2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) 2019
DOI: 10.1109/wcncw.2019.8902574
|View full text |Cite
|
Sign up to set email alerts
|

Conspiracy communication reconstitution from distributed instant messages timeline

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Investigative (search) actions at the accident scene are carried out in order to identify, evaluate, and examine evidentiary information that may be relevant for criminal proceedings (Nassif, 2019;Riadi et al, 2023). The investigator applies the existing arsenal of scientific and technical developments, since they are responsible for the course of the pre-trial investigation (Wang et al, 2018;Karthikeyan et al, 2023).…”
Section: ■ Resultsmentioning
confidence: 99%
“…Investigative (search) actions at the accident scene are carried out in order to identify, evaluate, and examine evidentiary information that may be relevant for criminal proceedings (Nassif, 2019;Riadi et al, 2023). The investigator applies the existing arsenal of scientific and technical developments, since they are responsible for the course of the pre-trial investigation (Wang et al, 2018;Karthikeyan et al, 2023).…”
Section: ■ Resultsmentioning
confidence: 99%
“…WhatsApp has been a target to many cyber-attacks to distribute destructive content or gain unauthorized access to users' accounts [4]. For instance, WhatsApp users have recently been attacked by cybercriminals, who use Uniform Resource Locators (URLs) to deliver malware to gain unauthorized access to user accounts.…”
Section: Introductionmentioning
confidence: 99%