1. FTK imager;AccessData Corporation,2013
2. Social networks IM forensics: encryption analysis;Barghuthi;J Commun,2013
3. Lawful hacking: using existing vulnerabilities for wiretapping on the internet;Bellovin,2013
4. Cellebrite Android forensics;Cellebrite LTD,2013
5. WhatsApp database encryption project report;Cortjens,2011