Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account
暂无分享,去创建一个
[1] Jason Moore,et al. Network and device forensic analysis of Android social-messaging applications , 2015, Digit. Investig..
[2] Ibrahim M. Baggili,et al. Forensic artifacts of Facebook's instant messaging service , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[3] Marcus K. Rogers,et al. Mobile Phone Forensics Tool Testing: A Database Driven Approach , 2007, Int. J. Digit. EVid..
[4] Mike Dickson. An examination into MSN Messenger 7.5 contact identification , 2006, Digit. Investig..
[5] Mike Dickson. An examination into Yahoo Messenger 7.0 contact identification , 2006, Digit. Investig..
[6] Daryl Johnson,et al. Third Party Application Forensics on Apple Mobile Devices , 2011, 2011 44th Hawaii International Conference on System Sciences.
[7] Marwan Al-Zarouni. Mobile handset forensic evidence: a challenge for law enforcement , 2006 .
[8] Marcus K. Rogers,et al. Forensic Analysis of Volatile Instant Messaging , 2008, IFIP Int. Conf. Digital Forensics.
[9] Kim-Kwang Raymond Choo,et al. An Android Social App Forensics Adversary Model , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[10] Mustafa Kaya,et al. Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools , 2017 .
[11] Kim-Kwang Raymond Choo,et al. Privacy Risks in Mobile Dating Apps , 2015, AMCIS.
[12] Alexey Melnikov,et al. The WebSocket Protocol , 2011, RFC.
[13] Leysia Palen,et al. Chatting with teenagers: Considering the place of chat technologies in teen life , 2006, TCHI.
[14] Ibrahim M. Baggili,et al. WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages , 2015, Digit. Investig..
[15] Giuseppe Riva,et al. Virtual reality: an experiential tool for clinical psychology , 2009 .
[16] Aditya Mahajan,et al. Forensic Analysis of Instant Messenger Applications on Android Devices , 2013, ArXiv.
[17] Edgar R. Weippl,et al. Network-Based Secret Communication in Clouds: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[18] Jessica Reust. Case study: AOL instant messenger trace evidence , 2006, Digit. Investig..
[19] Mike Dickson. An examination into AOL Instant Messenger 5.5 contact identification , 2006, Digit. Investig..
[20] Maria V. Sanchez-Vives,et al. From presence to consciousness through virtual reality , 2005, Nature Reviews Neuroscience.
[21] Alfred Kobsa,et al. Privacy in instant messaging: an impression management model , 2012, Behav. Inf. Technol..
[22] Ivan E. Sutherland,et al. A head-mounted three dimensional display , 1968, AFIPS Fall Joint Computing Conference.
[23] Mark A. Lemley,et al. Law, Virtual Reality, and Augmented Reality , 2018 .
[24] James N. Danziger,et al. IM = Interruption Management? Instant Messaging and Disruption in the Workplace , 2007, J. Comput. Mediat. Commun..
[25] Edgar R. Weippl,et al. Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications , 2012, NDSS.