Author of the publication

The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia.

, , , and . Multimedia Tools Appl., 75 (22): 14039-14055 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information retrieval concerning attitudinal and motivational antecedents of contribution concerning web 2.0 online rescue activities based on the pervasive it education., , , and . ICMLC, page 1884-1889. IEEE, (2012)The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era., , and . Symmetry, 7 (2): 383-394 (2015)Digital Trails Discovering of a GPS Embedded Smart Phone - Take Nokia N78 Running Symbian S60 Ver 3.2 for Example., , , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 41-49. Springer, (2011)The digital forensics of GPS path records and the discovery of previous Facebook IDs on a Pocket PC PDA.. Secur. Commun. Networks, 7 (12): 2627-2636 (2014)An Efficient Method for Optimizing RFID Reader Deployment and Energy Saving, , , and . CoRR, (2013)Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security., , and . Secur. Commun. Networks, 4 (9): 1044-1062 (2011)Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts., and . Secur. Commun. Networks, 9 (11): 1405-1416 (2016)The Cooperation Mechanism of Multi-agent Systems with Respect to Big Data from Customer Relationship Management Aspect., and . ACIIDS (1), volume 9011 of Lecture Notes in Computer Science, page 562-572. Springer, (2015)Innovative Semantic Web Services for Next Generation Academic Electronic Library via Web 3.0 via Distributed Artificial Intelligence., and . ACIIDS (1), volume 7196 of Lecture Notes in Computer Science, page 118-124. Springer, (2012)The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows., , and . Secur. Commun. Networks, 9 (18): 5698-5709 (2016)