1. Clark, D.: Characterizing cyberspace: past, present and future. MIT CSAIL, Version 1, 2016–2028 (2010)
2. Daware, S., Dahake, S., Thakare, V.: Mobile forensics: overview of digital forensic, computer forensics vs. mobile forensics and tools. Int. J. Comput. Appl. 7–8 (2012)
3. Deacon, R.E., Firebaugh, F.M.: Family Resource Management: Principles and Applications. Allyn and Bacon, Boston (1981)
4. D’Orazio, C.J., Lu, R., Choo, K.K.R., Vasilakos, A.V.: A markov adversary model to detect vulnerable ios devices and vulnerabilities in IOS apps. Appl. Math. Comput. 293, 523–544 (2017)
5. Economist, T.: The economist intelligence unit’s democracy index (2016). https://infographics.economist.com/2017/DemocracyIndex/