“Feather”. Jul. 14, 2017, site visited Nov. 21, 2019: http://web.archive.org/web/20170714083544/https://feathericons.com/. |
“Octagons” Jul. 12, 2015, ICONFINDER, site visited Nov. 22, 2019: https://www.iconfinder.com/iconsets/octagons. |
“Squared Line—Ui Essentials” Feb. 10, 2016, ICONFINDER, site visited Nov. 22, 2019: https://www.iconfinder.com/iconsets/ui-essentials-1. |
Stach, Christopher, “Candy Castle—A prototype for Pervasive Health Games,” PerCom Demos 2012, Lugano (Mar. 20, 2012), pp. 501-503. |
File history of the Re-Examination of U.S. Patent No. 8,265,597—Reexamination Control No. 90/013,020 filed on Oct. 8, 2013. |
Mobile Phones as Computing Devices: “The Viruses are Coming!” by David Dagon, Tom Martin, and Thad Stamer, published in Pervasive Computing, published by the IEEE CS and IEEE ComSoc, 2004. |
“How to Tell If Your Cell Phone Is Bugged” by Lauren Weinstein (Vortex Technology), published as http://lauren.vortex.com/archive/000202.html; Dated Dec. 3, 2006. |
“FlexiSPY PRO-X, FLEXISPY” [online], published Apr. 24, 2008 [retrieved on Sep. 2, 2013]. Retrieved from the Intenet<URL: http://wayback.archive.org/web/20080409170704/http://www.flexispy.com/faq.htrn#03.> (and linked pages). |
“Fake Shutdown 1.0”, NONAGS [online] published Nov. 12, 2001 [retrieved on Sep. 6, 2013]. Retrieved from the internet <URL: http://www.nonags.com/freeware-fake-shutdown 969.html>. |
“Stealthy Video Capturer: A New Video-based Spyware in 3G Smartphones” by Nan Xu et. al., Source: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 69-78, 2009. |
FBI Taps Cell Phonemic As Eavesdropping Tool; by Declan McCullagh; Conet News, Source: http://news.cnet.com/2100-1029-6140191.html; Dated Dec. 1, 2006. |