1 |
KISA, "Smart TV Market Trend Analysis," Jan. 2013.
|
2 |
ETRI, "Market outlook and the results of Smart TV receptor Servey," Jan. 2013.
|
3 |
B.D. Carrier and E.H. Spafford, "An event-based digital forensic investigation framework," Proceedings of the 2004 digital forensic research workshop (DFRWS), pp. 11-13, Jul. 2004.
|
4 |
C.C. Wood, W.W. Banks, S.B. Guarro, A.A. Garcia, V.E. Hampel and H.P. Satorio, "Computer security: a comprehensive controls checklist," Wiley-Interscience, 1987.
|
5 |
S.L. Garfinkel, "Digital forensics research: The next 10 years," Digital Investigation 7, vol. 7, pp. S64-S73, Aug. 2010.
DOI
|
6 |
KCC, "The use of survey form broadcast medium in 2013 years," Dec. 2013.
|
7 |
Jeong-hyun Lim, Chang-woo Song, Kyung-young Chung, Ki-wook Rim and Jung-hyun Lee, "Forensic evidence collection procedures of smartphone in crime scene," IT Convergence and Security 2012, vol. 215, pp. 35-41, Dec. 2012.
|
8 |
A. Grattafiori and J. Yavor, "The outer limits: Hacking the samsung Smart TV," Black Hat Briefings (2013), Jul. 2013.
|
9 |
Seung-jin (beist) Lee and Seung-joo Kim, "Hacking, Surveilling, and Deceiving the Audience with Smart TV," Black Hat Briefings (2013), Jul. 2013.
|
10 |
B. Michele and A. Karpow, "Watch and be Watched: Compromising All Smart TV Generations," Proceedings of the 11th Consumer Communications Networking Conference (to appear), CCNC. IEEE, Jan. 2014.
|