메뉴 건너뛰기




Volumn 11, Issue 3, 2016, Pages

Windows instant messaging app forensics: Facebook and Skype as case studies

Author keywords

[No Author keywords available]

Indexed keywords

ARTICLE; ARTIFACT; CONVERSATION; FORENSIC SCIENCE; HUMAN; SOFTWARE; MOBILE APPLICATION; SOCIAL MEDIA;

EID: 84978640065     PISSN: None     EISSN: 19326203     Source Type: Journal    
DOI: 10.1371/journal.pone.0150300     Document Type: Article
Times cited : (64)

References (77)
  • 1
    • 85083838827 scopus 로고    scopus 로고
    • California: Radicati Group; March 16. Available: Accessed 18 June 2015
    • The Radicati Group Releases “Instant Messaging Statistics Report, 2015–2019. California: Radicati Group; 2015 March 16. Available: http://www.radicati.com/?p=13001. Accessed 18 June 2015.
    • (2015) Instant Messaging Statistics Report, 2015–2019
  • 2
    • 85080442576 scopus 로고    scopus 로고
    • London: City of London Police; 2015 February 13 Available: Accessed 29 May 2015
    • Online dating fraud up by 33% last year. London: City of London Police; 2015 [2015 February 13] Available: https://www.cityoflondon.police.uk/advice-and-support/fraud-and-economic-crime/nfib/nfibnews/Pages/online-dating-fraud.aspx. Accessed 29 May 2015
    • (2015) Online Dating Fraud up by 33% Last Year
  • 4
    • 85013162703 scopus 로고    scopus 로고
    • Bangor: WABI TV5; May 12. Available: Accessed 24 May 2015
    • Timoney N. Consumer Contact: Job Advertising Fraud. Bangor: WABI TV5; 2014 May 12. Available: http://wabi.tv/2014/05/12/consumer-contact-job-advertising-fraud/. Accessed 24 May 2015
    • (2014) Consumer Contact: Job Advertising Fraud
    • Timoney, N.1
  • 5
    • 85083853685 scopus 로고    scopus 로고
    • Instant messaging Trojan spreads through the UK
    • Place unknown: May 27. Available: Accessed 24 May 2015
    • Instant messaging Trojan spreads through the UK. [Place unknown]: Help Net Security. 2014 May 27. Available: http://www.net-security.org/malware_news.php?id=2773. Accessed 24 May 2015
    • (2014) Help Net Security
  • 6
    • 85080402562 scopus 로고    scopus 로고
    • U.K: Thanet Gazette; April 7. Available: Accessed 24 May 2015
    • Barnes T. Margate pedophile jailed for five years. U.K: Thanet Gazette; 2014 April 7. Available: http://www.thanetgazette.co.uk/Margate-paedophile-jailed-years/story-20922860-detail/story.html. Accessed 24 May 2015
    • (2014) Margate Pedophile Jailed for Five Years
    • Barnes, T.1
  • 7
    • 85013179482 scopus 로고    scopus 로고
    • Sydney: Sydney Morning Herald; Available: Accessed 24 May 2015
    • Godfrey M. Pedophiles coercing kids using phone app. Sydney: Sydney Morning Herald; 2014. Available: http://news.smh.com.au/breaking-news-national/pedophiles-coercing-kids-using-phone-app20130327-2gu3a.html. Accessed 24 May 2015
    • (2014) Pedophiles Coercing Kids Using Phone App
    • Godfrey, M.1
  • 8
    • 85080336226 scopus 로고    scopus 로고
    • Australia: Mi9; Available: Accessed 24 May 2015
    • McCallum N. Pedophile posed as Bieber to lure victims. Australia: Mi9;2013. Available: http://www.9news.com.au/world/2013/09/17/10/30/pedophile-posed-as-bieber-to-lure-victims. Accessed 24 May 2015
    • (2013) Pedophile Posed as Bieber to Lure Victims
    • McCallum, N.1
  • 9
    • 85080372566 scopus 로고    scopus 로고
    • Raleigh: The Federation Bureau of Investigation FBI; Available: Accessed 20 May 2015
    • Jacksonville Man Sentenced in Child Pornography Case. Raleigh: The Federation Bureau of Investigation (FBI); 2015. Available: http://www.fbi.gov/charlotte/press-releases/2015/jacksonville-mansentenced-in-child-pornography-case. Accessed 20 May 2015.
    • (2015) Jacksonville Man Sentenced in Child Pornography Case
  • 10
    • 84964403528 scopus 로고    scopus 로고
    • Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
    • Aug 7
    • Norouzizadeh Dezfouli F, Dehghantanha A, Eterovic-Soric B, Choo K-KR. Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Australian Journal of Forensic Sciences. 2015 Aug 7;1–20.
    • (2015) Australian Journal of Forensic Sciences , pp. 1-20
    • Norouzizadeh Dezfouli, F.1    Dehghantanha, A.2    Eterovic-Soric, B.3    Choo, K.-K.R.4
  • 11
    • 80053586803 scopus 로고    scopus 로고
    • Mining the social web: Data mining Facebook, Twitter, LinkedIn, Google+, GitHub, and more
    • Apr 3
    • Ali D. Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, Github, and More. Journal of Information Privacy and Security. 2015 Apr 3; 11(2):137–8.
    • (2015) Journal of Information Privacy and Security , vol.11 , Issue.2 , pp. 137-138
    • Ali, D.1
  • 12
    • 85013179465 scopus 로고    scopus 로고
    • U.S: National Criminal Justice Reference Service NCJRS; October 3. Available: Accessed 4 May 2015
    • Investigative Uses of Technology: Devices, Tools, and Techniques. U.S: National Criminal Justice Reference Service (NCJRS); 2007 October 3. Available: https://www.ncjrs.gov/pdffiles1/nij/213030.pdf. Accessed 4 May 2015.
    • (2007) Investigative Uses of Technology: Devices, Tools, and Techniques
  • 13
    • 84887956706 scopus 로고    scopus 로고
    • Social networks im forensics: Encryption analysis
    • Barghuthi NBA, Said H. Social Networks IM Forensics: Encryption Analysis. Journal of Communications. 2013; 8: 708–715. doi: 10.12720/jcm.8.11.708–715
    • (2013) Journal of Communications , vol.8 , pp. 708-715
    • Barghuthi, N.B.A.1    Said, H.2
  • 15
    • 84876187834 scopus 로고    scopus 로고
    • Europe: European Union Agency for Network and Information Security ENISA; April 2. Available: Accessed 10 December 2015
    • Procure Secure: A guide to monitoring of security service levels in cloud contracts—ENISA. Europe: European Union Agency for Network and Information Security (ENISA); 2012 April 2. Available: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/procure-secure-a-guide-tomonitoring-of-security-service-levels-in-cloud-contracts. Accessed 10 December 2015.
    • (2012) Procure Secure: A Guide to Monitoring of Security Service Levels in Cloud Contracts—ENISA
  • 16
    • 33751336113 scopus 로고    scopus 로고
    • An examination into AOL Instant Messenger 5.5 contact identification
    • Dickson M. An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation. 2006; 3: 227–237. doi: 10.1016/j.diin.2006.10.004
    • (2006) Digital Investigation , vol.3 , pp. 227-237
    • Dickson, M.1
  • 17
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini B, Choo K-KR. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation. 2012; 9: 71–80. doi: 10.1016/j.diin.2012.07.001
    • (2012) Digital Investigation , vol.9 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 19
    • 51149106811 scopus 로고    scopus 로고
    • Forensic analysis of volatile instant messaging
    • Ray I, Shenoi S, editors. Springer US; Available: Accessed 11 June 2015
    • Kiley M, Dankner S, Rogers M. Forensic Analysis of Volatile Instant Messaging. In: Ray I, Shenoi S, editors. Advances in Digital Forensics IV. Springer US; 2008. p. 129–38. Available: http://link.springer.com/chapter/10.1007/978-0-387-84927-0_11. Accessed 11 June 2015.
    • (2008) Advances in Digital Forensics IV , pp. 129-138
    • Kiley, M.1    Dankner, S.2    Rogers, M.3
  • 20
    • 84899272881 scopus 로고    scopus 로고
    • Place unknown: Forensic Focus; Date unknown. Available: Accessed 24 May 2015
    • Forensic Investigation of Instant Messenger Histories. [Place unknown]: Forensic Focus; [Date unknown]. Available: http://www.forensicfocus.com/forensic-investigation-of-instant-messengerhistories. Accessed 24 May 2015.
    • Forensic Investigation of Instant Messenger Histories
  • 21
    • 33751312490 scopus 로고    scopus 로고
    • Case study: AOL instant messenger trace evidence
    • Reust J. Case study: AOL instant messenger trace evidence. Digital Investigation. 2006; 3: 238–243. doi: 10.1016/j.diin.2006.10.009
    • (2006) Digital Investigation , vol.3 , pp. 238-243
    • Reust, J.1
  • 22
    • 10644279890 scopus 로고    scopus 로고
    • Instant messaging investigations on a live Windows XP system
    • Dec
    • Carvey H. Instant messaging investigations on a live Windows XP system. Digital Investigation. 2004 Dec; 1(4):256–60.
    • (2004) Digital Investigation , vol.1 , Issue.4 , pp. 256-260
    • Carvey, H.1
  • 23
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick D, Choo K-KR. Dropbox analysis: Data remnants on user machines. Digital Investigation. 2013; 10: 3–18. doi: 10.1016/j.diin.2013.02.003
    • (2013) Digital Investigation , vol.10 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 25
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick D, Choo K-KR. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems. 2013; 29: 1378–1394. doi: 10.1016/j.future.2013.02.001
    • (2013) Future Generation Computer Systems , vol.29 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 27
    • 84926291500 scopus 로고    scopus 로고
    • Windows 8 cloud storage analysis: Dropbox forensics
    • Available: Accessed 6 April 2015
    • Mehreen S, Aslam B. Windows 8 cloud storage analysis: Dropbox forensics. In IEEE; 2015. p. 312–7. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7058522. Accessed 6 April 2015.
    • (2015) IEEE , pp. 312-317
    • Mehreen, S.1    Aslam, B.2
  • 28
    • 85083860848 scopus 로고    scopus 로고
    • U.S: Microsoft Corporation; October 1. Available: Accessed 28 March 2015
    • Fleming R. How many devices can you install a Windows 8 app on?. U.S: Microsoft Corporation; 2013 October 1. Available: http://blogs.msdn.com/b/education/archive/2013/10/01/how-many-devices-canyou-install-a-windows-8-app-on.aspx. Accessed 28 March 2015
    • (2013) How Many Devices Can You Install A Windows 8 App on?
    • Fleming, R.1
  • 29
    • 85083822801 scopus 로고    scopus 로고
    • U.S: Microsoft; Date unknown. Available: Accessed 24 May 2015
    • How to store user credentials (XAML). U.S: Microsoft; [Date unknown]. Available: https://msdn.microsoft.com/en-us/library/windows/apps/xaml/Hh465069(v=win.10).aspx. Accessed 24 May 2015.
    • How to Store User Credentials (XAML)
  • 31
    • 84982857592 scopus 로고    scopus 로고
    • Washington; The George Washington University; Available: Accessed 13 May 2015
    • Thomson A. Windows 8 Forensic Guide. Washington; The George Washington University; 2012. Available: http://propellerheadforensics.files.wordpress.com/2012/05/thomson_windows-8-forensicguide2.pdf. Accessed 13 May 2015.
    • (2012) Windows 8 Forensic Guide
    • Thomson, A.1
  • 34
    • 84915758355 scopus 로고    scopus 로고
    • Digital forensic analysis on window8 style UI instant messenger applications
    • Park JJ Jong H, Stojmenovic I, Jeong HY, Yi G, editors. Springer Berlin Heidelberg; Available: Accessed 22 March 2015
    • Lee C, Chung M. Digital Forensic Analysis on Window8 Style UI Instant Messenger Applications. In: Park JJ (Jong H, Stojmenovic I, Jeong HY, Yi G, editors. Computer Science and its Applications. Springer Berlin Heidelberg; 2015. p. 1037–42. Available: http://link.springer.com/chapter/10.1007/978-3-662-45402-2_147. Accessed 22 March 2015.
    • (2015) Computer Science and Its Applications , pp. 1037-1042
    • Lee, C.1    Chung, M.2
  • 36
    • 33745171808 scopus 로고    scopus 로고
    • An examination into MSN Messenger 7.5 contact identification
    • Jun
    • Dickson M. An examination into MSN Messenger 7.5 contact identification. Digital Investigation. 2006 Jun; 3(2):79–83.
    • (2006) Digital Investigation , vol.3 , Issue.2 , pp. 79-83
    • Dickson, M.1
  • 37
    • 33750369860 scopus 로고    scopus 로고
    • An examination into Yahoo Messenger 7.0 contact identification
    • Sep
    • Dickson M. An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation. 2006 Sep; 3(3):159–65
    • (2006) Digital Investigation , vol.3 , Issue.3 , pp. 159-165
    • Dickson, M.1
  • 38
    • 33847252861 scopus 로고    scopus 로고
    • An examination into Trillian basic 3.x contact identification
    • Mar
    • Dickson M. An examination into Trillian basic 3.x contact identification. Digital Investigation. 2007 Mar; 4(1):36–45.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 36-45
    • Dickson, M.1
  • 39
    • 84875191008 scopus 로고    scopus 로고
    • DigLA–A Digsby log analysis tool to identify forensic artifacts
    • Feb
    • Yasin M, Abulaish M. DigLA–A Digsby log analysis tool to identify forensic artifacts. Digital Investigation. 2013 Feb; 9(3–4):222–34.
    • (2013) Digital Investigation , vol.9 , Issue.3-4 , pp. 222-234
    • Yasin, M.1    Abulaish, M.2
  • 40
    • 84916601609 scopus 로고    scopus 로고
    • Correlating messages from multiple IM networks to identify digital forensic artifacts
    • Sep 18
    • Yasin M, Kausar F, Aleisa E, Kim J. Correlating messages from multiple IM networks to identify digital forensic artifacts. Electron Commer Res. 2014 Sep 18; 14(3):369–87
    • (2014) Electron Commer Res , vol.14 , Issue.3 , pp. 369-387
    • Yasin, M.1    Kausar, F.2    Aleisa, E.3    Kim, J.4
  • 41
    • 84865986338 scopus 로고    scopus 로고
    • Forensic analysis of digsby log data to trace suspected user activities
    • Park JH (James), Kim J, Zou D, Lee YS, editors. Springer Netherlands; Available: Accessed 1 April 2015
    • Yasin M, Abulaish M, Elmogy MNN. Forensic Analysis of Digsby Log Data to Trace Suspected User Activities. In: Park JH (James), Kim J, Zou D, Lee YS, editors. Information Technology Convergence, Secure and Trust Computing, and Data Management. Springer Netherlands; 2012. p. 119–26. Available: http://link.springer.com/chapter/10.1007/978-94-007-5083-8_16. Accessed 1 April 2015.
    • (2012) Information Technology Convergence, Secure and Trust Computing, and Data Management , pp. 119-126
    • Yasin, M.1    Abulaish, M.2    Elmogy, M.N.N.3
  • 42
    • 34447338569 scopus 로고    scopus 로고
    • Forensic artefacts left by Windows Live Messenger 8.0
    • Jun
    • Van Dongen WS. Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation. 2007 Jun; 4(2):73–87.
    • (2007) Digital Investigation , vol.4 , Issue.2 , pp. 73-87
    • van Dongen, W.S.1
  • 43
    • 40849095638 scopus 로고    scopus 로고
    • Forensic artefacts left by Pidgin Messenger 2.0
    • Sep
    • Van Dongen WS. Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation. 2007 Sep; 4 (3–4):138–45.
    • (2007) Digital Investigation , vol.4 , Issue.3-4 , pp. 138-145
    • van Dongen, W.S.1
  • 44
    • 84873978601 scopus 로고    scopus 로고
    • Yahoo! Messenger forensics on windows Vista and Windows 7
    • Gladyshev Rogers MK, editors. Berlin, Heidelberg: Springer Berlin Heidelberg; Available: Accessed 6 April 2015
    • Levendoski M, Datar T, Rogers M. Yahoo! Messenger Forensics on Windows Vista and Windows 7. In: Gladyshev P, Rogers MK, editors. Digital Forensics and Cyber Crime. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012. p. 172–9. Available: http://link.springer.com/10.1007/978-3-642-35515-8_14. Accessed 6 April 2015.
    • (2012) Digital Forensics and Cyber Crime , pp. 172-179
    • Levendoski, M.1    Datar, T.2    Rogers, M.3
  • 45
    • 84872744139 scopus 로고    scopus 로고
    • Singapore: Valkyrie-X Security Research Group; July. Available: Accessed 12 May 2015
    • Wong K, Lai ACT, Yeung JCK, Lee WL, Chan PH. Facebook Forensics. Singapore: Valkyrie-X Security Research Group; 2011 July. Available: www.fbiic.gov/public/2011/jul/Facebook_ForensicsFinalized.pdf. Accessed 12 May 2015.
    • (2011) Facebook Forensics
    • Wong, K.1    Lai, A.C.T.2    Yeung, J.C.K.3    Lee, W.L.4    Chan, P.H.5
  • 47
    • 84864628454 scopus 로고    scopus 로고
    • Forensic analysis of social networking applications on mobile devices
    • Aug
    • Al Mutawa N, Baggili I, Marrington A. Forensic analysis of social networking applications on mobile devices. Digital Investigation. 2012 Aug; 9, Supplement: S24–S33.
    • (2012) Digital Investigation , vol.9 , pp. S24-S33
    • Al Mutawa, N.1    Baggili, I.2    Marrington, A.3
  • 48
    • 84855837531 scopus 로고    scopus 로고
    • IPhone forensics techniques and crime investigation
    • Available: Accessed 4 July 2015
    • Said H, Yousif A, Humaid H. IPhone forensics techniques and crime investigation. In IEEE; 2011. p. 120–5. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6107946. Accessed 4 July 2015.
    • (2011) IEEE , pp. 120-125
    • Said, H.1    Yousif, A.2    Humaid, H.3
  • 49
    • 84938984557 scopus 로고    scopus 로고
    • Network and device forensic analysis of Android social-messaging applications
    • Aug
    • Walnycky D, Baggili I, Marrington A, Moore J, Breitinger F. Network and device forensic analysis of Android social-messaging applications. Digital Investigation. 2015 Aug; 14, Supplement 1: S77–84.
    • (2015) Digital Investigation , vol.14 , pp. S77-S84
    • Walnycky, D.1    Baggili, I.2    Marrington, A.3    Moore, J.4    Breitinger, F.5
  • 52
    • 80051527411 scopus 로고    scopus 로고
    • Live data mining concerning social networking forensics based on a Facebook session through aggregation of social data
    • Aug
    • Chu H-C, Deng D-J, Park JH. Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data. IEEE Journal on Selected Areas in Communications. 2011 Aug; 29(7):1368–76.).
    • (2011) IEEE Journal on Selected Areas in Communications , vol.29 , Issue.7 , pp. 1368-1376
    • Chu, H.-C.1    Deng, D.-J.2    Park, J.H.3
  • 54
    • 84947258502 scopus 로고    scopus 로고
    • Forensics acquisition and analysis of instant messaging and VoIP applications
    • Garain U, Shafait F, editors. Springer International Publishing; Available: Accessed 11 October 2015
    • Sgaras C, Kechadi M-T, Le-Khac N-A. Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications. In: Garain U, Shafait F, editors. Computational Forensics. Springer International Publishing; 2015. p. 188–99. Available: http://link.springer.com/chapter/10.1007/978-3-319-20125-2_ 16. Accessed 11 October 2015
    • (2015) Computational Forensics , pp. 188-199
    • Sgaras, C.1    Kechadi, M.-T.2    Le-Khac, N.-A.3
  • 56
    • 84870832792 scopus 로고    scopus 로고
    • Skype chat data forgery detection
    • Kim T, Ko D, Vasilakos T, Stoica A, Abawajy J, editors. Springer Berlin Heidelberg;
    • Teng S-Y, Lin Y-L. Skype Chat Data Forgery Detection. In: Kim T, Ko D, Vasilakos T, Stoica A, Abawajy J, editors. Computer Applications for Communication, Networking, and Digital Contents. Springer Berlin Heidelberg; 2012. pp. 108–114. Available: http://link.springer.com/chapter/10.1007/978-3-642-35594-3_15.
    • (2012) Computer Applications for Communication, Networking, and Digital Contents , pp. 108-114
    • Teng, S.-Y.1    Lin, Y.-L.2
  • 59
    • 15944399154 scopus 로고    scopus 로고
    • Canberra: Australian Institute of Criminology; June. Available: Accessed 20 May 2015
    • McKemmish R. What is forensic computing? Canberra: Australian Institute of Criminology;1999 June. Available: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi118.pdf. Accessed 20 May 2015
    • (1999) What Is Forensic Computing?
    • McKemmish, R.1
  • 60
    • 85083854690 scopus 로고    scopus 로고
    • Available: Accessed 24 May
    • Company Info. U.S: Facebook. [Date unknown]. Available: https://newsroom.fb.com/company-info/. Accessed 24 May 2015
    • (2015) U.S: Facebook. [Date Unknown]
  • 61
    • 85083835979 scopus 로고    scopus 로고
    • U.S: CNET; October 17. Available: Accessed 4 May 2015
    • Reisinger D. Windows 8.1 app updates: Facebook, Netfix, and more. U.S: CNET;2013 October 17. Available: http://www.cnet.com/news/windows-8-1-app-updates-facebook-netflix-and-more/. Accessed 4 May 2015
    • (2013) Windows 8.1 App Updates: Facebook, Netfix, and More
    • Reisinger, D.1
  • 62
    • 85083851531 scopus 로고    scopus 로고
    • U.S: Microsoft; Date unknown. Available: Accessed 24 May
    • About URL Security Zones (Windows). U.S: Microsoft; [Date unknown]. Available: https://msdn.microsoft.com/en-us/library/ms537183.aspx#internet. Accessed 24 May 2015
    • (2015) About URL Security Zones (Windows)
  • 63
    • 84860376667 scopus 로고    scopus 로고
    • U.S: Microsoft; Available: Accessed 24 May 2015
    • Microsoft to Acquire Skype. U.S: Microsoft; 2011. Available: http://news.microsoft.com/2011/05/10/microsoft-to-acquire-skype/. Accessed 24 May 2015
    • (2011) Microsoft to Acquire Skype
  • 64
    • 85083863819 scopus 로고    scopus 로고
    • U.S: Skype; September 12. Available: Accessed 24 May 2015
    • Wurm K. Skype and a New Audio Codec. U.S: Skype; 2012 September 12. Available: http://blogs.skype.com/2012/09/12/skype-and-a-new-audio-codec/. Accessed 24 May 2015
    • (2012) Skype and A New Audio Codec
    • Wurm, K.1
  • 65
    • 85083829354 scopus 로고    scopus 로고
    • U.S: InfoSec Institute; Date unknown. Available: Accessed 24 May
    • Skype Forensics. U.S: InfoSec Institute; [Date unknown]. Available: http://resources.infosecinstitute.com/skype-forensics-2/.Accessed 24 May 2015.
    • (2015) Skype Forensics
  • 67
    • 85013203380 scopus 로고    scopus 로고
    • S: Magnet Forensics; Available: Accessed 12 May 2015
    • McQuaid J. Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile U.S: Magnet Forensics; 2012. Available: http://www.magnetforensics.com/wp-content/uploads/2014/04/SkypeForensics-Analyzing-Call-and-Chat-Data-From-Computers-and-Mobile-Magnet-Forensics.pdf. Accessed 12 May 2015.
    • (2012) Skype Forensics: Analyzing Call and Chat Data from Computers and Mobile U
    • McQuaid, J.1
  • 68
    • 84958034911 scopus 로고    scopus 로고
    • Android mobile VoIP apps: A survey and examination of their security and privacy
    • Azfar A, Choo K-KR, Liu L. Android mobile VoIP apps: A survey and examination of their security and privacy. Electronic Commerce Research. 2016. doi: 10.1007/s10660-015-9208-1
    • (2016) Electronic Commerce Research
    • Azfar, A.1    Choo, K.-K.R.2    Liu, L.3
  • 72
    • 84947587045 scopus 로고    scopus 로고
    • A forensically sound adversary model for mobile devices
    • PMID: 26393812
    • Do Q, Martini B, Choo K-KR 2015. A Forensically Sound Adversary Model for Mobile Devices. PLOS ONE 10(9): e0138449. doi: 10.1371/journal.pone.0138449 PMID: 26393812
    • (2015) PLOS ONE , vol.10 , Issue.9
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.