Forensic analysis of wireless networking evidence of Android smartphones, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.109-114, 2012. ,
DOI : 10.1109/WIFS.2012.6412634
Highlighting Relationships of a Smartphone???s Social Ecosystem in Potentially Large Investigations, IEEE Transactions on Cybernetics, vol.46, issue.9, 2016. ,
DOI : 10.1109/TCYB.2015.2454733
A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM, Advances in Digital Forensics XI, pp.251-267, 2015. ,
DOI : 10.1007/978-3-319-24123-4_15
URL : https://hal.archives-ouvertes.fr/hal-01449062
MyShield: Protecting Mobile Device Data via Security Circles, 2012. ,
Capturing locationprivacy preferences: Quantifying accuracy and user-burden tradeoffs , Personal and Ubiquitous Computing, pp.679-694, 2011. ,
DOI : 10.1007/s00779-010-0346-0
URL : http://www.cs.cmu.edu/~sadeh/Publications/Small%20Selection/Capturing%20Location-Privacy%20Preferences%20Tech%20Report%20CMU-ISR-10-105.pdf
MockDroid, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, pp.49-54, 2011. ,
DOI : 10.1145/2184489.2184500
Exploring end user preferences for location obfuscation, location-based services and the value of location, Proceedings of the Twelfth ACM International Conference on Ubiquitous Computing, pp.95-104, 2010. ,
Location privacy: User behavior in the field, Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp.51-56, 2012. ,
Mobile device security considerations for small- and medium-sized enterprise business mobility, Information Management & Computer Security, vol.22, issue.1, pp.97-114, 2014. ,
DOI : 10.1108/09685229910371071
On Usable Location Privacy for Android with Crowd-Recommendations, Proceedings of the Seventh International Conference on Trust and Trustworthy Computing, pp.74-82, 2014. ,
DOI : 10.1007/978-3-319-08593-7_5
Selective cloaking: Need-to-know for location-based apps, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.19-26, 2013. ,
DOI : 10.1109/PST.2013.6596032
These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.639-652, 2011. ,
DOI : 10.1145/2046707.2046780
App Ops " privacy control feature from Android 4.4.2, DailyTech, 2013. ,
Expectation and purpose, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pp.501-510, 2012. ,
DOI : 10.1145/2370216.2370290
The implications of offering more disclosure choices for social location sharing, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.391-394, 2012. ,
DOI : 10.1145/2207676.2207730
Evading android runtime analysis via sandbox detection, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.447-458, 2014. ,
DOI : 10.1145/2590296.2590325
URL : http://dl.acm.org/ft_gateway.cfm?id=2590325&type=pdf