1. Forensic analysis of wireless networking evidence of android smartphones;Andriotis,2012
2. Good practice guide for computer-based electronic evidence. V5.0;Association of Chief Police Officers,2011
3. The myths and facts behind cyber security risks for industrial control systems;Byres,2004
4. Malicious traffic analysis in wireless sensor networks using advanced signal processing techniques;Fragkiadakis,2013
5. Hui (Ed.) J, Thubert P. Compression format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282; 2011.