-
1
-
-
84918505814
-
-
(accessed 30 October 2013)
-
Access Data (2013), "Access Data", available at: www.accessdata.com (accessed 30 October 2013).
-
(2013)
Access Data
-
-
-
3
-
-
80051527411
-
Live data mining concerning social networking forensics based on a facebook session through aggregation of social data
-
Chu, H.C., Deng, D.J. and Park, J.H. (2011), "Live data mining concerning social networking forensics based on a facebook session through aggregation of social data", IEEE Journal on Selected Areas in Communications, Vol. 29 No. 7, pp. 1368-1376.
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, Issue.7
, pp. 1368-1376
-
-
Chu, H.C.1
Deng, D.J.2
Park, J.H.3
-
4
-
-
84883361891
-
Phishing detection using traffic behavior, spectral clustering and random forests
-
IEEE, Washington, DC
-
DeBarr, D., Ramanathan, V. and Harry Wechsler, H. (2013), "Phishing detection using traffic behavior, spectral clustering and random forests", Proceedings of Intelligence and Security Informatics (ISI 2013) in Seattle, IEEE, Washington, DC, pp. 67-72.
-
Proceedings of Intelligence and Security Informatics (ISI 2013) in Seattle
, pp. 67-72
-
-
Debarr, D.1
Ramanathan, V.2
Harry Wechsler, H.3
-
5
-
-
84872924283
-
LeadLine: Interactive visual analysis of text data through event identification and exploration
-
IEEE, Washington, DC
-
Dou, W., Wang, X., Skau, D., Ribarsky, W. and Zhou, M.X. (2012), "LeadLine: interactive visual analysis of text data through event identification and exploration", Proceedings of the IEEE Symposium on Visual Analytics Science and Technology in Seattle, IEEE, Washington, DC, pp. 93-102.
-
(2012)
Proceedings of the IEEE Symposium on Visual Analytics Science and Technology in Seattle
, pp. 93-102
-
-
Dou, W.1
Wang, X.2
Skau, D.3
Ribarsky, W.4
Zhou, M.X.5
-
7
-
-
84855846009
-
Monitoring email transaction logs by text-mining email contents
-
IEEE, Macao
-
Esichaikul, V., Guha, S. and Juntapoln, C. (2011), "Monitoring email transaction logs by text-mining email contents", Proceedings of the 3rd International Conference on Data Mining and Intelligent Information Technology Applications (ICMiA), IEEE, Macao, pp. 255-258.
-
(2011)
Proceedings of the 3rd International Conference on Data Mining and Intelligent Information Technology Applications (ICMiA)
, pp. 255-258
-
-
Esichaikul, V.1
Guha, S.2
Juntapoln, C.3
-
8
-
-
77949823817
-
Narratives: A visualization to track narrative events as they develop
-
IEEE, Columbus
-
Fisher, D., Hoff, A., Robertson, G. and Hurst, M. (2008), "Narratives: a visualization to track narrative events as they develop", Proceedings of the IEEE Symposium on Visual Analytics Science and Technology, IEEE, Columbus, pp. 115-122.
-
(2008)
Proceedings of the IEEE Symposium on Visual Analytics Science and Technology
, pp. 115-122
-
-
Fisher, D.1
Hoff, A.2
Robertson, G.3
Hurst, M.4
-
9
-
-
79960253363
-
Temporal social network analysis for historians: A case study
-
Haggerty, J. and Haggerty, S. (2011), "Temporal social network analysis for historians: a case study", Proceedings of the International Conference on Visualization Theory and Applications (IVAPP 2011), Institute for Systems and Technologies of Information, Control and Communication, Algarve, pp. 207-217.
-
(2011)
Proceedings of the International Conference on Visualization Theory and Applications (IVAPP 2011), Institute for Systems and Technologies of Information, Control and Communication, Algarve
, pp. 207-217
-
-
Haggerty, J.1
Haggerty, S.2
-
10
-
-
80053018646
-
A framework for the forensic investigation of unstructured email relationship data
-
Haggerty, J., Karran, A.J., Lamb, D.J. and Taylor, M.J. (2011), "A framework for the forensic investigation of unstructured email relationship data", International Journal of Digital Crime and Forensics, Vol. 3 No. 3, pp. 1-18.
-
(2011)
International Journal of Digital Crime and Forensics
, vol.3
, Issue.3
, pp. 1-18
-
-
Haggerty, J.1
Karran, A.J.2
Lamb, D.J.3
Taylor, M.J.4
-
11
-
-
84856141862
-
Phishing email feature selection approach
-
IEEE, Changsha
-
Hamid, I.R.A. and Abawajy, J. (2011), "Phishing email feature selection approach", Proceedings of the International Joint Conference of IEEE TrustCom-11, IEEE, Changsha, pp. 916-921.
-
(2011)
Proceedings of the International Joint Conference of IEEE TrustCom-11
, pp. 916-921
-
-
Hamid, I.R.A.1
Abawajy, J.2
-
12
-
-
79951775263
-
Network-based filtering for large email collections in E-Discovery
-
Henseler, H. (2010), "Network-based filtering for large email collections in E-Discovery", Artificial Intelligence and Law, Vol. 18 No. 4, pp. 413-430.
-
(2010)
Artificial Intelligence and Law
, vol.18
, Issue.4
, pp. 413-430
-
-
Henseler, H.1
-
13
-
-
80855141828
-
Visualization rhetoric: Framing effects in narrative visualization
-
Hullman, J. and Diakopoulos, N. (2011), "Visualization rhetoric: framing effects in narrative visualization", IEEE Transactions on Visualization and Computer Graphics, Vol. 17 No. 12, pp. 2231-2240.
-
(2011)
IEEE Transactions on Visualization and Computer Graphics
, vol.17
, Issue.12
, pp. 2231-2240
-
-
Hullman, J.1
Diakopoulos, N.2
-
14
-
-
77949384064
-
A visual analytic framework for exploring relationships in textual contents of digital forensics evidence
-
IEEE, Atlantic City, NJ
-
Jankun-Kelly, T.J., Wilson, D., Stamps, A.S., Franck, J., Carver, J. and Swan, J.E. II (2009), "A visual analytic framework for exploring relationships in textual contents of digital forensics evidence", Proceedings of the 6th International Workshop on Visualization for Cyber Security, IEEE, Atlantic City, NJ, pp. 39-44.
-
(2009)
Proceedings of the 6th International Workshop on Visualization for Cyber Security
, pp. 39-44
-
-
Jankun-Kelly, T.J.1
Wilson, D.2
Stamps, A.S.3
Franck, J.4
Carver, J.5
Swan, J.E.6
-
15
-
-
84862921872
-
Preserving narratives in electronic health records
-
IEEE, Atlanta
-
Nair, V., Kaduskar, M., Bhaskaran, P., Bhaumik, S. and Lee, H. (2011), "Preserving narratives in electronic health records", Proceedings of the International Conference on Bioinformatics and Biomedicine, IEEE, Atlanta, pp. 418-421.
-
(2011)
Proceedings of the International Conference on Bioinformatics and Biomedicine
, pp. 418-421
-
-
Nair, V.1
Kaduskar, M.2
Bhaskaran, P.3
Bhaumik, S.4
Lee, H.5
-
16
-
-
84870827748
-
Development of infovis software for digital forensics
-
IEEE, Izmir
-
Osborne, G., Turnbull, B. and Slay, J. (2012), "Development of infovis software for digital forensics", Proceedings of the 36th International Conference on Software and Applications Workshop, IEEE, Izmir, pp. 213-217.
-
(2012)
Proceedings of the 36th International Conference on Software and Applications Workshop
, pp. 213-217
-
-
Osborne, G.1
Turnbull, B.2
Slay, J.3
-
17
-
-
80054756999
-
Visualization of network forensics traffic data with self-organizing map for qualitative features
-
IEEE, San Jose
-
Palomo, E.J., North, J., Elizondo, D., Luque, R.M. and Watson, T. (2011), "Visualization of network forensics traffic data with self-organizing map for qualitative features", Proceedings of the International Joint Conference on Neural Networks, IEEE, San Jose, pp. 1740-1747.
-
(2011)
Proceedings of the International Joint Conference on Neural Networks
, pp. 1740-1747
-
-
Palomo, E.J.1
North, J.2
Elizondo, D.3
Luque, R.M.4
Watson, T.5
-
18
-
-
80455162356
-
A discussion of visualization techniques for the analysis of digital evidence
-
Reliability and Security, IEEE, Vienna
-
Schrenk, G. and Poisel, R. (2011), "A discussion of visualization techniques for the analysis of digital evidence", Proceedings of the 6th International Conference on Availability, Reliability and Security, IEEE, Vienna, pp. 758-763.
-
(2011)
Proceedings of the 6th International Conference on Availability
, pp. 758-763
-
-
Schrenk, G.1
Poisel, R.2
-
19
-
-
78149272878
-
Narrative visualization: Telling stories with data
-
Segel, E. and Heer, J. (2010), "Narrative visualization: telling stories with data", IEEE Transactions on Visualization and Computer Graphics, Vol. 16 No. 6, pp. 1139-1148.
-
(2010)
IEEE Transactions on Visualization and Computer Graphics
, vol.16
, Issue.6
, pp. 1139-1148
-
-
Segel, E.1
Heer, J.2
-
21
-
-
84855798653
-
IntentFinder: A system for discovering significant information implicit in large, heterogeneous document collections
-
IEEE, Waltham
-
Ungar, L., Leibholz, S. and Chaski, C. (2011), "IntentFinder: a system for discovering significant information implicit in large, heterogeneous document collections", Proceedings of the International Conference on Technologies for Homeland Security, IEEE, Waltham, pp. 219-223.
-
(2011)
Proceedings of the International Conference on Technologies for Homeland Security
, pp. 219-223
-
-
Ungar, L.1
Leibholz, S.2
Chaski, C.3
-
22
-
-
84863293906
-
Topic tracking based on event network
-
IEEE, Dalian
-
Wang, D., Liu, W., Xu, W. and Zhang, X. (2011), "Topic tracking based on event network", Proceedings of the International Conferences on Internet of Things, and Cyber, Physical and Social Computing, IEEE, Dalian, pp. 488-493.
-
(2011)
Proceedings of the International Conferences on Internet of Things, and Cyber, Physical and Social Computing
, pp. 488-493
-
-
Wang, D.1
Liu, W.2
Xu, W.3
Zhang, X.4
-
23
-
-
77958199146
-
Measuring link importance in terrorist networks
-
Odense
-
Wiil, U.K., Gniadek, J. and Memon, N. (2010), "Measuring link importance in terrorist networks", Proceedings of the International Conference on Social Networks Analysis and Mining, Odense, pp. 225-232.
-
(2010)
Proceedings of the International Conference on Social Networks Analysis and Mining
, pp. 225-232
-
-
Wiil, U.K.1
Gniadek, J.2
Memon, N.3
-
24
-
-
78649899238
-
Content propagation analysis of email communications
-
IEEE, WIC, ACM, Toronto
-
Yoshinaga, N., Itaya, S., Tanaka, R., Konishi, T., Doi, S., Yamada, K. and Davis, P. (2010), "Content propagation analysis of email communications", Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, IEEE, WIC, ACM, Toronto, pp. 79-82.
-
(2010)
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, pp. 79-82
-
-
Yoshinaga, N.1
Itaya, S.2
Tanaka, R.3
Konishi, T.4
Doi, S.5
Yamada, K.6
Davis, P.7
-
25
-
-
84918527698
-
Analyzing group communication for preventing data leakage via email
-
IEEE, Washington, DC
-
Zilberman, P., Dolev, S., Katz, G., Elovici, Y. and Shabtai, A. (2013), "Analyzing group communication for preventing data leakage via email", Proceedings of Intelligence and Security Informatics 2013 in Seattle, IEEE, Washington, DC, pp. 37-41.
-
(2013)
Proceedings of Intelligence and Security Informatics 2013 in Seattle
, pp. 37-41
-
-
Zilberman, P.1
Dolev, S.2
Katz, G.3
Elovici, Y.4
Shabtai, A.5
|