Forensic Analysis of Android Steganography Apps. Chen, W., Wang, Y., Guan, Y., Newman, J., Lin, L., & Reinders, S. In Peterson, G. L. & Shenoi, S., editors, IFIP Int. Conf. Digital Forensics, volume 532, of IFIP Advances in Information and Communication Technology, pages 293-312, 2018. Springer. Link Paper bibtex @inproceedings{conf/ifip11-9/ChenWGNLR18,
added-at = {2018-08-30T00:00:00.000+0200},
author = {Chen, Wenhao and Wang, Yangxiao and Guan, Yong and Newman, Jennifer and Lin, Li and Reinders, Stephanie},
biburl = {https://www.bibsonomy.org/bibtex/2022988af5910b8296035267e51efe4f8/dblp},
booktitle = {IFIP Int. Conf. Digital Forensics},
crossref = {conf/ifip11-9/2018},
editor = {Peterson, Gilbert L. and Shenoi, Sujeet},
ee = {https://doi.org/10.1007/978-3-319-99277-8_16},
interhash = {348f4ffbc67e84fb4ba3bac7dada571e},
intrahash = {022988af5910b8296035267e51efe4f8},
isbn = {978-3-319-99277-8},
keywords = {dblp},
pages = {293-312},
publisher = {Springer},
series = {IFIP Advances in Information and Communication Technology},
timestamp = {2018-08-31T11:38:28.000+0200},
title = {Forensic Analysis of Android Steganography Apps.},
url = {http://dblp.uni-trier.de/db/conf/ifip11-9/df2018.html#ChenWGNLR18},
volume = 532,
year = 2018
}
Downloads: 0
{"_id":"RCRM65AsSivPeCeMG","bibbaseid":"chen-wang-guan-newman-lin-reinders-forensicanalysisofandroidsteganographyapps-2018","downloads":0,"creationDate":"2018-10-30T20:10:25.329Z","title":"Forensic Analysis of Android Steganography Apps.","author_short":["Chen, W.","Wang, Y.","Guan, Y.","Newman, J.","Lin, L.","Reinders, S."],"year":2018,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/li lin?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2018-08-30T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Chen"],"firstnames":["Wenhao"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Yangxiao"],"suffixes":[]},{"propositions":[],"lastnames":["Guan"],"firstnames":["Yong"],"suffixes":[]},{"propositions":[],"lastnames":["Newman"],"firstnames":["Jennifer"],"suffixes":[]},{"propositions":[],"lastnames":["Lin"],"firstnames":["Li"],"suffixes":[]},{"propositions":[],"lastnames":["Reinders"],"firstnames":["Stephanie"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2022988af5910b8296035267e51efe4f8/dblp","booktitle":"IFIP Int. Conf. Digital Forensics","crossref":"conf/ifip11-9/2018","editor":[{"propositions":[],"lastnames":["Peterson"],"firstnames":["Gilbert","L."],"suffixes":[]},{"propositions":[],"lastnames":["Shenoi"],"firstnames":["Sujeet"],"suffixes":[]}],"ee":"https://doi.org/10.1007/978-3-319-99277-8_16","interhash":"348f4ffbc67e84fb4ba3bac7dada571e","intrahash":"022988af5910b8296035267e51efe4f8","isbn":"978-3-319-99277-8","keywords":"dblp","pages":"293-312","publisher":"Springer","series":"IFIP Advances in Information and Communication Technology","timestamp":"2018-08-31T11:38:28.000+0200","title":"Forensic Analysis of Android Steganography Apps.","url":"http://dblp.uni-trier.de/db/conf/ifip11-9/df2018.html#ChenWGNLR18","volume":"532","year":"2018","bibtex":"@inproceedings{conf/ifip11-9/ChenWGNLR18,\n added-at = {2018-08-30T00:00:00.000+0200},\n author = {Chen, Wenhao and Wang, Yangxiao and Guan, Yong and Newman, Jennifer and Lin, Li and Reinders, Stephanie},\n biburl = {https://www.bibsonomy.org/bibtex/2022988af5910b8296035267e51efe4f8/dblp},\n booktitle = {IFIP Int. Conf. Digital Forensics},\n crossref = {conf/ifip11-9/2018},\n editor = {Peterson, Gilbert L. and Shenoi, Sujeet},\n ee = {https://doi.org/10.1007/978-3-319-99277-8_16},\n interhash = {348f4ffbc67e84fb4ba3bac7dada571e},\n intrahash = {022988af5910b8296035267e51efe4f8},\n isbn = {978-3-319-99277-8},\n keywords = {dblp},\n pages = {293-312},\n publisher = {Springer},\n series = {IFIP Advances in Information and Communication Technology},\n timestamp = {2018-08-31T11:38:28.000+0200},\n title = {Forensic Analysis of Android Steganography Apps.},\n url = {http://dblp.uni-trier.de/db/conf/ifip11-9/df2018.html#ChenWGNLR18},\n volume = 532,\n year = 2018\n}\n\n","author_short":["Chen, W.","Wang, Y.","Guan, Y.","Newman, J.","Lin, L.","Reinders, S."],"editor_short":["Peterson, G. L.","Shenoi, S."],"key":"conf/ifip11-9/ChenWGNLR18","id":"conf/ifip11-9/ChenWGNLR18","bibbaseid":"chen-wang-guan-newman-lin-reinders-forensicanalysisofandroidsteganographyapps-2018","role":"author","urls":{"Link":"https://doi.org/10.1007/978-3-319-99277-8_16","Paper":"http://dblp.uni-trier.de/db/conf/ifip11-9/df2018.html#ChenWGNLR18"},"keyword":["dblp"],"downloads":0},"search_terms":["forensic","analysis","android","steganography","apps","chen","wang","guan","newman","lin","reinders"],"keywords":["dblp"],"authorIDs":[],"dataSources":["ehFTfKMMaY3aAXnje"]}