-
1
-
-
80053048326
-
-
Retrieved from
-
Access Data. (2011). FTK forensic tool kit. Retrieved from http://www.accessdata.com
-
(2011)
FTK Forensic Tool Kit
-
-
-
2
-
-
77953969919
-
Mining e-mail social networks
-
Bird, C., Gourley, A., Devanbu, P., Gertz, M., & Swaminathan, A. (2006). Mining e-mail social networks. In Proceedings of the International Workshop on Mining Software Repositories (pp. 137-143).
-
(2006)
Proceedings of the International Workshop on Mining Software Repositories
, pp. 137-143
-
-
Bird, C.1
Gourley, A.2
Devanbu, P.3
Gertz, M.4
Swaminathan, A.5
-
3
-
-
32344432810
-
Discovery and regeneration of hidden emails
-
Carenini, G., Ng, R., Zhou, X., & Zwart, E. (2005). Discovery and regeneration of hidden emails. In Proceedings of the ACM Symposium on Applied Computing (pp. 503-510).
-
(2005)
Proceedings of the ACM Symposium on Applied Computing
, pp. 503-510
-
-
Carenini, G.1
Ng, R.2
Zhou, X.3
Zwart, E.4
-
6
-
-
0346407047
-
-
Cambridge, UK: Cambridge University Press
-
de Nooy, W., Mrvar, A., & Batagelj, V. (2005). Exploratory social network analysis with Pajek. Cambridge, UK: Cambridge University Press.
-
(2005)
Exploratory Social Network Analysis with Pajek
-
-
De Nooy, W.1
Mrvar, A.2
Batagelj, V.3
-
9
-
-
33750177351
-
Centrality in social networks
-
doi:10.1016/0378-8733(78)90021-7
-
Freeman, L. C. (1978/79). Centrality in social networks. Social Networks, 1, 215-239. doi:10.1016/0378-8733(78)90021-7
-
(1978)
Social Networks
, vol.1
, pp. 215-239
-
-
Freeman, L.C.1
-
10
-
-
34247960076
-
The strength of weak ties
-
doi:10.1086/225469
-
Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78 (6), 1360-1380. doi:10.1086/225469
-
(1973)
American Journal of Sociology
, vol.78
, Issue.6
, pp. 1360-1380
-
-
Granovetter, M.S.1
-
11
-
-
80052989010
-
-
Retrieved from
-
Guidance Software. (2011). Encase. Retrieved from http://www. guidancesoftware.com
-
(2011)
Encase
-
-
-
12
-
-
60949101437
-
Towards an integrated e-mail forensic analysis framework
-
doi:10.1016/j.diin.2009.01.004
-
Hadjidj, R., Debbabi, M., Lounis, H., Iqbal, F., Szporer, A., & Benredjem, D. (2009). Towards an integrated e-mail forensic analysis framework. Digital Investigation, 5 (3-4), 124-137. doi:10.1016/j.diin.2009.01.004
-
(2009)
Digital Investigation
, vol.5
, Issue.3-4
, pp. 124-137
-
-
Hadjidj, R.1
Debbabi, M.2
Lounis, H.3
Iqbal, F.4
Szporer, A.5
Benredjem, D.6
-
15
-
-
79951775263
-
Network-based filtering for large email collections in e-discovery
-
doi:10.1007/s10506-010-9099-3
-
Henseler, H. (2010). Network-based filtering for large email collections in e-discovery. Artificial Intelligence and Law, 18 (4), 413-430. doi:10.1007/s10506-010-9099-3
-
(2010)
Artificial Intelligence and Law
, vol.18
, Issue.4
, pp. 413-430
-
-
Henseler, H.1
-
17
-
-
80053043062
-
-
Retrieved from
-
Kalamaras, D. B. (2011). SocNetV. Retrieved from http://socnetv. sourceforge.net
-
(2011)
-
-
Kalamaras, D.B.1
-
21
-
-
0002963198
-
Commitment in exchange relations: Test of a theory of relational cohesion
-
Lawler, E. J., & Yoon, J. (1996). Commitment in exchange relations: Test of a theory of relational cohesion. American Sociological Review, 61, 89-108. doi:10.2307/2096408 (Pubitemid 126590173)
-
(1996)
American Sociological Review
, vol.61
, Issue.1
, pp. 89-108
-
-
Lawler, E.J.1
Yoon, J.2
-
22
-
-
33749533575
-
TreePlus: Interactive exploration of networks with enhanced tree layouts
-
DOI 10.1109/TVCG.2006.106, 1703363
-
Lee, B., Parr, C. S., Plaisant, C., Bederson, B. B., Veksler, V. D., Gray, W. D., & Kotfila, C. (2006). Tree Plus: Interactive exploration of networks with enhanced tree layouts. IEEE Transactions on Visualization and Computer Graphics, 12 (6), 1414-1426. doi:10.1109/TVCG.2006.106 (Pubitemid 44523086)
-
(2006)
IEEE Transactions on Visualization and Computer Graphics
, vol.12
, Issue.6
, pp. 1414-1426
-
-
Lee, B.1
Parr, C.S.2
Plaisant, C.3
Bederson, B.B.4
Veksler, V.D.5
Gray, W.D.6
Kotfila, C.7
-
25
-
-
67349263006
-
Integrating statistics and visualization for exploratory power: From long-term case studies to design guidelines
-
doi:10.1109/MCG.2009.44
-
Perer, A., & Schneiderman, B. (2009). Integrating statistics and visualization for exploratory power: From long-term case studies to design guidelines. IEEE Computer Graphics and Applications, 39-51. doi:10.1109/MCG. 2009.44
-
(2009)
IEEE Computer Graphics and Applications
, pp. 39-51
-
-
Perer, A.1
Schneiderman, B.2
-
26
-
-
0005197830
-
-
Retrieved from
-
Powers, W. C., Jr., Troubh, R. S., & Winokur, H. S., Jr. (2002). Report of investigation by the special investigative committee of the Board of Directors of Enron Corp. Retrieved from http://news.findlaw.com/wsj/docs/enron/ sicreport/index.html
-
(2002)
Report of Investigation by the Special Investigative Committee of the Board of Directors of Enron Corp.
-
-
Powers Jr., W.C.1
Troubh, R.S.2
Winokur Jr., H.S.3
-
27
-
-
33745203008
-
Next-generation digital forensics
-
doi:10.1145/1113034.1113074
-
Richard, G. G. III, & Roussev, V. (2006). Next-generation digital forensics. Communications of the ACM, 49 (2), 76-80. doi:10.1145/1113034.1113074
-
(2006)
Communications of the ACM
, vol.49
, Issue.2
, pp. 76-80
-
-
Richard III, G.G.1
Roussev, V.2
-
28
-
-
70349808043
-
Reducing social network dimensions using matrix factorization methods
-
Snasel, V., Horak, Z., Kocibova, J., & Abraham, A. (2009). Reducing social network dimensions using matrix factorization methods. In Proceedings of the Conference on Advances in Social Network Analysis and Mining (pp. 348-351).
-
(2009)
Proceedings of the Conference on Advances in Social Network Analysis and Mining
, pp. 348-351
-
-
Snasel, V.1
Horak, Z.2
Kocibova, J.3
Abraham, A.4
-
31
-
-
80052991111
-
-
Retrieved from
-
Vlado, A. (2011). Pajek. Retrieved from http://vlado.fmf.uni-lj.si/pub/ networks/pajek/default.htm
-
(2011)
Pajek
-
-
Vlado, A.1
-
32
-
-
56349109092
-
A graph based approach toward network forensic analysis
-
doi:10.1145/1410234.1410238
-
Wang, W., & Daniels, T. E. (2008). A graph based approach toward network forensic analysis. ACM Transactions on Information and System Security, 12 (1), 401-433. doi:10.1145/1410234.1410238
-
(2008)
ACM Transactions on Information and System Security
, vol.12
, Issue.1
, pp. 401-433
-
-
Wang, W.1
Daniels, T.E.2
-
34
-
-
56749156896
-
Mining spam e-mail to identify common origins for forensic application
-
Wei, C., Sprague, A., Warner, G., & Skjellum, A. (2008). Mining spam e-mail to identify common origins for forensic application. In Proceedings of the ACM Symposium on Applied Computing (pp. 1433-1437).
-
(2008)
Proceedings of the ACM Symposium on Applied Computing
, pp. 1433-1437
-
-
Wei, C.1
Sprague, A.2
Warner, G.3
Skjellum, A.4
|