A comprehensive survey on artifact recovery from social media platforms: approaches and future research directions
Social media applications have been ubiquitous in modern society, and their usage has
grown exponentially over the years. With the widespread adoption of these platforms, social …
grown exponentially over the years. With the widespread adoption of these platforms, social …
Zooming into the pandemic! A forensic analysis of the Zoom Application
A Mahr, M Cichon, S Mateo, C Grajeda… - Forensic Science …, 2021 - Elsevier
The global pandemic of COVID-19 has turned the spotlight on video conferencing
applications like never before. In this critical time, applications such as Zoom have …
applications like never before. In this critical time, applications such as Zoom have …
Characteristics of viral messages on Telegram; The world's largest hybrid public and private messenger
Telegram is a new Instant Messaging application providing key features for both public and
private messaging. Telegram is similar to group broadcast or micro-blogging platforms …
private messaging. Telegram is similar to group broadcast or micro-blogging platforms …
DeepProfile: Finding fake profile in online social network using dynamic CNN
P Wanda, HJ Jie - Journal of Information Security and Applications, 2020 - Elsevier
Abstract Online Social Networks (OSN) are popular applications for sharing various data,
including text, photos, and videos. However, fake account problems are one of the obstacles …
including text, photos, and videos. However, fake account problems are one of the obstacles …
The pushshift telegram dataset
J Baumgartner, S Zannettou, M Squire… - Proceedings of the …, 2020 - aaai.org
Messaging platforms, especially those with a mobile focus, have become increasingly
ubiquitous in society. These mobile messaging platforms can have deceivingly large user …
ubiquitous in society. These mobile messaging platforms can have deceivingly large user …
Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong
MR Albrecht, J Blasco, RB Jensen… - 30th USENIX security …, 2021 - usenix.org
The Anti-Extradition Law Amendment Bill protests in Hong Kong present a rich context for
exploring information security practices among protesters due to their large-scale urban …
exploring information security practices among protesters due to their large-scale urban …
[HTML][HTML] Virtual reality forensics: Forensic analysis of Meta Quest 2
E Raymer, Á MacDermott, A Akinbi - Forensic Science International: Digital …, 2023 - Elsevier
Abstract The Meta Quest 2 is one of the most popular Virtual Reality (VR) entertainment
headsets to date. The headset, developed by Meta Platforms Inc., immerses the user in a …
headsets to date. The headset, developed by Meta Platforms Inc., immerses the user in a …
DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning
P Wanda, HJ Jie - Social Network Analysis and Mining, 2021 - Springer
Abstract Detection of Online Social Networks (OSN) anomalous nodes becomes
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …
increasingly essential to identify malicious activities. The abnormal nodes suspiciously …
Forensic analysis of encrypted instant messaging applications on Android
K Rathi, U Karabiyik, T Aderibigbe… - 2018 6th international …, 2018 - ieeexplore.ieee.org
Smartphone market is growing day by day and according to Statista, as of 2017, 68.4% of
the US population uses smartphones. Similarly, the amount of information stored on these …
the US population uses smartphones. Similarly, the amount of information stored on these …
Encrypted network traffic analysis of secure instant messaging application: A case study of signal messenger app
Instant messaging applications (apps) have played a vital role in online interaction,
especially under COVID-19 lockdown protocols. Apps with security provisions are able to …
especially under COVID-19 lockdown protocols. Apps with security provisions are able to …