메뉴 건너뛰기




Volumn 3, Issue 3, 2011, Pages 1-18

A framework for the forensic investigation of unstructured email relationship data

Author keywords

Digital forensics; Email; Framework; Social network analysis; Structured and unstructured data

Indexed keywords

AS RELATIONSHIPS; DATA SETS; DIGITAL FORENSIC; DIGITAL INVESTIGATION; E-MAIL NETWORKS; EMAIL COMMUNICATION; FORENSIC ANALYSIS; FORENSIC INVESTIGATION; FRAMEWORK; KEY ACTORS; POTENTIAL SOURCES; POWER RELATIONS; QUALITATIVE INFORMATION; RELATIONSHIP DATA; SOCIAL NETWORK ANALYSIS; SOCIAL NETWORKS; STRUCTURED DATA; UNSTRUCTURED DATA;

EID: 80053018646     PISSN: 19416210     EISSN: 19416229     Source Type: Journal    
DOI: 10.4018/jdcf.2011070101     Document Type: Conference Paper
Times cited : (19)

References (36)
  • 1
    • 80053048326 scopus 로고    scopus 로고
    • Retrieved from
    • Access Data. (2011). FTK forensic tool kit. Retrieved from http://www.accessdata.com
    • (2011) FTK Forensic Tool Kit
  • 9
    • 33750177351 scopus 로고
    • Centrality in social networks
    • doi:10.1016/0378-8733(78)90021-7
    • Freeman, L. C. (1978/79). Centrality in social networks. Social Networks, 1, 215-239. doi:10.1016/0378-8733(78)90021-7
    • (1978) Social Networks , vol.1 , pp. 215-239
    • Freeman, L.C.1
  • 10
    • 34247960076 scopus 로고
    • The strength of weak ties
    • doi:10.1086/225469
    • Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78 (6), 1360-1380. doi:10.1086/225469
    • (1973) American Journal of Sociology , vol.78 , Issue.6 , pp. 1360-1380
    • Granovetter, M.S.1
  • 11
    • 80052989010 scopus 로고    scopus 로고
    • Retrieved from
    • Guidance Software. (2011). Encase. Retrieved from http://www. guidancesoftware.com
    • (2011) Encase
  • 12
    • 60949101437 scopus 로고    scopus 로고
    • Towards an integrated e-mail forensic analysis framework
    • doi:10.1016/j.diin.2009.01.004
    • Hadjidj, R., Debbabi, M., Lounis, H., Iqbal, F., Szporer, A., & Benredjem, D. (2009). Towards an integrated e-mail forensic analysis framework. Digital Investigation, 5 (3-4), 124-137. doi:10.1016/j.diin.2009.01.004
    • (2009) Digital Investigation , vol.5 , Issue.3-4 , pp. 124-137
    • Hadjidj, R.1    Debbabi, M.2    Lounis, H.3    Iqbal, F.4    Szporer, A.5    Benredjem, D.6
  • 15
    • 79951775263 scopus 로고    scopus 로고
    • Network-based filtering for large email collections in e-discovery
    • doi:10.1007/s10506-010-9099-3
    • Henseler, H. (2010). Network-based filtering for large email collections in e-discovery. Artificial Intelligence and Law, 18 (4), 413-430. doi:10.1007/s10506-010-9099-3
    • (2010) Artificial Intelligence and Law , vol.18 , Issue.4 , pp. 413-430
    • Henseler, H.1
  • 17
    • 80053043062 scopus 로고    scopus 로고
    • Retrieved from
    • Kalamaras, D. B. (2011). SocNetV. Retrieved from http://socnetv. sourceforge.net
    • (2011)
    • Kalamaras, D.B.1
  • 18
  • 21
    • 0002963198 scopus 로고    scopus 로고
    • Commitment in exchange relations: Test of a theory of relational cohesion
    • Lawler, E. J., & Yoon, J. (1996). Commitment in exchange relations: Test of a theory of relational cohesion. American Sociological Review, 61, 89-108. doi:10.2307/2096408 (Pubitemid 126590173)
    • (1996) American Sociological Review , vol.61 , Issue.1 , pp. 89-108
    • Lawler, E.J.1    Yoon, J.2
  • 25
    • 67349263006 scopus 로고    scopus 로고
    • Integrating statistics and visualization for exploratory power: From long-term case studies to design guidelines
    • doi:10.1109/MCG.2009.44
    • Perer, A., & Schneiderman, B. (2009). Integrating statistics and visualization for exploratory power: From long-term case studies to design guidelines. IEEE Computer Graphics and Applications, 39-51. doi:10.1109/MCG. 2009.44
    • (2009) IEEE Computer Graphics and Applications , pp. 39-51
    • Perer, A.1    Schneiderman, B.2
  • 27
    • 33745203008 scopus 로고    scopus 로고
    • Next-generation digital forensics
    • doi:10.1145/1113034.1113074
    • Richard, G. G. III, & Roussev, V. (2006). Next-generation digital forensics. Communications of the ACM, 49 (2), 76-80. doi:10.1145/1113034.1113074
    • (2006) Communications of the ACM , vol.49 , Issue.2 , pp. 76-80
    • Richard III, G.G.1    Roussev, V.2
  • 31
    • 80052991111 scopus 로고    scopus 로고
    • Retrieved from
    • Vlado, A. (2011). Pajek. Retrieved from http://vlado.fmf.uni-lj.si/pub/ networks/pajek/default.htm
    • (2011) Pajek
    • Vlado, A.1
  • 32
    • 56349109092 scopus 로고    scopus 로고
    • A graph based approach toward network forensic analysis
    • doi:10.1145/1410234.1410238
    • Wang, W., & Daniels, T. E. (2008). A graph based approach toward network forensic analysis. ACM Transactions on Information and System Security, 12 (1), 401-433. doi:10.1145/1410234.1410238
    • (2008) ACM Transactions on Information and System Security , vol.12 , Issue.1 , pp. 401-433
    • Wang, W.1    Daniels, T.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.