1. Akkaladevi S, Keesara H, Luo X (2011) Efficient forensic tools for handheld device: a comprehensive perspective. Softw Eng Res Manag Appl Stud Comput Intell 377:349–359
2. Andrew H (2011) Android forensics: investigation, analysis and mobile security for google android. Syngress
3. Andrew H, Katie S (2011) iPhone and iOS forensics: investigation, analysis and mobile security for apple iPhone, iPad, and iOS devices. Syngress
4. Andriotis P, Oikonomou G, Tryfonas T (2012) Forensic analysis of wireless networking evidence of android smartphones. 2012 I.E. International Workshop on Information Forensics and Security, pp. 109–114
5. Baek SJ, Han JS, Chung KY (2013) Dynamic reconfiguration based on goal-scenario by adaptation strategy. Wirel Pers Commun. doi: 10.1007/s11277-013-1239-0