Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference17 articles.
1. (2017) Press Release: UK Youth Targeted With Sexual Harassment On The Internet. Childnet International. https://www.childnet.com/blog/press-release-uk-youth-targeted-with-sexual-harassment-on-the-internethttps://www.childnet.com/blog/press-release-uk-youth-targeted-with-sexual-harassment-on-the-internet. Accessed 8 July 2020
2. (2018) Smartphone Theft Statistics. Identity-theft-awareness.com. http://www.identity-theftawareness.com/smartphone-theft-statistics.html. Accessed 29 February 2020
3. Glisson W, Storer B, Buchanan-Wollaston T (2013) J An empirical comparison of data recovered from mobile forensic toolkits. Digital Investigation. Elsevier 10:44–55. https://doi.org/10.1109/CCAA.2016.7813792
4. Jaeheung L, Sangho Y, Junyoung H, Hyungbae P, Sung YS, Yookun C (2010) . J Inf Sci Eng 26:27–38
5. Joel R, Claudio M, Srdjan Ç, David A (2012) User-level secure deletion on log-structured file systems. Proceedings of the Seventh Symposium on Information, Computer and Communications Security. https://doi.org/10.1145/2414456.2414493