1. Zhou, X., Zhao, Z., Li, R., Zhou, Y., Palicot, J., Zhang, H.: Understanding the Nature of Social Mobile Instant Messaging in Cellular Networks. 18(3), 389–392 (2014)
2. Andersson, F.: Designing a Secure Client-Server System, September 2009
3. Joshi, M., Hadi, T.H.: A review of network traffic analysis and prediction techniques. ArXiv Preprint ArXiv:1507.05722 (2015)
4. Dickson, M., Messenger, M.S.N.: An examination into Trillian basic 3. x contact. Digit. Investig. 4(1), 36–45 (2007). https://doi.org/10.1016/j.diin.2007.01.003
5. Meghanathan, N., Allam, S.R., Moore, L.A.: Tools and techniques for network forensics. Int. J. Netw. Secur. Appl. (IJNSA), 1(1). https://arxiv.org/ftp/arxiv/papers/1004/1004.0570.pdf