-
1
-
-
70450270782
-
Requirements on next generation social networking - a user's perspective
-
L. T. Sørensen and K. E. Skouby, "Requirements on Next Generation Social Networking - A User's Perspective", Wireless Personal Communications, vol. 51, no. 4, pp. 811-823, 2009.
-
(2009)
Wireless Personal Communications
, vol.51
, Issue.4
, pp. 811-823
-
-
Sørensen, L.T.1
Skouby, K.E.2
-
2
-
-
78650319122
-
Content sharing based on personal information in virtually secured space
-
H. Sohn, Y. M. Ro, and K. N. Plataniotis, "Content Sharing Based on Personal Information in Virtually Secured Space", Lecture Notes in Computer Science, vol. 5450, pp. 388-400, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5450
, pp. 388-400
-
-
Sohn, H.1
Ro, Y.M.2
Plataniotis, K.N.3
-
3
-
-
33644508600
-
-
3rd edition, Course Technology
-
B. Nelson, A. Phillips, F. Enfinger, and KC. Steuart, Guide to Computer Forensics and Investigations, 3rd edition, Course Technology, 2008.
-
(2008)
Guide to Computer Forensics and Investigations
-
-
Nelson, B.1
Phillips, A.2
Enfinger, F.3
Steuart, K.C.4
-
4
-
-
76649104076
-
Security and privacy preservation in human-involved networks
-
C. Asher, J.-P. Aumasson, and R. C.-W. Phan, "Security and privacy preservation in human-involved networks", iNetSec , IFIP AICT 309, pp. 139-148, 2009.
-
(2009)
INetSec , IFIP AICT
, vol.309
, pp. 139-148
-
-
Asher, C.1
Aumasson, J.-P.2
Phan, R.C.-W.3
-
5
-
-
49049106787
-
Proposal for efficient searching and presentation in digital forensics
-
Washington, DC Mar.
-
J. Lee, "Proposal for Efficient Searching and Presentation in Digital Forensics", in Proc. 2008 Third international Conference on Availability, Reliability and Security. ARES. IEEE Computer Society, Washington, DC, pp. 1377-1381. Mar. 2008.
-
(2008)
Proc. 2008 Third international Conference on Availability, Reliability and Security. ARES. IEEE Computer Society
, pp. 1377-1381
-
-
Lee, J.1
-
6
-
-
67650161521
-
Two-dimensional evidence reliability amplification process model for digital forensics
-
Washington, DC Oct.
-
M. Khatir, S. M. Hejazi, and E. Sneiders, "Two-Dimensional Evidence Reliability Amplification Process Model for Digital Forensics", in Proc. 2008 Third international Annual Workshop on Digital Forensics and incident Analysis. WDFIA. IEEE Computer Society, Washington, DC, pp. 21-29. Oct. 2008.
-
(2008)
Proc. 2008 Third international Annual Workshop on Digital Forensics and incident Analysis. WDFIA. IEEE Computer Society
, pp. 21-29
-
-
Khatir, M.1
Hejazi, S.M.2
Sneiders, E.3
-
7
-
-
78650760560
-
Digital forensics: Defining a research agenda
-
Waikoloa, HI, USA, IEEE Press, Jan.
-
K. Nance, B. Hay, and M. Bishop, "Digital Forensics: Defining a Research Agenda", in PProc. 42nd Hawaii International Conference on System Sciences, Waikoloa, HI, USA, IEEE Press, Jan. 2009.
-
(2009)
PProc. 42nd Hawaii International Conference on System Sciences
-
-
Nance, K.1
Hay, B.2
Bishop, M.3
-
8
-
-
77953173272
-
Live information discovery of the p2p instant messaging based on skype's finger printing
-
Mar
-
H. C. Chu, and W. D. Lin, "Live Information Discovery of the P2P Instant Messaging Based on Skype's Finger Printing", Journal of Internet Technology, vol. 11, no. 2, pp. 193-202 Mar. 2010.
-
(2010)
Journal of Internet Technology
, vol.11
, Issue.2
, pp. 193-202
-
-
Chu, H.C.1
Lin, W.D.2
-
9
-
-
33847209935
-
Digital evidence collection process in integrity and memory information gathering
-
S. Lee, H. Kim, S. Lee, and J. Lim, "Digital evidence collection process in integrity and memory information gathering", in Proceedings of Systematic Approaches to Digital Forensic Engineering, First International Work-shop, Proc. IEEE, pp. 236-247, 2005.
-
(2005)
Proceedings of Systematic Approaches to Digital Forensic Engineering, First International Work-shop, Proc. IEEE
, pp. 236-247
-
-
Lee, S.1
Kim, H.2
Lee, S.3
Lim, J.4
-
10
-
-
74049091891
-
Volatools: Integrating volatile memory forensics into the digital investigation process
-
A. Walters and J. Nick L. Petroni, "Volatools: Integrating volatile memory forensics into the digital investigation process", in Black Hat DC, 2007.
-
(2007)
Black Hat DC
-
-
Walters, A.1
Nick, J.2
Petroni, L.3
-
11
-
-
84875259995
-
Challenges for mobile social networking applications
-
J. Rana, J. Kristiansson, J. Hallberg, and K. Synnes, "Challenges for mobile social networking applications", in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 16, pp. 275-285, 2009.
-
(2009)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.16
, pp. 275-285
-
-
Rana, J.1
Kristiansson, J.2
Hallberg, J.3
Synnes, K.4
-
12
-
-
77952329380
-
Recovery of skype application activity data from physical memory
-
S. Matthew, and S. Jill, "Recovery of Skype Application Activity Data from Physical Memory", International Conference on Availability, Reliability and Security, pp. 283-288, 2010.
-
(2010)
International Conference on Availability, Reliability and Security
, pp. 283-288
-
-
Matthew, S.1
Jill, S.2
-
13
-
-
70349687555
-
Enhancement of forensic computing investigations through memory forensic techniques
-
S. Matthew, and S. Jill, "Enhancement of Forensic Computing Investigations through Memory Forensic Techniques", International Conference on Availability, Reliability and Security, pp. 995-1000, 2009.
-
(2009)
International Conference on Availability, Reliability and Security
, pp. 995-1000
-
-
Matthew, S.1
Jill, S.2
-
14
-
-
56649085023
-
Antisocial networks: Turning a social network into a Botnet
-
Taipei, Taiwan
-
E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. Ioannidis, K. Anagnostakis, and E. Markatos, "Antisocial networks: Turning a social network into a Botnet", in Proc. 11th Information Security Conference, Taipei, Taiwan, pp. 146-160, 2008.
-
(2008)
Proc. 11th Information Security Conference
, pp. 146-160
-
-
Athanasopoulos, E.1
Makridakis, A.2
Antonatos, S.3
Antoniades, D.4
Ioannidis, S.5
Anagnostakis, K.6
Markatos, E.7
-
15
-
-
36349019854
-
The future of social networks on the internet: The need for semantics
-
DOI 10.1109/MIC.2007.138
-
J. Breslin, and S. Decker, "The future of social networks on the internet: The need for semantics", IEEE Internet Comput., Nov. pp. 86-90, 2007. (Pubitemid 350148370)
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.6
, pp. 86-90
-
-
Breslin, J.1
Decker, S.2
-
16
-
-
26444560102
-
User role and perception of requirements in a web-based community of practice
-
J. H. Tang, and H. L. Yang, "User role and perception of requirements in a web-based community of practice", Online Information Review, vol. 29, no. 5, pp. 499-512, 2005.
-
(2005)
Online Information Review
, vol.29
, Issue.5
, pp. 499-512
-
-
Tang, J.H.1
Yang, H.L.2
-
17
-
-
13244268413
-
Personal and service mobility in ubiquitous computing environments
-
DOI 10.1002/wcm.231
-
K. El-Khatib, Z. E. Zhang, N. Hadibi, and G. V. Bochmann, "Personal and service mobility in ubiquitous computing environments", Wireless Communications and Mobile Computing, vol. 4, no. 6, pp. 595-607, Sept. 2004. (Pubitemid 40183773)
-
(2004)
Wireless Communications and Mobile Computing
, vol.4
, Issue.6
, pp. 595-607
-
-
El-Khatib, K.1
Zhang, Z.E.2
Hadibi, N.3
Bochmann, G.V.4
-
18
-
-
33847398384
-
Using every part of the buffalo in Windows memory analysis
-
DOI 10.1016/j.diin.2006.12.002, PII S1742287607000047
-
J.D. Kornblum, "Using every part of the buffalo in Windows memory analysis", Digital Investigation, vol. 4, no. 1, pp. 24-29, 2007. (Pubitemid 46335871)
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 24-29
-
-
Kornblum, J.D.1
-
19
-
-
49049102940
-
A general architecture of mobile social network services
-
Y.-J. Chang, H.-H. Liu, L.-D. Chou, Y.-W. Chen, and H. Y. Shin, "A general architecture of mobile social network services", in Proc. 2007 International Conference on Convergence Information Technology, IEE Computer Society, pp. 151-156, 2007.
-
(2007)
Proc. 2007 International Conference on Convergence Information Technology, IEE Computer Society
, pp. 151-156
-
-
Chang, Y.-J.1
Liu, H.-H.2
Chou, L.-D.3
Chen, Y.-W.4
Shin, H.Y.5
-
20
-
-
70350585372
-
The use of facebook in national election campaigns: Politics as usual?
-
K. N. Andersen, and R. Medaglia, "The Use of Facebook in National Election Campaigns: Politics as Usual?", Lecture Notes in Computer Science, vol. 5694, pp. 101-111, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5694
, pp. 101-111
-
-
Andersen, K.N.1
Medaglia, R.2
-
21
-
-
45949091950
-
On the internet, things never go away completely
-
T. Keenan, "On the Internet, Things Never Go Away Completely", IFIP International Federation for Information Processing, vol. 262, pp. 37- 50, 2008.
-
(2008)
IFIP International Federation for Information Processing
, vol.262
, pp. 37-50
-
-
Keenan, T.1
-
22
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
A. Acquisti, and R. Gross, "Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook", Lecture Notes in Computer Science, vol. 4258, pp. 36-58, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4258
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
23
-
-
77952689368
-
Social networks and web 2.0: Are Users also Bound by Data Protection Regulations?
-
B. V. Alsenoy, J. Ballet , A. Kuczerawy, and J. Dumortier, "Social networks and web 2.0: Are Users also Bound by Data Protection Regulations?", Identity in the Information Society, vol. 2, no. 1, pp. 65-79, 2009.
-
(2009)
Identity in the Information Society
, vol.2
, Issue.1
, pp. 65-79
-
-
Alsenoy, B.V.1
Ballet, J.2
Kuczerawy, A.3
Dumortier, J.4
-
24
-
-
80051505770
-
-
http://www.onlineconversion.com/unix time.htm
-
-
-
-
25
-
-
80051543077
-
-
http://www.e-fense.com
-
-
-
-
26
-
-
80051514090
-
-
http://www.accessdata.com
-
-
-
-
27
-
-
80051504020
-
-
Wikipedia, retrieved on April 10th, 2010
-
http://en.wikipedia.org/wiki/SocialNetwork, Wikipedia, retrieved on April 10th, 2010.
-
-
-
|