Related references
Note: Only part of the references are listed.New payment methods: A review of 2010-2012 FATF mutual evaluation reports
Kim-Kwang Raymond Choo
COMPUTERS & SECURITY (2013)
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
Darren Quick et al.
DIGITAL INVESTIGATION (2013)
Cloud storage forensics: ownCloud as a case study
Ben Martini et al.
DIGITAL INVESTIGATION (2013)
Dropbox analysis: Data remnants on user machines
Darren Quick et al.
DIGITAL INVESTIGATION (2013)
Digital droplets: Microsoft SkyDrive forensic data remnants
Darren Quick et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)
Cloud computing and its implications for cybercrime investigations in Australia
Christopher Hooper et al.
COMPUTER LAW & SECURITY REVIEW (2013)
Open Sesame: Design Guidelines for Invisible Passwords
Andrea Bianchi et al.
COMPUTER (2012)
The cyber threat landscape: Challenges and future research directions
Kim-Kwang Raymond Choo
COMPUTERS & SECURITY (2011)
Rogue-Access-Point Detection Challenges, Solutions, and Future Directions
Raheem Beyah et al.
IEEE SECURITY & PRIVACY (2011)
INTERVIEW: SOFTWARE SECURITY IN THE REAL WORLD
Ann E. K. Sobel et al.
COMPUTER (2010)