-
1
-
-
64249090328
-
Smart phone for mobile commerce
-
Chang, Y.F., Chen, C.S., and Zhou, H., "Smart Phone for Mobile Commerce", Computer Standards & Interfaces, 31(4), 2009, pp. 740-747.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 740-747
-
-
Chang, Y.F.1
Chen, C.S.2
Zhou, H.3
-
2
-
-
84873712223
-
A survey on security for mobile devices
-
La Polla, M., Martinelli, F., and Sgandurra, D., "A Survey on Security for Mobile Devices", Communications Surveys & Tutorials, IEEE, 15(1), 2013, pp. 446-471.
-
(2013)
Communications Surveys & Tutorials, IEEE
, vol.15
, Issue.1
, pp. 446-471
-
-
La Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
3
-
-
84902251260
-
A longitudinal study of information privacy on mobile devices
-
Keith, M.J., Babb, J., and Lowry, P.B., "A Longitudinal Study of Information Privacy on Mobile Devices", Proceedings of the 47th Hawaii International Conference on Systems Sciences (HICSS), 2014, pp. 3149-3158.
-
(2014)
Proceedings of the 47th Hawaii International Conference on Systems Sciences (HICSS
, pp. 3149-3158
-
-
Keith, M.J.1
Babb, J.2
Lowry, P.B.3
-
4
-
-
84889085369
-
A critical review of 7 years of mobile device forensics
-
Barmpatsalou, K., Damopoulos, D., Kambourakis, G., and Katos, V., "A Critical Review of 7 Years of Mobile Device Forensics", Digital Investigation, 10(4), 2013, pp. 323-349.
-
(2013)
Digital Investigation
, vol.10
, Issue.4
, pp. 323-349
-
-
Barmpatsalou, K.1
Damopoulos, D.2
Kambourakis, G.3
Katos, V.4
-
5
-
-
84912008171
-
Exfiltrating data from android devices
-
Do, Q., Martini, B., and Choo, K.-K.R., "Exfiltrating Data from Android Devices", Computers & Security, 48(0), 2015, pp. 74-91.
-
(2015)
Computers & Security
, vol.48
, pp. 74-91
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
6
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., and Yao, A.C., "On the Security of Public Key Protocols", IEEE Transactions on Information Theory, 29(2), 1983, pp. 198-208.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
7
-
-
84864628454
-
Forensic analysis of social networking applications on mobile devices
-
Al Mutawa, N., Baggili, I., and Marrington, A., "Forensic Analysis of Social Networking Applications on Mobile Devices", Digital Investigation, 9(Supplement), 2012, pp. S24-S33.
-
(2012)
Digital Investigation
, vol.9
, pp. S24-S33
-
-
Al Mutawa, N.1
Baggili, I.2
Marrington, A.3
-
8
-
-
84963610168
-
Privacy risks in mobile dating apps
-
Farnden, J., Martini, B., and Choo, K.-K.R., "Privacy Risks in Mobile Dating Apps", Proceedings of the 21st Americas Conference on Information Systems (AMCIS), 2015
-
(2015)
Proceedings of the 21st Americas Conference on Information Systems (AMCIS)
-
-
Farnden, J.1
Martini, B.2
Choo, K.-K.R.3
-
9
-
-
79952945178
-
Third party application forensics on apple mobile devices
-
Levinson, A., Stackpole, B., and Johnson, D., "Third Party Application Forensics on Apple Mobile Devices", Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS), 2011, pp. 1-9.
-
(2011)
Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS
, pp. 1-9
-
-
Levinson, A.1
Stackpole, B.2
Johnson, D.3
-
10
-
-
84908237752
-
Forensic analysis of whatsapp messenger on android smartphones
-
Anglano, C., "Forensic Analysis of Whatsapp Messenger on Android Smartphones", Digital Investigation, 11(3), 2014, pp. 201-213.
-
(2014)
Digital Investigation
, vol.11
, Issue.3
, pp. 201-213
-
-
Anglano, C.1
-
12
-
-
84894242464
-
Forensic analysis of instant messenger applications on android devices
-
Mahajan, A., Dahiya, M., and Sanghvi, H., "Forensic Analysis of Instant Messenger Applications on Android Devices", International Journal of Computer Applications, 68(8), 2013, pp. 38-44.
-
(2013)
International Journal of Computer Applications
, vol.68
, Issue.8
, pp. 38-44
-
-
Mahajan, A.1
Dahiya, M.2
Sanghvi, H.3
-
13
-
-
84915758355
-
Digital forensic analysis on window8 style ui instant messenger applications
-
Park, J.J., Stojmenovic, I., Jeong, H.Y., and Yi, G., 'eds. Springer Berlin Heidelberg
-
Lee, C., and Chung, M., "Digital Forensic Analysis on Window8 Style Ui Instant Messenger Applications", in (Park, J.J., Stojmenovic, I., Jeong, H.Y., and Yi, G., 'eds.'): Computer Science and Its Applications, Springer Berlin Heidelberg, 2015, pp. 1037-1042.
-
(2015)
Computer Science and Its Applications
, pp. 1037-1042
-
-
Lee, C.1
Chung, M.2
-
14
-
-
84885890014
-
Iforensics: Forensic analysis of instant messaging on smart phones
-
Goel, S., 'ed. Springer Berlin Heidelberg
-
Husain, M., and Sridhar, R., "Iforensics: Forensic Analysis of Instant Messaging on Smart Phones", in (Goel, S., 'ed.') Digital Forensics and Cyber Crime, Springer Berlin Heidelberg, 2010, pp. 9-18.
-
(2010)
Digital Forensics and Cyber Crime
, pp. 9-18
-
-
Husain, M.1
Sridhar, R.2
-
15
-
-
84886289492
-
The disclosure of an android smartphone's digital footprint respecting the instant messaging utilizing skype and msn
-
Chu, H.C., Lo, C.H., and Chao, H.C., "The Disclosure of an Android Smartphone's Digital Footprint Respecting the Instant Messaging Utilizing Skype and Msn", Electronic Commerce Research, 13(3), 2013, pp. 399-410.
-
(2013)
Electronic Commerce Research
, vol.13
, Issue.3
, pp. 399-410
-
-
Chu, H.C.1
Lo, C.H.2
Chao, H.C.3
-
16
-
-
84865987689
-
The partial digital evidence disclosure in respect to the instant messaging embedded in viber application regarding an android smart phone
-
Park, J.H., Kim, J., Zou, D., and Lee, Y.S., 'eds. Springer Netherlands
-
Chu, H.C., Yang, S.W., Wang, S.J., and Park, J.H., "The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone", in (Park, J.H., Kim, J., Zou, D., and Lee, Y.S., 'eds.'): Information Technology Convergence, Secure and Trust Computing, and Data Management, Springer Netherlands, 2012, pp. 171-178.
-
(2012)
Information Technology Convergence, Secure and Trust Computing, and Data Management
, pp. 171-178
-
-
Chu, H.C.1
Yang, S.W.2
Wang, S.J.3
Park, J.H.4
-
17
-
-
84907738742
-
Analysis of wechat on iphone
-
Gao, F., and Zhang, Y., "Analysis of Wechat on Iphone", Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation, 2013, pp. 278-281.
-
(2013)
Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation
, pp. 278-281
-
-
Gao, F.1
Zhang, Y.2
-
18
-
-
84964403528
-
Investigating social networking applications on smartphones detecting facebook, twitter, linkedin and google+ artefacts on android and ios platforms
-
Dezfouli, F.N., Dehghantanha, A., Eterovic-Soric, B., and Choo, K.-K.R., "Investigating Social Networking Applications on Smartphones Detecting Facebook, Twitter, Linkedin and Google+ Artefacts on Android and Ios Platforms", Australian Journal of Forensic Sciences, 2015.
-
(2015)
Australian Journal of Forensic Sciences
-
-
Dezfouli, F.N.1
Dehghantanha, A.2
Eterovic-Soric, B.3
Choo, K.-K.R.4
-
19
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R.M., and Schroeder, M.D., "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, 21(12), 1978, pp. 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
20
-
-
84889071864
-
Unauthorized origin crossing on mobile platforms: Threats and mitigation
-
Wang, R., Xing, L., Wang, X., and Chen, S., "Unauthorized Origin Crossing on Mobile Platforms: Threats and Mitigation", Proceedings of the 20th ACM SIGSAC Conference on Computer & Communications Security, 2013, pp. 635-646.
-
(2013)
Proceedings of the 20th ACM SIGSAC Conference on Computer & Communications Security
, pp. 635-646
-
-
Wang, R.1
Xing, L.2
Wang, X.3
Chen, S.4
-
21
-
-
80755167433
-
-
Technische Universität Darmstadt, Technical Report TR-2011-04)
-
Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., and Sadeghi, A.R., "Xmandroid: A New Android Evolution to Mitigate Privilege Escalation Attacks", Technische Universität Darmstadt, Technical Report TR-2011-04)(2011
-
(2011)
Xmandroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Fischer, T.4
Sadeghi, A.R.5
-
22
-
-
84861645005
-
Traffic-aware multiple mix zone placement for protecting location privacy
-
Liu, X., Zhao, H., Pan, M., Yue, H., Li, X., and Fang, Y., "Traffic-Aware Multiple Mix Zone Placement for Protecting Location Privacy", Proceedings of the the 31st Annual IEEE International Conference on Computer Communications (INFOCOM), 2012, pp. 972-980.
-
(2012)
Proceedings of the the 31st Annual IEEE International Conference on Computer Communications (INFOCOM
, pp. 972-980
-
-
Liu, X.1
Zhao, H.2
Pan, M.3
Yue, H.4
Li, X.5
Fang, Y.6
-
23
-
-
85180406770
-
Placeraider: Virtual theft in physical spaces with smartphones
-
Templeman, R., Rahman, Z., Crandall, D., and Kapadia, A., "Placeraider: Virtual Theft in Physical Spaces with Smartphones", Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS), 2013.
-
(2013)
Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS
-
-
Templeman, R.1
Rahman, Z.2
Crandall, D.3
Kapadia, A.4
-
24
-
-
36448941716
-
-
NIST Special Publication
-
Kent, K., Chevalier, S., Grance, T., and Dang, H., "Guide to Integrating Forensic Techniques into Incident Response", NIST Special Publication, 2006, pp. 800-886.
-
(2006)
Guide to Integrating Forensic Techniques into Incident Response
, pp. 800-886
-
-
Kent, K.1
Chevalier, S.2
Grance, T.3
Dang, H.4
-
25
-
-
84975503416
-
-
accessed 28 May
-
https://about.twitter.com/company, accessed 28 May, 2015.
-
(2015)
-
-
-
26
-
-
84975505590
-
-
accessed 28 May
-
https://www.biv.com/article/2015/3/plentyoffish-100-million-users-revenue-dollars/, accessed 28 May, 2015.
-
(2015)
-
-
-
27
-
-
84975520080
-
-
accessed 28 May
-
http://www.marketingcharts.com/online/snapchat-risingin-popularity-with-youth-52103/, accessed 28 May, 2015.
-
(2015)
-
-
-
28
-
-
84975463420
-
-
accessed 3 June
-
http://techcrunch.com/2014/07/30/fling/, accessed 3 June, 2015.
-
(2015)
-
-
-
29
-
-
84975473878
-
-
accessed 8 June
-
http://www.cision.com/us/2015/01/25-pinterest-factsand-pr-best-practices/, accessed 8 June, 2015.
-
(2015)
-
-
-
30
-
-
84975490235
-
-
accessed 8 June
-
http://wallblog.co.uk/2014/10/23/pinterest-itspopularity-power-and-potential/, accessed 8 June, 2015.
-
(2015)
-
-
|