{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:02:16Z","timestamp":1729638136650,"version":"3.28.0"},"reference-count":15,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12,24]]},"DOI":"10.1117\/12.2051375","type":"proceedings-article","created":{"date-parts":[[2013,12,24]],"date-time":"2013-12-24T21:50:21Z","timestamp":1387921821000},"page":"906715","source":"Crossref","is-referenced-by-count":1,"title":["Forensic analysis of social networking application on iOS devices"],"prefix":"10.1117","volume":"9067","author":[{"given":"Shuhui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lianhai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"c1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110804"},{"key":"c2","unstructured":"Vamshi Kancheti, \u201cSecurity Analysis of Social Networks\u201d, master dissertation, Texas A\u2026M University, (2010)."},{"article-title":"2012 by the numbers Kaspersky Lab now detects 200,000 new malicious programs every day","year":"2012","author":"Kaspersky","key":"c3"},{"article-title":"73% of smartphone owners use a social networking app on a daily basis Econsultancy","year":"2012","author":"David","key":"c4"},{"key":"c5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.007"},{"article-title":"Forensic examination of a RIM (BlackBerry) wireless device","year":"2002","author":"Michael W.","key":"c6"},{"key":"c7","unstructured":"Kubasiak R, Morrissey S and Varsalone J, Macintosh OS X, iPod, and iPhone forensic analysis DVD toolkit(1st Edition), Syngress, Burlington (2008)."},{"key":"c8","unstructured":"Zdziarski J, iPhone forensics: recovering evidence, personal data, and corporate assets (1st Edition), O\u2019Reilly Media, Sebastopol (2008)."},{"issue":"no.1","key":"c9","first-page":"1","article-title":"Android forensics: simplifying cell phone examinations","volume":"vol.4","author":"Lessard","year":"2010"},{"key":"c10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.03.007"},{"key":"c11","first-page":"146","article-title":"Antisocial networks: turning a social network into a Botnet","author":"Athanasopoulos","year":"2008"},{"key":"c12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.138"},{"key":"c13","first-page":"771","article-title":"Forensic artifacts of Facebook\u2019s instant messaging service","author":"Al Mutawa","year":"2011"},{"issue":"no.1","key":"c14","first-page":"1","article-title":"iPhone 3GS forensics: logical analysis using apple itunes backup utility","volume":"vol.4","author":"Bader","year":"2010"},{"key":"c15","doi-asserted-by":"crossref","unstructured":"Sean Morrissey, iOS forensic analysis for iPhone, iPad, and iPod touch(1st Edition), Apress, New York (2010).","DOI":"10.1007\/978-1-4302-3343-5"}],"event":{"name":"Sixth International Conference on Machine Vision (ICMV 13)","location":"London, United Kingdom"},"container-title":["SPIE Proceedings","Sixth International Conference on Machine Vision (ICMV 2013)"],"original-title":[],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T05:43:59Z","timestamp":1564983839000},"score":1,"resource":{"primary":{"URL":"http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?doi=10.1117\/12.2051375"}},"subtitle":[],"editor":[{"given":"Branislav","family":"Vuksanovic","sequence":"first","affiliation":[]},{"given":"Jianhong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Antanas","family":"Verikas","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2013,12,24]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1117\/12.2051375","relation":{},"ISSN":["0277-786X"],"issn-type":[{"type":"print","value":"0277-786X"}],"subject":[],"published":{"date-parts":[[2013,12,24]]}}}