A comprehensive survey on artifact recovery from social media platforms: approaches and future research directions

K Gupta, D Oladimeji, C Varol, A Rasheed… - Information, 2023 - mdpi.com
Social media applications have been ubiquitous in modern society, and their usage has
grown exponentially over the years. With the widespread adoption of these platforms, social …

Zooming into the pandemic! A forensic analysis of the Zoom Application

A Mahr, M Cichon, S Mateo, C Grajeda… - Forensic Science …, 2021 - Elsevier
The global pandemic of COVID-19 has turned the spotlight on video conferencing
applications like never before. In this critical time, applications such as Zoom have …

Characteristics of viral messages on Telegram; The world's largest hybrid public and private messenger

AD Nobari, MHKM Sarraf, M Neshati… - Expert systems with …, 2021 - Elsevier
Telegram is a new Instant Messaging application providing key features for both public and
private messaging. Telegram is similar to group broadcast or micro-blogging platforms …

DeepProfile: Finding fake profile in online social network using dynamic CNN

P Wanda, HJ Jie - Journal of Information Security and Applications, 2020 - Elsevier
Abstract Online Social Networks (OSN) are popular applications for sharing various data,
including text, photos, and videos. However, fake account problems are one of the obstacles …

The pushshift telegram dataset

J Baumgartner, S Zannettou, M Squire… - Proceedings of the …, 2020 - aaai.org
Messaging platforms, especially those with a mobile focus, have become increasingly
ubiquitous in society. These mobile messaging platforms can have deceivingly large user …

Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong

MR Albrecht, J Blasco, RB Jensen… - 30th USENIX security …, 2021 - usenix.org
The Anti-Extradition Law Amendment Bill protests in Hong Kong present a rich context for
exploring information security practices among protesters due to their large-scale urban …

[HTML][HTML] Virtual reality forensics: Forensic analysis of Meta Quest 2

E Raymer, Á MacDermott, A Akinbi - Forensic Science International: Digital …, 2023 - Elsevier
Abstract The Meta Quest 2 is one of the most popular Virtual Reality (VR) entertainment
headsets to date. The headset, developed by Meta Platforms Inc., immerses the user in a …

DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning

P Wanda, HJ Jie - Social Network Analysis and Mining, 2021 - Springer
Abstract Detection of Online Social Networks (OSN) anomalous nodes becomes
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …

Forensic analysis of encrypted instant messaging applications on Android

K Rathi, U Karabiyik, T Aderibigbe… - 2018 6th international …, 2018 - ieeexplore.ieee.org
Smartphone market is growing day by day and according to Statista, as of 2017, 68.4% of
the US population uses smartphones. Similarly, the amount of information stored on these …

Encrypted network traffic analysis of secure instant messaging application: A case study of signal messenger app

A Afzal, M Hussain, S Saleem, MK Shahzad, ATS Ho… - Applied Sciences, 2021 - mdpi.com
Instant messaging applications (apps) have played a vital role in online interaction,
especially under COVID-19 lockdown protocols. Apps with security provisions are able to …