Hutchinson et al., 2020 - Google Patents
Forensic analysis of dating applications on android and ios devicesHutchinson et al., 2020
- Document ID
- 7731411098732713450
- Author
- Hutchinson S
- Shantaram N
- Karabiyik U
- Publication year
- Publication venue
- 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
External Links
Snippet
Dating application use is on the rise, and with it comes the need to better understand what data can be recovered to assist in an investigation. While using these dating applications, people send countless messages (including pictures and videos) without ever considering …
- 238000004374 forensic analysis 0 title abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72522—With means for supporting locally a plurality of applications to increase the functionality
- H04M1/72547—With means for supporting locally a plurality of applications to increase the functionality with interactive input/output means for internally managing multimedia messages
- H04M1/72552—With means for supporting locally a plurality of applications to increase the functionality with interactive input/output means for internally managing multimedia messages for text messaging, e.g. sms, e-mail
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10348726B2 (en) | Online identity verification platform and process | |
Farnden et al. | Privacy risks in mobile dating apps | |
US9460299B2 (en) | System and method for monitoring and reporting peer communications | |
US20120151047A1 (en) | Communication monitoring system and method enabling designating a peer | |
Azfar et al. | An android social app forensics adversary model | |
Shetty et al. | Are you dating danger? an interdisciplinary approach to evaluating the (in) security of android dating apps | |
Knox et al. | What’s really ‘Happning’? A forensic analysis of Android and iOS Happn dating apps | |
JP2019516270A (en) | System and method for identifying matching content | |
Hutchinson et al. | Forensic analysis of dating applications on android and ios devices | |
US20110029618A1 (en) | Methods and systems for managing virtual identities in the internet | |
Rodríguez-Rodríguez et al. | How are universities using Information and Communication Technologies to face sexual harassment and how can they improve? | |
Cobo et al. | Turn off your camera and turn on your privacy: A case study about Zoom and digital education in South American countries | |
Shavers et al. | Hiding behind the keyboard: uncovering covert communication methods with forensic analysis | |
Mata et al. | Are your neighbors swingers or kinksters? feeld app forensic analysis | |
Holmes | Myths and missed opportunities: Young people's not so risky use of online communication | |
Vukadinovic | Whatsapp forensics: Locating artifacts in web and desktop clients | |
Rahman et al. | Accepting information with a pinch of salt: handling untrusted information sources | |
Nurse | Exploring the risks to identity security and privacy in cyberspace | |
Efe et al. | How privacy is threatened from social media communication? | |
Hayes et al. | Privacy and security issues associated with mobile dating applications | |
KR101690850B1 (en) | Systems and methods for encrypted mobile voice communications | |
Paspatis et al. | Mobile application privacy risks: Viber users’ de-anonymization using public data | |
Liu et al. | Gateless treasure: How to get sensitive information from unprotected external storage on Android phones | |
Hamid et al. | Online harassment and digital stalking | |
Sokolova et al. | Respecting user privacy in mobiles: privacy by design permission system for mobile applications |