4.5 Article

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users

Related references

Note: Only part of the references are listed.
Review Computer Science, Information Systems

New payment methods: A review of 2010-2012 FATF mutual evaluation reports

Kim-Kwang Raymond Choo

COMPUTERS & SECURITY (2013)

Article Computer Science, Information Systems

Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?

Darren Quick et al.

DIGITAL INVESTIGATION (2013)

Article Computer Science, Information Systems

Cloud storage forensics: ownCloud as a case study

Ben Martini et al.

DIGITAL INVESTIGATION (2013)

Article Computer Science, Information Systems

Dropbox analysis: Data remnants on user machines

Darren Quick et al.

DIGITAL INVESTIGATION (2013)

Article Computer Science, Theory & Methods

Digital droplets: Microsoft SkyDrive forensic data remnants

Darren Quick et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Law

Cloud computing and its implications for cybercrime investigations in Australia

Christopher Hooper et al.

COMPUTER LAW & SECURITY REVIEW (2013)

Article Computer Science, Hardware & Architecture

Open Sesame: Design Guidelines for Invisible Passwords

Andrea Bianchi et al.

COMPUTER (2012)

Article Computer Science, Information Systems

The cyber threat landscape: Challenges and future research directions

Kim-Kwang Raymond Choo

COMPUTERS & SECURITY (2011)

Article Computer Science, Information Systems

Rogue-Access-Point Detection Challenges, Solutions, and Future Directions

Raheem Beyah et al.

IEEE SECURITY & PRIVACY (2011)

Article Computer Science, Hardware & Architecture

INTERVIEW: SOFTWARE SECURITY IN THE REAL WORLD

Ann E. K. Sobel et al.

COMPUTER (2010)