1 |
Microsoft, "Make IoT real with the Internet of Your Things,"
|
2 |
Kortuem, Gerd, et al. "Smart objects as building blocks for the internet of things." Internet Computing, IEEE 14.1 (2010): 44-51, December 2009.
|
3 |
Sundmaeker, Harald, et al., Vision and challenges for realising the Internet of Things, 2010.
|
4 |
A. Grant and O. Mike. The Definitive Guide to SQLite. Apress LP, 2010.
|
5 |
Enck, William, et al. "A Study of Android Application Security," USENIX security symposium, Vol. 2. 2011.
|
6 |
Apple iPhone
|
7 |
Baset, Salman A., and Henning Schulzrinne. "An analysis of the skype peer-to-peer internet telephony protocol," in Proc. of IEEE INFOCOM 2006.
|
8 |
Casey, Eoghan. Digital evidence and computer crime: forensic science, computers and the internet. Academic press, 2011.
|
9 |
M. T. Pereira, "Forensic Analysis of the Firefox 3 Internet History and Recovery of Deleted SQLite Records," Digital Investigation, Vol. 5. No. 3, pp.93-103, 2009.
DOI
|
10 |
K. Lee, S. Yang, W. Hwang, K. Kim, T, Jang, and G. Son, A Recovery Scheme for the Deleted Overflow Data in SQLite Database", Journal of KIIT, Vol. 10, No. 11, pp.143-153, 2011.
|
11 |
S. Jeon, J. Bang, K. Byun, and S. Lee, "A Recovery Method of Deleted Record for SQLite Database," Personal and Ubiquitous Computing, Vol. 16, No. 6, pp.707-715, 2012.
DOI
|
12 |
S. Lee and H. Yum, "A Recovery Method of Deleted Record Using The Schema Pattern Analysis for SQLite Database," The workshop for digital forensic technique, 2011. 8.
|
13 |
J. Lee, M. Shin, Y. Jang, and S. Park. "A Novel Recovery Scheme for SQLite Based on Logical Logging," Journal of KIIT, Vol. 12, No. 11, pp. 181-192, Nov. 30, 2014.
|