1. S. Abt and H. Baier, Are we missing labels? A study of the availability of ground truth in network security research, Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 40–55, 2014.
2. K. Barmpatsalou, T. Cruz, E. Monteiro and P. Simoes, Current and future trends in mobile device forensics, ACM Computing Surveys, vol. 51(3), article no. 46, 2018.
3. J. Camacho, K. Campos, P. Cedillo, B. Coronel and A. Bermeo, Forensic analysis of mobile devices: A systematic mapping study, in Information and Communication Technologies of Ecuador, M. Botto-Tobar, L. Barba-Maggi, J. Gonzalez-Huerta, P. Villacres-Cevallos, O. Gomez and M. Uvidia-Fassler (Eds.), Springer, Cham, Switzerland, pp. 57–72, 2018.
4. E. Casey and C. Rose, Forensic analysis, in Handbook of Digital Forensics and Investigation, E. Casey (Ed.), Elsevier, Burlington, Massachusetts, pp. 21–62, 2010.
5. European Parliament and Council, Regulation (EU) 2016/679, Official Journal of the European Union, vol. 59(L 119), pp. 1–88, 2016.