Author:
Berrios Jessica,Mosher Elias,Benzo Sankofa,Grajeda Cinthya,Baggili Ibrahim
Funder
National Science Foundation
Subject
Law,Medical Laboratory Technology,Computer Science Applications,Information Systems,Pathology and Forensic Medicine
Reference29 articles.
1. Forensic analysis of social networking applications on mobile devices;Al Mutawa;Digit. Invest.,2012
2. America, N. (2022), ‘What is two-factor authentication (2fa)?’. URL: https://www.newamerica.org/in-depth/getting-internet-companies-do-right-thing/case-study-2-offering-two-factor-authentication/#::̃text=Though%20there%20have%20been %20several,a%20key%20fob%20in%201986.
3. Drop (drone open source parser) your drone: forensic analysis of the dji phantom iii;Clark;Digit. Invest.,2017
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献