
Zdziarski, J.1
-
101
-
-
85037359376
-
Taming information-stealing smartphone applications (on Android)
-
In: McCune J, et al., editors. Springer; LNCS-6740
-
Zhou Y, Zhang X, Jiang X, Freeh V. Taming information-stealing smartphone applications (on Android). In: McCune J, et al., editors. Trust and trustworthy computing. Springer; 2011. p. 93-107. LNCS-6740.
-
(2011)
Trust and Trustworthy Computing
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.4
|