[1] Cheng, Ho Ting; Shan, Hangguan; Zhuang, Weihua ;, "Infotainment and road safety service support in vehicular networking: From a communication perspective," Mechanical Systems and Signal Processing, pp. 2020-2038, 8 2011.
[2] C. Smith, The Car Hacker’s Handbook A Guide for the Penetration Tester, San Francisco: William Pollock, 2016, pp. 144-159 118-119.
[3] Wikipedia, “Wikipedia,” 2 4 2020. [Online]. Available: https://en.wikipedia.org/wiki/LoJack.
[4] 杜靜;李博;敖富江,汽車駭客大曝光, 清華大學出版社, 2017, pp. 144-150 163-165 24-25.
[5] Silva , Ricardo; Iqba, Razi;, "Ethical Implications of Social Internet of Vehicles Systems," IEEE Internet of Things Journal, . vol 6, no. 1, 2019.
[6] Hossain, Mahmud; Hasan, Ragib ; Zawoad, Shams;, "Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)," in 2017 IEEE International Congress on Internet of Things (ICIOT), Honolulu, 2017.
[7] 邱翊晉, 結合雲端服務與OBD-II之Android車載資通訊平台設計與實作, 樹德科技大學資訊工程系碩士班學位論文, 2013, pp. 3-4.[8] “ITREAD01.COM,” 16 12 2018. [Online] Available: https://www.itread01.com/content/1544925184.html.
[9] “Android系統架構分層及每層詳細介紹,” 05 11 2018. [線上]. Available: https://kknews.cc/zh-tw/code/o9ngqaq.html.
[10] 鄧思源; 林育梨, “運用Android仿真器做為數位犯罪工具之研究,” 資訊安全通訊,第二十二卷, 編號 3, pp. 49-70, 1 7 2016.
[11] Reith, Mark; Carr, Clint ; Gunsch, Gregg H. ;, "An Examination of Digital Forensic Models," International Journal of Digital Evidence, vol. 1, no. 3, 1 1 2002.
[12] Le-Khac, Nhien-An; Jacobs, Daniël; Nijhoff, John ; Bertens, Karsten; Choo , Kim-Kwang Raymond;, "Smart vehicle forensics: Challenges and case study," Future Generation Computer Systems, 7 6 2018.
[13] Whelan, Celia J.; Sammon, John; McManus, Brian; Fenger, Terry W.;, "Retrieval of Infotainment System Artifacts from Vehicles Using iVe," Journal of Applied Digital Evidence, vol. 1, no. 1, 7 2018.
[14] 陳詰昌, “數位鑑識「原件不可變動原則」之適用—由行動裝置鑑識與電腦鑑識差異探討,” 司法新聲季刊, 編號 119, 2016.
[15] L. Jesse, Vehicular infotainment forensics: collecting data and putting it into perspective, University of Ontario Institute of Technology, 2017.
[16] Nilsson, Dennis K.;Phung, Phu H. ; Larson, Ulf E.; , "Vehicle ECU classification based on safety-security characteristics," in IET Road Transport Information and Control - RTIC 2008 and ITS United Kingdom Members' Conference, Manchester, 2008.
[17] Berla, "Berla Corporation," 2020. [Online]. Available: http://www.berla.co.
[18] Mansor, Hafizah; Markantonakis, Konstantinos; Akram, Raja Naeem; Mayes, Keith ; Gurulian, Iakovos, “Log your car: The non-invasive vehicle forensics,” in 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 2016.
[19] Zhang, Xiaolu; Baggili, Ibrahim; Breitinger, Frank, "Breaking into the vault: Privacy, security and forensic analysis of Android vault applications," Computers & Security, vol. 70, pp. 516-531, 9 2017.
[20] Baek, Sung-Hyun; Jeong, Da-Woon; Park, You-Sin ; Kim, Hwa-Su; Kim, Mi-Jin; Jang, Jong-Wook, “Implementation Vehicle Driving State System with OBD-II, MOST network,” in The 17th Asia Pacific Conference on Communications, Sabah, 2011.
[21] 中央警察大學資訊密碼暨建構實驗室, “反鑑識工具抹除數位足跡 立即採證記憶體才能救,” 網管人, 27 8 2015.
[22] 王旭正, 數位鑑識之平板應用程式-玩與完, 台北市: information cryptology & construction lab, 2012.
[23] Distefano, Alessandro; Me, Gianluig; Pace, Francesco, "Android anti-forensics through a local paradigm," Digital Investigation, vol.7, pp. 83-94, 8 2010.
[24] R. Parag, "Steganography on Android Based Smart Phones," International Journal of Mobile & Adhoc, vol. 3, pp. 150-152, 1 5 2012.
[25] Karlsson, Karl Johan; Glisson, William Bradley, "Android Anti-forensics: Modifying CyanogenMod," in 2014, IEEE Computer Society Press, Hawaii, 2014.
[26] Mambodza, Walter T; NagoorMeeran, A R.;, "Android mobile forensic analyzer for stegno data," in 2015 International Conference on Circuits, Power and Computing Technologies, Nagercoil, 2015.
[27] R. Macfarlane, A. Smales and A. Arbelet, "Garmin satnavs forensic methods and artefacts: An exploratory study," Edinburgh Napier University for the Degree of Master of Science in Advanced Security and Digital Forensics, 2014.
[28] 余祥銘, “導航手機與GPS軌跡記錄在供應鏈運輸之稽核角色探討,” 東海大學, 2011.
[29] W. Bortles, S. McDonough, C. Smith and M. Stogsdill, "An Introduction to the Forensic Acquisition of Passenger Vehicle Infotainment and Telematics Systems Data," in WCX™ 17: SAE World Congress Experience, 2017.
[30] M. Nahri, A. Boulmakoul, L. Karim A. Lbath, “IoV distributed architecture for real-time traffic data analytics,” Procedia Computer Science, vol. 130, pp. 480-487, 24 8 2018.
[31] 周政旭, 整合雲端計算的OBD-II車輛線上診斷系統實作, 樹德科技大學資訊工程系(研究所), 2013.
[32] A. X. Albert Sim and B. Sitohang, “OBD-II standard car engine diagnostic software development,” in 2014 International Conference on Data and Software Engineering (ICODSE), Bandung, 2014.
[33] B. Dharaskar, R. V. Dharaskar and V. M. Thakare, “GLOBAL POSITIONING SYSTEM FORENSICS IN VEHICULAR AD-HOC NETWORKS,” International Journal of Advances in Electronics and Computer Science, vol 2, 4, 8 2015.
[34] M. Cebe, E. Erdin, K. Akkaya, H. Aksu and S. Uluagac, "Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles," IEEE Communications Magazine, vol. 56, pp. 50-57, 16 10 2018.
[35] J. H. Lim, K. H. Choi, L. Kim and H. K. Lee, “Land vehicle positioning in urban area by integrated GPS/BeiDou/OBD-II/MEMS IMU,” in 2016 IEEE International Conference on Intelligent Transportation Engineering (ICITE), Singapore, 2016.
[36] T. Jia, W. Luo, H. Jia, H. Zhu and X. Li, "Research on remote diagnosis system based on baidumap API and OBD II diagnosis technology," in 2016 International Conference On Communication Problem-Solving (ICCP), Taipei, 2016.
[37] A. H. Sodhro, Z. Luo, G. H. Sodhro, M. Muzammal, J. J. Rodrigues and V. H. C. d. Albuquerque, “Future Generation Computer Systems,” Future Generation Computer Systems, vol 95, pp. 667-680, 6 2019.
[38] S. Liu, A. Liu, Z. Yan and W. Feng, “Efficient LBS queries with mutual privacy preservation in IoV,” Wei, vol 16, pp. 62-71, 4 2019.
[39] K. Fan, W. Jiang, Q. Luo and H. Li, “Cloud-based RFID Mutual Authentication Scheme for Efficient Privacy Preserving in IoV,” Journal of the Franklin Institute, 3 2019.
[40] H. H. R. Sherazi, R. Iqbal, F. Ahmad, Z. A. Khan and M. H. Chaudary, “DDoS attack detection: A key enabler for sustainable communication in internet of vehicles,” Sustainable Computing: Informatics and Systems, vol 23, pp. 13-20, 9 2019.