1. M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin, S. Ghemawat, G. Irving, M. Isard, M. Kudlur, J. Levenberg, R. Monga, S. Moore, D. Murray, B. Steiner, P. Tucker, V. Vasudevan, P. Warden, M. Wicke, Y. Yu and X. Zheng, Tensorflow: A system for large-scale machine learning, Proceedings of the Twelfth USENIX Symposium on Operating Systems Design and Implementation, pp. 265–283, 2016
2. N. Al Mutawa, I. Baggili and A. Marrington, Forensic analysis of social networking applications on mobile devices, Digital Investigation, vol. 9(S), pp. S24–S33, 2012
3. A. Aminnezhad, A. Dehghantanha and M. Abdullah, A survey of privacy issues in digital forensics, International Journal of Cyber-Security and Digital Forensics, vol. 1(4), pp. 311–323, 2012
4. C. Anglano, Forensic analysis of WhatsApp Messenger on Android smartphones, Digital Investigation, vol. 11(3), pp. 201–213, 2014
5. Apple, Core ML, Cupertino, California (
developer.apple.com/documentation/coreml
), 2017