-
1
-
-
84880555126
-
-
Access Data.
-
Access Data. (2012). FTK: Forensic tool kit. Retrieved from http://www.accessdata.com
-
(2012)
FTK: Forensic Tool Kit
-
-
-
3
-
-
77952667855
-
Towards discovery of eras in social networks
-
Berlingerio, M., Coscia, M., Giannotti, F., Monreale, A., & Pedreschi, D. (2010). Towards discovery of eras in social networks. In Proceedings of the International Workshop on Modeling, Managing and Mining of Evolving Social Networks, in conjunction with the International Conference on Data Engineering (pp. 278-281).
-
(2010)
Proceedings of the International Workshop on Modeling, Managing and Mining of Evolving Social Networks, in Conjunction with the International Conference on Data Engineering
, pp. 278-281
-
-
Berlingerio, M.1
Coscia, M.2
Giannotti, F.3
Monreale, A.4
Pedreschi, D.5
-
5
-
-
81455154528
-
Visual reasoning about social networks using centrality sensitivity
-
doi:10.1109/TVCG.2010.260
-
Correa, C., Crnovrsanin, T., & Ma, K.-L. (2012). Visual reasoning about social networks using centrality sensitivity. IEEE Transactions on Visualization and Computer Graphics, 18(1), 106-120. doi:10.1109/TVCG.2010.260
-
(2012)
IEEE Transactions on Visualization and Computer Graphics
, vol.18
, Issue.1
, pp. 106-120
-
-
Correa, C.1
Crnovrsanin, T.2
Ma, K.-L.3
-
7
-
-
84880565541
-
-
Facebook. Retrieved from
-
Facebook. (2012). Newsroom key facts. Retrieved from http://newsroom.fb. com/content/default. aspx?NewsAreaId=22
-
(2012)
Newsroom Key Facts
-
-
-
9
-
-
80955143423
-
Tree Net Viz: Revealing patterns of networks over tree structures
-
doi:10.1109/TVCG.2011.247
-
Gou, L., & Zhang, X. (2011). Tree Net Viz: Revealing patterns of networks over tree structures. IEEE Transactions on Visualization and Computer Graphics, 17(12), 2449-2458. doi:10.1109/TVCG.2011.247
-
(2011)
IEEE Transactions on Visualization and Computer Graphics
, vol.17
, Issue.12
, pp. 2449-2458
-
-
Gou, L.1
Zhang, X.2
-
10
-
-
84880515574
-
-
Guidance Software.
-
Guidance Software. (2012). Encase. Retrieved from http://www. guidancesoftware.com
-
(2012)
Encase
-
-
-
11
-
-
60949101437
-
Towards an integrated e-mail forensic analysis framework
-
doi:10.1016/j. diin.2009.01.004
-
Hadjidj, R., Debbabi, M., Lounis, H., Iqbal, F., Szporer, A., & Benredjem, D. (2009). Towards an integrated e-mail forensic analysis framework. Digital Investigation, 5(3-4), 124-137. doi:10.1016/j. diin.2009.01.004
-
(2009)
Digital Investigation
, vol.5
, Issue.3-4
, pp. 124-137
-
-
Hadjidj, R.1
Debbabi, M.2
Lounis, H.3
Iqbal, F.4
Szporer, A.5
Benredjem, D.6
-
13
-
-
80053018646
-
A framework for the forensic investigation of unstructured email relationship data
-
doi:10.4018/jdcf.2011070101
-
Haggerty, J., Karran, A. J., Lamb, D. J., & Taylor, M. J. (2011). A framework for the forensic investigation of unstructured email relationship data. International Journal of Digital Crime and Forensics, 3(3), 1-18. doi:10.4018/jdcf.2011070101
-
(2011)
International Journal of Digital Crime and Forensics
, vol.3
, Issue.3
, pp. 1-18
-
-
Haggerty, J.1
Karran, A.J.2
Lamb, D.J.3
Taylor, M.J.4
-
14
-
-
79951775263
-
Network-based filtering for large email collections in e-discovery
-
doi:10.1007/s10506-010-9099-3
-
Henseler, H. (2010). Network-based filtering for large email collections in e-discovery. Artificial Intelligence and Law, 18(4), 413-430. doi:10.1007/s10506-010-9099-3
-
(2010)
Artificial Intelligence and Law
, vol.18
, Issue.4
, pp. 413-430
-
-
Henseler, H.1
-
19
-
-
84866653011
-
Analysis of online messages for identity tracing in cybercrime investigation
-
Nirkhi, S. M., Dharaskar, R. V., & Thakre, V. M. (2012). Analysis of online messages for identity tracing in cybercrime investigation. In Proceedings of the International Conference on Cyber Security, Cyber Warfare and Digital Forensics (pp. 300-305).
-
(2012)
Proceedings of the International Conference on Cyber Security, Cyber Warfare and Digital Forensics
, pp. 300-305
-
-
Nirkhi, S.M.1
Dharaskar, R.V.2
Thakre, V.M.3
-
20
-
-
67349263006
-
Integrating statistics and visualization for exploratory power: From long-term case studies to design guidelines
-
doi:10.1109/MCG.2009.44
-
Perer, A., & Schneiderman, B. (2009). Integrating statistics and visualization for exploratory power: From long-term case studies to design guidelines. IEEE Computer Graphics and Applications, 29(3), 39-51. doi:10.1109/MCG.2009.44
-
(2009)
IEEE Computer Graphics and Applications
, vol.29
, Issue.3
, pp. 39-51
-
-
Perer, A.1
Schneiderman, B.2
-
21
-
-
84875903256
-
-
Southampton Facebook riot messages man jailed. (June 21). Retrieved from
-
Southampton Facebook riot messages man jailed. (2012, June 21). BBC News. Retrieved from http://www.bbc.co.uk/news/uk-england-hampshire-18536940
-
(2012)
BBC News
-
-
-
22
-
-
67650248663
-
The legal aspects of corporate email investigations
-
doi:10.1016/j.clsr.2009.05.006
-
Taylor, M., Haggerty, J., & Gresty, D. (2009). The legal aspects of corporate email investigations. Computer Law & Security Report, 25(4), 372-376. doi:10.1016/j.clsr.2009.05.006
-
(2009)
Computer Law & Security Report
, vol.25
, Issue.4
, pp. 372-376
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
-
23
-
-
84857861102
-
-
Twitter Engineering Blog. (May 31). Retrieved from
-
Twitter Engineering Blog. (2011, May 31). The engineering behind Twitter's new search experience. Retrieved from http://engineering.twitter.com/ 2011/05/engineering-behind-twitters-new-search.html
-
(2011)
The Engineering behind Twitter's New Search Experience
-
-
-
25
-
-
56349109092
-
A graph based approach toward network forensic analysis
-
doi:10.1145/1410234.1410238
-
Wang, W., & Daniels, T. E. (2008). A graph based approach toward network forensic analysis. ACM Transactions on Information and System Security, 12(1), 401-433. doi:10.1145/1410234.1410238
-
(2008)
ACM Transactions on Information and System Security
, vol.12
, Issue.1
, pp. 401-433
-
-
Wang, W.1
Daniels, T.E.2
-
26
-
-
56749156896
-
Mining spam e-mail to identify common origins for forensic application
-
Wei, C., Sprague, A., Warner, G., & Skjellum, A. (2008). Mining spam e-mail to identify common origins for forensic application. In Proceedings of the ACM Symposium on Applied Computing (pp. 1433-1437).
-
(2008)
Proceedings of the ACM Symposium on Applied Computing
, pp. 1433-1437
-
-
Wei, C.1
Sprague, A.2
Warner, G.3
Skjellum, A.4
|