Impact of User Data Privacy Management Controls on Mobile Device Investigations
暂无分享,去创建一个
[1] Theodore Tryfonas,et al. Forensic analysis of wireless networking evidence of Android smartphones , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[2] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[3] Matthew Smith,et al. Selective cloaking: Need-to-know for location-based apps , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[4] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[5] Nicolas Christin,et al. Evading android runtime analysis via sandbox detection , 2014, AsiaCCS.
[6] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[7] John Krumm,et al. Exploring end user preferences for location obfuscation, location-based services, and the value of location , 2010, UbiComp.
[8] David A. Wagner,et al. Short paper: location privacy: user behavior in the field , 2012, SPSM '12.
[9] Matthew Smith,et al. On Usable Location Privacy for Android with Crowd-Recommendations , 2014, TRUST.
[10] George Oikonomou,et al. Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations , 2016, IEEE Transactions on Cybernetics.
[11] Mark A. Harris,et al. Mobile device security considerations for small- and medium-sized enterprise business mobility , 2014, Inf. Manag. Comput. Secur..
[12] Lorrie Faith Cranor,et al. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.
[13] Andrew Fisher. Location Privacy: User Behavior in the Field , 2012 .
[14] Daniel P. Siewiorek,et al. The implications of offering more disclosure choices for social location sharing , 2012, CHI.
[15] Richard Han,et al. MyShield: Protecting Mobile Device Data via Security Circles ; CU-CS-1091-12 , 2012 .
[16] Theodore Tryfonas,et al. A Framework for Describing Multimedia Circulation in a Smartphone Ecosystem , 2015, IFIP Int. Conf. Digital Forensics.