-
1
-
-
85083838827
-
-
California: Radicati Group; March 16. Available: Accessed 18 June 2015
-
The Radicati Group Releases “Instant Messaging Statistics Report, 2015–2019. California: Radicati Group; 2015 March 16. Available: http://www.radicati.com/?p=13001. Accessed 18 June 2015.
-
(2015)
Instant Messaging Statistics Report, 2015–2019
-
-
-
2
-
-
85080442576
-
-
London: City of London Police; 2015 February 13 Available: Accessed 29 May 2015
-
Online dating fraud up by 33% last year. London: City of London Police; 2015 [2015 February 13] Available: https://www.cityoflondon.police.uk/advice-and-support/fraud-and-economic-crime/nfib/nfibnews/Pages/online-dating-fraud.aspx. Accessed 29 May 2015
-
(2015)
Online Dating Fraud up by 33% Last Year
-
-
-
3
-
-
85080406788
-
-
Washington: Milwaukee Neighborhood News Service; May 21. Available: Accessed 24 May 2015
-
Meyers SL. Special Report, Part 1: “Diploma mill” scams continue to plague Milwaukee’s adult students. Washington: Milwaukee Neighborhood News Service; 2014 May 21. Available: http:// milwaukeenns.org/2014/05/21/special-report-diploma-mill-scams-continue-to-plague-milwaukeesadult-students/. Accessed 24 May 2015
-
(2014)
Special Report, Part 1: “Diploma Mill” Scams Continue to Plague Milwaukee’S Adult Students
-
-
Meyers, S.L.1
-
4
-
-
85013162703
-
-
Bangor: WABI TV5; May 12. Available: Accessed 24 May 2015
-
Timoney N. Consumer Contact: Job Advertising Fraud. Bangor: WABI TV5; 2014 May 12. Available: http://wabi.tv/2014/05/12/consumer-contact-job-advertising-fraud/. Accessed 24 May 2015
-
(2014)
Consumer Contact: Job Advertising Fraud
-
-
Timoney, N.1
-
5
-
-
85083853685
-
Instant messaging Trojan spreads through the UK
-
Place unknown: May 27. Available: Accessed 24 May 2015
-
Instant messaging Trojan spreads through the UK. [Place unknown]: Help Net Security. 2014 May 27. Available: http://www.net-security.org/malware_news.php?id=2773. Accessed 24 May 2015
-
(2014)
Help Net Security
-
-
-
6
-
-
85080402562
-
-
U.K: Thanet Gazette; April 7. Available: Accessed 24 May 2015
-
Barnes T. Margate pedophile jailed for five years. U.K: Thanet Gazette; 2014 April 7. Available: http://www.thanetgazette.co.uk/Margate-paedophile-jailed-years/story-20922860-detail/story.html. Accessed 24 May 2015
-
(2014)
Margate Pedophile Jailed for Five Years
-
-
Barnes, T.1
-
7
-
-
85013179482
-
-
Sydney: Sydney Morning Herald; Available: Accessed 24 May 2015
-
Godfrey M. Pedophiles coercing kids using phone app. Sydney: Sydney Morning Herald; 2014. Available: http://news.smh.com.au/breaking-news-national/pedophiles-coercing-kids-using-phone-app20130327-2gu3a.html. Accessed 24 May 2015
-
(2014)
Pedophiles Coercing Kids Using Phone App
-
-
Godfrey, M.1
-
8
-
-
85080336226
-
-
Australia: Mi9; Available: Accessed 24 May 2015
-
McCallum N. Pedophile posed as Bieber to lure victims. Australia: Mi9;2013. Available: http://www.9news.com.au/world/2013/09/17/10/30/pedophile-posed-as-bieber-to-lure-victims. Accessed 24 May 2015
-
(2013)
Pedophile Posed as Bieber to Lure Victims
-
-
McCallum, N.1
-
9
-
-
85080372566
-
-
Raleigh: The Federation Bureau of Investigation FBI; Available: Accessed 20 May 2015
-
Jacksonville Man Sentenced in Child Pornography Case. Raleigh: The Federation Bureau of Investigation (FBI); 2015. Available: http://www.fbi.gov/charlotte/press-releases/2015/jacksonville-mansentenced-in-child-pornography-case. Accessed 20 May 2015.
-
(2015)
Jacksonville Man Sentenced in Child Pornography Case
-
-
-
10
-
-
84964403528
-
Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
-
Aug 7
-
Norouzizadeh Dezfouli F, Dehghantanha A, Eterovic-Soric B, Choo K-KR. Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Australian Journal of Forensic Sciences. 2015 Aug 7;1–20.
-
(2015)
Australian Journal of Forensic Sciences
, pp. 1-20
-
-
Norouzizadeh Dezfouli, F.1
Dehghantanha, A.2
Eterovic-Soric, B.3
Choo, K.-K.R.4
-
11
-
-
80053586803
-
Mining the social web: Data mining Facebook, Twitter, LinkedIn, Google+, GitHub, and more
-
Apr 3
-
Ali D. Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, Github, and More. Journal of Information Privacy and Security. 2015 Apr 3; 11(2):137–8.
-
(2015)
Journal of Information Privacy and Security
, vol.11
, Issue.2
, pp. 137-138
-
-
Ali, D.1
-
12
-
-
85013179465
-
-
U.S: National Criminal Justice Reference Service NCJRS; October 3. Available: Accessed 4 May 2015
-
Investigative Uses of Technology: Devices, Tools, and Techniques. U.S: National Criminal Justice Reference Service (NCJRS); 2007 October 3. Available: https://www.ncjrs.gov/pdffiles1/nij/213030.pdf. Accessed 4 May 2015.
-
(2007)
Investigative Uses of Technology: Devices, Tools, and Techniques
-
-
-
13
-
-
84887956706
-
Social networks im forensics: Encryption analysis
-
Barghuthi NBA, Said H. Social Networks IM Forensics: Encryption Analysis. Journal of Communications. 2013; 8: 708–715. doi: 10.12720/jcm.8.11.708–715
-
(2013)
Journal of Communications
, vol.8
, pp. 708-715
-
-
Barghuthi, N.B.A.1
Said, H.2
-
15
-
-
84876187834
-
-
Europe: European Union Agency for Network and Information Security ENISA; April 2. Available: Accessed 10 December 2015
-
Procure Secure: A guide to monitoring of security service levels in cloud contracts—ENISA. Europe: European Union Agency for Network and Information Security (ENISA); 2012 April 2. Available: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/procure-secure-a-guide-tomonitoring-of-security-service-levels-in-cloud-contracts. Accessed 10 December 2015.
-
(2012)
Procure Secure: A Guide to Monitoring of Security Service Levels in Cloud Contracts—ENISA
-
-
-
16
-
-
33751336113
-
An examination into AOL Instant Messenger 5.5 contact identification
-
Dickson M. An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation. 2006; 3: 227–237. doi: 10.1016/j.diin.2006.10.004
-
(2006)
Digital Investigation
, vol.3
, pp. 227-237
-
-
Dickson, M.1
-
17
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Martini B, Choo K-KR. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation. 2012; 9: 71–80. doi: 10.1016/j.diin.2012.07.001
-
(2012)
Digital Investigation
, vol.9
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
19
-
-
51149106811
-
Forensic analysis of volatile instant messaging
-
Ray I, Shenoi S, editors. Springer US; Available: Accessed 11 June 2015
-
Kiley M, Dankner S, Rogers M. Forensic Analysis of Volatile Instant Messaging. In: Ray I, Shenoi S, editors. Advances in Digital Forensics IV. Springer US; 2008. p. 129–38. Available: http://link.springer.com/chapter/10.1007/978-0-387-84927-0_11. Accessed 11 June 2015.
-
(2008)
Advances in Digital Forensics IV
, pp. 129-138
-
-
Kiley, M.1
Dankner, S.2
Rogers, M.3
-
20
-
-
84899272881
-
-
Place unknown: Forensic Focus; Date unknown. Available: Accessed 24 May 2015
-
Forensic Investigation of Instant Messenger Histories. [Place unknown]: Forensic Focus; [Date unknown]. Available: http://www.forensicfocus.com/forensic-investigation-of-instant-messengerhistories. Accessed 24 May 2015.
-
Forensic Investigation of Instant Messenger Histories
-
-
-
21
-
-
33751312490
-
Case study: AOL instant messenger trace evidence
-
Reust J. Case study: AOL instant messenger trace evidence. Digital Investigation. 2006; 3: 238–243. doi: 10.1016/j.diin.2006.10.009
-
(2006)
Digital Investigation
, vol.3
, pp. 238-243
-
-
Reust, J.1
-
22
-
-
10644279890
-
Instant messaging investigations on a live Windows XP system
-
Dec
-
Carvey H. Instant messaging investigations on a live Windows XP system. Digital Investigation. 2004 Dec; 1(4):256–60.
-
(2004)
Digital Investigation
, vol.1
, Issue.4
, pp. 256-260
-
-
Carvey, H.1
-
23
-
-
84877809583
-
Dropbox analysis: Data remnants on user machines
-
Quick D, Choo K-KR. Dropbox analysis: Data remnants on user machines. Digital Investigation. 2013; 10: 3–18. doi: 10.1016/j.diin.2013.02.003
-
(2013)
Digital Investigation
, vol.10
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
25
-
-
84875147433
-
Digital droplets: Microsoft SkyDrive forensic data remnants
-
Quick D, Choo K-KR. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems. 2013; 29: 1378–1394. doi: 10.1016/j.future.2013.02.001
-
(2013)
Future Generation Computer Systems
, vol.29
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
27
-
-
84926291500
-
Windows 8 cloud storage analysis: Dropbox forensics
-
Available: Accessed 6 April 2015
-
Mehreen S, Aslam B. Windows 8 cloud storage analysis: Dropbox forensics. In IEEE; 2015. p. 312–7. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7058522. Accessed 6 April 2015.
-
(2015)
IEEE
, pp. 312-317
-
-
Mehreen, S.1
Aslam, B.2
-
28
-
-
85083860848
-
-
U.S: Microsoft Corporation; October 1. Available: Accessed 28 March 2015
-
Fleming R. How many devices can you install a Windows 8 app on?. U.S: Microsoft Corporation; 2013 October 1. Available: http://blogs.msdn.com/b/education/archive/2013/10/01/how-many-devices-canyou-install-a-windows-8-app-on.aspx. Accessed 28 March 2015
-
(2013)
How Many Devices Can You Install A Windows 8 App on?
-
-
Fleming, R.1
-
29
-
-
85083822801
-
-
U.S: Microsoft; Date unknown. Available: Accessed 24 May 2015
-
How to store user credentials (XAML). U.S: Microsoft; [Date unknown]. Available: https://msdn.microsoft.com/en-us/library/windows/apps/xaml/Hh465069(v=win.10).aspx. Accessed 24 May 2015.
-
How to Store User Credentials (XAML)
-
-
-
31
-
-
84982857592
-
-
Washington; The George Washington University; Available: Accessed 13 May 2015
-
Thomson A. Windows 8 Forensic Guide. Washington; The George Washington University; 2012. Available: http://propellerheadforensics.files.wordpress.com/2012/05/thomson_windows-8-forensicguide2.pdf. Accessed 13 May 2015.
-
(2012)
Windows 8 Forensic Guide
-
-
Thomson, A.1
-
33
-
-
84899655525
-
Windows Surface RT tablet forensics
-
May
-
Iqbal A, Al Obaidli H, Marrington A, Jones A. Windows Surface RT tablet forensics. Digital Investigation. 2014 May; 11, Supplement 1: S87–S93.
-
(2014)
Digital Investigation
, vol.11
, pp. S87-S93
-
-
Iqbal, A.1
Al Obaidli, H.2
Marrington, A.3
Jones, A.4
-
34
-
-
84915758355
-
Digital forensic analysis on window8 style UI instant messenger applications
-
Park JJ Jong H, Stojmenovic I, Jeong HY, Yi G, editors. Springer Berlin Heidelberg; Available: Accessed 22 March 2015
-
Lee C, Chung M. Digital Forensic Analysis on Window8 Style UI Instant Messenger Applications. In: Park JJ (Jong H, Stojmenovic I, Jeong HY, Yi G, editors. Computer Science and its Applications. Springer Berlin Heidelberg; 2015. p. 1037–42. Available: http://link.springer.com/chapter/10.1007/978-3-662-45402-2_147. Accessed 22 March 2015.
-
(2015)
Computer Science and Its Applications
, pp. 1037-1042
-
-
Lee, C.1
Chung, M.2
-
36
-
-
33745171808
-
An examination into MSN Messenger 7.5 contact identification
-
Jun
-
Dickson M. An examination into MSN Messenger 7.5 contact identification. Digital Investigation. 2006 Jun; 3(2):79–83.
-
(2006)
Digital Investigation
, vol.3
, Issue.2
, pp. 79-83
-
-
Dickson, M.1
-
37
-
-
33750369860
-
An examination into Yahoo Messenger 7.0 contact identification
-
Sep
-
Dickson M. An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation. 2006 Sep; 3(3):159–65
-
(2006)
Digital Investigation
, vol.3
, Issue.3
, pp. 159-165
-
-
Dickson, M.1
-
38
-
-
33847252861
-
An examination into Trillian basic 3.x contact identification
-
Mar
-
Dickson M. An examination into Trillian basic 3.x contact identification. Digital Investigation. 2007 Mar; 4(1):36–45.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 36-45
-
-
Dickson, M.1
-
39
-
-
84875191008
-
DigLA–A Digsby log analysis tool to identify forensic artifacts
-
Feb
-
Yasin M, Abulaish M. DigLA–A Digsby log analysis tool to identify forensic artifacts. Digital Investigation. 2013 Feb; 9(3–4):222–34.
-
(2013)
Digital Investigation
, vol.9
, Issue.3-4
, pp. 222-234
-
-
Yasin, M.1
Abulaish, M.2
-
40
-
-
84916601609
-
Correlating messages from multiple IM networks to identify digital forensic artifacts
-
Sep 18
-
Yasin M, Kausar F, Aleisa E, Kim J. Correlating messages from multiple IM networks to identify digital forensic artifacts. Electron Commer Res. 2014 Sep 18; 14(3):369–87
-
(2014)
Electron Commer Res
, vol.14
, Issue.3
, pp. 369-387
-
-
Yasin, M.1
Kausar, F.2
Aleisa, E.3
Kim, J.4
-
41
-
-
84865986338
-
Forensic analysis of digsby log data to trace suspected user activities
-
Park JH (James), Kim J, Zou D, Lee YS, editors. Springer Netherlands; Available: Accessed 1 April 2015
-
Yasin M, Abulaish M, Elmogy MNN. Forensic Analysis of Digsby Log Data to Trace Suspected User Activities. In: Park JH (James), Kim J, Zou D, Lee YS, editors. Information Technology Convergence, Secure and Trust Computing, and Data Management. Springer Netherlands; 2012. p. 119–26. Available: http://link.springer.com/chapter/10.1007/978-94-007-5083-8_16. Accessed 1 April 2015.
-
(2012)
Information Technology Convergence, Secure and Trust Computing, and Data Management
, pp. 119-126
-
-
Yasin, M.1
Abulaish, M.2
Elmogy, M.N.N.3
-
42
-
-
34447338569
-
Forensic artefacts left by Windows Live Messenger 8.0
-
Jun
-
Van Dongen WS. Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation. 2007 Jun; 4(2):73–87.
-
(2007)
Digital Investigation
, vol.4
, Issue.2
, pp. 73-87
-
-
van Dongen, W.S.1
-
43
-
-
40849095638
-
Forensic artefacts left by Pidgin Messenger 2.0
-
Sep
-
Van Dongen WS. Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation. 2007 Sep; 4 (3–4):138–45.
-
(2007)
Digital Investigation
, vol.4
, Issue.3-4
, pp. 138-145
-
-
van Dongen, W.S.1
-
44
-
-
84873978601
-
Yahoo! Messenger forensics on windows Vista and Windows 7
-
Gladyshev Rogers MK, editors. Berlin, Heidelberg: Springer Berlin Heidelberg; Available: Accessed 6 April 2015
-
Levendoski M, Datar T, Rogers M. Yahoo! Messenger Forensics on Windows Vista and Windows 7. In: Gladyshev P, Rogers MK, editors. Digital Forensics and Cyber Crime. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012. p. 172–9. Available: http://link.springer.com/10.1007/978-3-642-35515-8_14. Accessed 6 April 2015.
-
(2012)
Digital Forensics and Cyber Crime
, pp. 172-179
-
-
Levendoski, M.1
Datar, T.2
Rogers, M.3
-
45
-
-
84872744139
-
-
Singapore: Valkyrie-X Security Research Group; July. Available: Accessed 12 May 2015
-
Wong K, Lai ACT, Yeung JCK, Lee WL, Chan PH. Facebook Forensics. Singapore: Valkyrie-X Security Research Group; 2011 July. Available: www.fbiic.gov/public/2011/jul/Facebook_ForensicsFinalized.pdf. Accessed 12 May 2015.
-
(2011)
Facebook Forensics
-
-
Wong, K.1
Lai, A.C.T.2
Yeung, J.C.K.3
Lee, W.L.4
Chan, P.H.5
-
46
-
-
84857471353
-
Forensic artifacts of Facebook’s instant messaging service
-
Al Mutawa N, Al Awadhi I, Baggili I, Marrington A. Forensic artifacts of Facebook’s instant messaging service. Internet Technology and Secured Transactions (ICITST), 2011 International Conference for. 2011. pp. 771–776.
-
(2011)
Internet Technology and Secured Transactions (ICITST), 2011 International Conference for
, pp. 771-776
-
-
Al Mutawa, N.1
Al Awadhi, I.2
Baggili, I.3
Marrington, A.4
-
47
-
-
84864628454
-
Forensic analysis of social networking applications on mobile devices
-
Aug
-
Al Mutawa N, Baggili I, Marrington A. Forensic analysis of social networking applications on mobile devices. Digital Investigation. 2012 Aug; 9, Supplement: S24–S33.
-
(2012)
Digital Investigation
, vol.9
, pp. S24-S33
-
-
Al Mutawa, N.1
Baggili, I.2
Marrington, A.3
-
48
-
-
84855837531
-
IPhone forensics techniques and crime investigation
-
Available: Accessed 4 July 2015
-
Said H, Yousif A, Humaid H. IPhone forensics techniques and crime investigation. In IEEE; 2011. p. 120–5. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6107946. Accessed 4 July 2015.
-
(2011)
IEEE
, pp. 120-125
-
-
Said, H.1
Yousif, A.2
Humaid, H.3
-
49
-
-
84938984557
-
Network and device forensic analysis of Android social-messaging applications
-
Aug
-
Walnycky D, Baggili I, Marrington A, Moore J, Breitinger F. Network and device forensic analysis of Android social-messaging applications. Digital Investigation. 2015 Aug; 14, Supplement 1: S77–84.
-
(2015)
Digital Investigation
, vol.14
, pp. S77-S84
-
-
Walnycky, D.1
Baggili, I.2
Marrington, A.3
Moore, J.4
Breitinger, F.5
-
51
-
-
84860532325
-
IPhone social networking for evidence investigations using iTunes forensics
-
New York, NY, USA: ACM; Available: Accessed 8 December 2015
-
Tso Y-C, Wang S-J, Huang C-T, Wang W-J. iPhone Social Networking for Evidence Investigations Using iTunes Forensics. In: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication. New York, NY, USA: ACM; 2012. p. 62:1–62:7. Available: http://doi.acm.org/10.1145/2184751.2184827. Accessed 8 December 2015.
-
(2012)
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
-
-
Tso, Y.-C.1
Wang, S.-J.2
Huang, C.-T.3
Wang, W.-J.4
-
52
-
-
80051527411
-
Live data mining concerning social networking forensics based on a Facebook session through aggregation of social data
-
Aug
-
Chu H-C, Deng D-J, Park JH. Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data. IEEE Journal on Selected Areas in Communications. 2011 Aug; 29(7):1368–76.).
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, Issue.7
, pp. 1368-1376
-
-
Chu, H.-C.1
Deng, D.-J.2
Park, J.H.3
-
54
-
-
84947258502
-
Forensics acquisition and analysis of instant messaging and VoIP applications
-
Garain U, Shafait F, editors. Springer International Publishing; Available: Accessed 11 October 2015
-
Sgaras C, Kechadi M-T, Le-Khac N-A. Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications. In: Garain U, Shafait F, editors. Computational Forensics. Springer International Publishing; 2015. p. 188–99. Available: http://link.springer.com/chapter/10.1007/978-3-319-20125-2_ 16. Accessed 11 October 2015
-
(2015)
Computational Forensics
, pp. 188-199
-
-
Sgaras, C.1
Kechadi, M.-T.2
Le-Khac, N.-A.3
-
56
-
-
84870832792
-
Skype chat data forgery detection
-
Kim T, Ko D, Vasilakos T, Stoica A, Abawajy J, editors. Springer Berlin Heidelberg;
-
Teng S-Y, Lin Y-L. Skype Chat Data Forgery Detection. In: Kim T, Ko D, Vasilakos T, Stoica A, Abawajy J, editors. Computer Applications for Communication, Networking, and Digital Contents. Springer Berlin Heidelberg; 2012. pp. 108–114. Available: http://link.springer.com/chapter/10.1007/978-3-642-35594-3_15.
-
(2012)
Computer Applications for Communication, Networking, and Digital Contents
, pp. 108-114
-
-
Teng, S.-Y.1
Lin, Y.-L.2
-
59
-
-
15944399154
-
-
Canberra: Australian Institute of Criminology; June. Available: Accessed 20 May 2015
-
McKemmish R. What is forensic computing? Canberra: Australian Institute of Criminology;1999 June. Available: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi118.pdf. Accessed 20 May 2015
-
(1999)
What Is Forensic Computing?
-
-
McKemmish, R.1
-
60
-
-
85083854690
-
-
Available: Accessed 24 May
-
Company Info. U.S: Facebook. [Date unknown]. Available: https://newsroom.fb.com/company-info/. Accessed 24 May 2015
-
(2015)
U.S: Facebook. [Date Unknown]
-
-
-
61
-
-
85083835979
-
-
U.S: CNET; October 17. Available: Accessed 4 May 2015
-
Reisinger D. Windows 8.1 app updates: Facebook, Netfix, and more. U.S: CNET;2013 October 17. Available: http://www.cnet.com/news/windows-8-1-app-updates-facebook-netflix-and-more/. Accessed 4 May 2015
-
(2013)
Windows 8.1 App Updates: Facebook, Netfix, and More
-
-
Reisinger, D.1
-
62
-
-
85083851531
-
-
U.S: Microsoft; Date unknown. Available: Accessed 24 May
-
About URL Security Zones (Windows). U.S: Microsoft; [Date unknown]. Available: https://msdn.microsoft.com/en-us/library/ms537183.aspx#internet. Accessed 24 May 2015
-
(2015)
About URL Security Zones (Windows)
-
-
-
63
-
-
84860376667
-
-
U.S: Microsoft; Available: Accessed 24 May 2015
-
Microsoft to Acquire Skype. U.S: Microsoft; 2011. Available: http://news.microsoft.com/2011/05/10/microsoft-to-acquire-skype/. Accessed 24 May 2015
-
(2011)
Microsoft to Acquire Skype
-
-
-
64
-
-
85083863819
-
-
U.S: Skype; September 12. Available: Accessed 24 May 2015
-
Wurm K. Skype and a New Audio Codec. U.S: Skype; 2012 September 12. Available: http://blogs.skype.com/2012/09/12/skype-and-a-new-audio-codec/. Accessed 24 May 2015
-
(2012)
Skype and A New Audio Codec
-
-
Wurm, K.1
-
65
-
-
85083829354
-
-
U.S: InfoSec Institute; Date unknown. Available: Accessed 24 May
-
Skype Forensics. U.S: InfoSec Institute; [Date unknown]. Available: http://resources.infosecinstitute.com/skype-forensics-2/.Accessed 24 May 2015.
-
(2015)
Skype Forensics
-
-
-
67
-
-
85013203380
-
-
S: Magnet Forensics; Available: Accessed 12 May 2015
-
McQuaid J. Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile U.S: Magnet Forensics; 2012. Available: http://www.magnetforensics.com/wp-content/uploads/2014/04/SkypeForensics-Analyzing-Call-and-Chat-Data-From-Computers-and-Mobile-Magnet-Forensics.pdf. Accessed 12 May 2015.
-
(2012)
Skype Forensics: Analyzing Call and Chat Data from Computers and Mobile U
-
-
McQuaid, J.1
-
68
-
-
84958034911
-
Android mobile VoIP apps: A survey and examination of their security and privacy
-
Azfar A, Choo K-KR, Liu L. Android mobile VoIP apps: A survey and examination of their security and privacy. Electronic Commerce Research. 2016. doi: 10.1007/s10660-015-9208-1
-
(2016)
Electronic Commerce Research
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
72
-
-
84947587045
-
A forensically sound adversary model for mobile devices
-
PMID: 26393812
-
Do Q, Martini B, Choo K-KR 2015. A Forensically Sound Adversary Model for Mobile Devices. PLOS ONE 10(9): e0138449. doi: 10.1371/journal.pone.0138449 PMID: 26393812
-
(2015)
PLOS ONE
, vol.10
, Issue.9
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
75
-
-
84967194749
-
Forensic collection and analysis of thumbnails in android
-
ISPA.2015. 483
-
Leom MD, D'Orazio C, Deegan G, Choo K-KR. Forensic Collection and Analysis of Thumbnails in Android. In Proceedings of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015). 2015: 1059–1066. 10.1109/Trustcom-BigDataSe-ISPA.2015. 483.
-
(2015)
Proceedings of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015)
, pp. 1059-1066
-
-
Leom, M.D.1
D'Orazio, C.2
Deegan, G.3
Choo, K.-K.R.4
-
76
-
-
85013227756
-
Cyber warfare trends and future
-
Aug
-
Ganji M, Dehghantanha A, Udzir NI, Damshenas M. Cyber warfare trends and future. Advances in Information Sciences and Service Sciences. 2013 Aug; 5(13): 1–10.
-
(2013)
Advances in Information Sciences and Service Sciences
, vol.5
, Issue.13
, pp. 1-10
-
-
Ganji, M.1
Dehghantanha, A.2
Udzir, N.I.3
Damshenas, M.4
|