[[1] https://ccdcoe.org/library/publications/open-source-intelligence-open-social-intelligence-and-privacy-by-design-a-meta-level-rule-of-law/.]Search in Google Scholar
[[2] https://www.hotnews.ro/stiri-esential-18726335-pagina-facebook-este-spatiu-public-nuprivat-arata-decizie-irevocabila-inaltei-curti-justitie-casatie.htm.]Search in Google Scholar
[[3] https://uklabourlawblog.com/2018/06/22/i-lost-my-job-over-a-facebook-post-was-that-fair/.]Search in Google Scholar
[[4] Gábor Pék, Levente Buttyán, Boldizsár Bencsáth, A Survey of Security Issues in Hardware Virtualization, ACM Computing Surveys, Vol. 45, No. 3, Article 40, Publication date: June 2013, p. 40:1.10.1145/2480741.2480757]Search in Google Scholar
[[5] https://www.vmware.com/support/ws4/doc/preserve_snapshot_ws.html.]Search in Google Scholar
[[6] Kathleen Downer, Maumita Bhattacharya, BYOD Security: A New Business Challenge, The 5th International Symposium on Cloud and Service Computing (SC2 2015), IEEE CS Press.10.1109/SmartCity.2015.221]Search in Google Scholar
[[7] Teemu Väisänen, Alexandria Farar, Nikolaos Pissanidis, Christian Braccini, Bemhards Blumbergs, Enrique Diez, Defending mobile devices for high level officials and decision-makers, NATO Cooperative Cyber Defence Centre of Excellence, Tallin, 2015, p. 74.]Search in Google Scholar
[[8] https://svmp.github.io/.]Search in Google Scholar