The disclosure of an Android smartphone’s digital footprint respecting the Instant Messaging utilizing Skype and MSN
暂无分享,去创建一个
[1] Vrizlynn L. L. Thing,et al. Live memory forensics of mobile phones , 2010, Digit. Investig..
[2] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[3] Maro Vlachopoulou,et al. Modeling users’ acceptance of mobile services , 2012, Electronic Commerce Research.
[4] Farkhund Iqbal,et al. Speaker verification from partially encrypted compressed speech for forensic investigation , 2010, Digit. Investig..
[5] Andrew Hoog. Android and mobile forensics , 2011 .
[6] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[7] Mauro Conti,et al. Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.
[8] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[9] Gary C. Kessler,et al. Android forensics: Simplifying cell phone examinations , 2010 .
[10] Gianluigi Me,et al. Android anti-forensics through a local paradigm , 2010, Digit. Investig..
[11] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[12] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[13] Muddassar Farooq,et al. Keystroke-Based User Identification on Smart Phones , 2009, RAID.
[14] Fu-Shing Sun,et al. GeoTools: An android phone application in geology , 2012, Comput. Geosci..
[15] Yi Ren,et al. A privacy policy conflict detection method for multi-owner privacy data protection , 2011, Electron. Commer. Res..
[16] Sebastian Möller,et al. On the need for different security methods on mobile phones , 2011, Mobile HCI.
[17] Juha-Miikka Nurmilaakso,et al. ICT solutions and labor productivity: evidence from firm-level data , 2009, Electron. Commer. Res..
[18] Herbert Bos,et al. Paranoid Android : Zero-Day Protection for Smartphones Using the Cloud , 2010 .
[19] Andrew Hoog. Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog ; John McCash, technical editor. , 2011 .
[20] Nir Kshetri,et al. Cybercrime and cyber-security issues associated with China: some economic and institutional considerations , 2013, Electron. Commer. Res..
[21] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.