Author:
Yusoff M.N.,Dehghantanha A.,Mahmod R.
Reference33 articles.
1. Defusing the hazards of social network services;Mohtasebi;Int. J. Digit. Inf. Wirel. Commun.,2011
2. A mitigation approach to the privacy and malware threats of social network services;Mohtasebi,2011
3. Investigating social networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms;Dezfouli;Aust. J. Forensic Sci.,2016
4. Digital evidence from mobile telephone applications;Taylor;Comput. Law Secur. Rev.,2012
5. A data-centric model for smartphone security;Dezfouli;Int. J. Adv. Comput. Technol.,2013
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献