Stach, Christopher, “Candy Castle—A prototype for Pervasive Health Games,” PerCom Demos 2012, Lugano (Mar. 20, 2012), pp. 501-503. |
File history of the Re-Examination of U.S. Pat. No. 8,265,597—U.S. Appl. No. 90/013,020, filed Oct. 8, 2013. |
Mobile Phones as Computing Devices: “The Viruses are Coming!” by David Dagon , Tom Martin, and Thad Stamer, published in Pervasive Computing, published by the IEEE CS and IEEE ComSoc, 2004. |
“How to Tell If Your Cell Phone Is Bugged” by Lauren Weinstein (Vortex Technology), published as http://lauren.vortex.com/archive/000202.html; Dated Dec. 3, 2006. |
“FlexiSPY Pro-X, FlexiSPY” [online], published Apr. 24, 2008 [retrieved on Sep. 2, 2013]. Retrieved from the Intenet<URL: http://wayback.archive.org/web/20080409170704/http://www.flexispy.com/faq.htrn#03.> (and linked pages). |
“Fake Shutdown 1.0”, NONAGS [online] published Nov. 12, 2001 [retrieved on Sep. 6, 2013]. Retrieved from the internet <URL: http://www.nonags.com/freeware-fake-shutdown 969.html>. |
“Stealthy Video Capturer: A New Video-based Spyware in 3G Smartphones” by Nan Xu et. al., Source: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 69-78, 2009. |
FBI Taps Cell Phonemic As Eavesdropping Tool; by Declan McCullagh; Conet News, Source: http://news.cnet.com/2100-1029-6140191.html; Dated Dec. 1, 2006. |