Login / Signup
An investigation of anonymous and spoof SMS resources used for the purposes of cyberstalking.
Graeme Horsman
Lynne R. Conniss
Published in:
Digit. Investig. (2015)
Keyphrases
</>
resource allocation
resource management
mobile phone
limited resources
computing resources
databases
email
web resources
neural network
feature selection
website
high resolution
infrared
resource requirements
messaging service