-
1
-
-
84991859271
-
-
Gartner. IT Glossary: Big Data. Accessed 21 July 2013
-
Gartner. IT Glossary: Big Data. http://www.gartner.com/it-glossary/big-data/ (2013). Accessed 21 July 2013
-
(2013)
-
-
-
2
-
-
84868585926
-
Digital forensics research: the next 10 years
-
Garfinkel, S.: Digital forensics research: the next 10 years. Digit. Investig. 7, S64–S73 (2010)
-
(2010)
Digit. Investig.
, vol.7
, pp. S64-S73
-
-
Garfinkel, S.1
-
3
-
-
84899108807
-
Digital forensic research: current state of the art
-
Raghavan, S.: Digital forensic research: current state of the art. CSI Trans. ICT 1(1), 91–114 (2013)
-
(2013)
CSI Trans. ICT
, vol.1
, Issue.1
, pp. 91-114
-
-
Raghavan, S.1
-
4
-
-
84991845456
-
-
FBI_RCFL: FBI Regional Computer Forensic Laboratory Annual Reports 2003–2012
-
FBI_RCFL: FBI Regional Computer Forensic Laboratory Annual Reports 2003–2012. 2003–2012; http://www.rcfl.gov/downloads
-
(2003)
-
-
-
8
-
-
84943526145
-
Digital Forensic Research: The Good, the Bad and the Unaddressed. Advances in Digital Forensics
-
Springer, Berlin
-
Beebe, N.: Digital Forensic Research: The Good, the Bad and the Unaddressed. Advances in Digital Forensics, pp. 17–36. Springer, Berlin (2009)
-
(2009)
pp
, vol.17-36
-
-
Beebe, N.1
-
9
-
-
19944384890
-
Risk sensitive digital evidence collection
-
Kenneally, E., Brown, C.: Risk sensitive digital evidence collection. Digit. Investig. 2(2), 101–119 (2005)
-
(2005)
Digit. Investig.
, vol.2
, Issue.2
, pp. 101-119
-
-
Kenneally, E.1
Brown, C.2
-
10
-
-
84907216860
-
Sniper Forensics
-
Greiner, L.: Sniper Forensics. netWorker 13(4), 8–10 (2009)
-
(2009)
netWorker
, vol.13
, Issue.4
, pp. 8-10
-
-
Greiner, L.1
-
11
-
-
77950005794
-
Dealing with terabyte data sets in digital investigations
-
Springer, Berlin
-
Beebe, N., Clark, J.: Dealing with terabyte data sets in digital investigations. Advances in Digital Forensics, pp. 3–16. Springer, Berlin (2005)
-
(2005)
Advances in Digital Forensics
, pp. 3-16
-
-
Beebe, N.1
Clark, J.2
-
12
-
-
84991866229
-
-
Alzaabi, M., Jones, A., Martin, T.A.: , Security & Law, . In: 2013 Conference Supplement, pp. 121–135
-
Alzaabi, M., Jones, A., Martin, T.A.: An Ontology-Based Forensic Analysis Tool. Journal of Digital Forensics, Security & Law, 2013. In: 2013 Conference Supplement, pp. 121–135
-
(2013)
An Ontology-Based Forensic Analysis Tool. Journal of Digital Forensics
-
-
-
13
-
-
84899626510
-
Digital forensics as a service: a game changer
-
van Baar, R.B., van Beek, H.M.A., van Eijk, E.J.: Digital forensics as a service: a game changer. Digit. Investig. 11, S54–S62 (2014)
-
(2014)
Digit. Investig.
, vol.11
, pp. S54-S62
-
-
van Baar, R.B.1
van Beek, H.M.A.2
van Eijk, E.J.3
-
14
-
-
70350511727
-
Investigation delayed is justice denied: proposals for expediting forensic examinations of digital evidence
-
Casey, E., Ferraro, M., Nguyen, L.: Investigation delayed is justice denied: proposals for expediting forensic examinations of digital evidence. J. Forensic Sci. 54(6), 1353–1364 (2009)
-
(2009)
J. Forensic Sci.
, vol.54
, Issue.6
, pp. 1353-1364
-
-
Casey, E.1
Ferraro, M.2
Nguyen, L.3
-
15
-
-
84883551334
-
Honing digital forensic processes
-
Casey, E., Katz, G., Lewthwaite, J.: Honing digital forensic processes. Digit. Investig. 10(2), 138–147 (2013)
-
(2013)
Digit. Investig.
, vol.10
, Issue.2
, pp. 138-147
-
-
Casey, E.1
Katz, G.2
Lewthwaite, J.3
-
16
-
-
84899624979
-
OpenLV: empowering investigators and first-responders in the digital forensics process
-
Vidas, T., Kaplan, B., Geiger, M.: OpenLV: empowering investigators and first-responders in the digital forensics process. Digit. Investig. 11, S45–S53 (2014)
-
(2014)
Digit. Investig.
, vol.11
, pp. S45-S53
-
-
Vidas, T.1
Kaplan, B.2
Geiger, M.3
-
17
-
-
84898006086
-
Applicability of latent Dirichlet allocation to multi-disk search
-
Noel, G.E., Peterson, G.L.: Applicability of latent Dirichlet allocation to multi-disk search. Digit. Investig. 11(1), 43–56 (2014)
-
(2014)
Digit. Investig.
, vol.11
, Issue.1
, pp. 43-56
-
-
Noel, G.E.1
Peterson, G.L.2
-
18
-
-
84911429899
-
Knowle: a semantic link network based system for organizing large scale online news events
-
Xu, Z., et al.: Knowle: a semantic link network based system for organizing large scale online news events. Future Gener. Comput. Syst. 43, 40–50 (2015)
-
(2015)
Future Gener. Comput. Syst.
, vol.43
, pp. 40-50
-
-
Xu, Z.1
-
19
-
-
85018492386
-
Crowdsourcing based social media data analysis of urban emergency events
-
Xu, Z., et al.: Crowdsourcing based social media data analysis of urban emergency events. In: Multimedia Tools and Applications, pp. 1–18, 2015
-
(2015)
Multimedia Tools and Applications
, pp. 1-18
-
-
Xu, Z.1
-
20
-
-
84975631777
-
Crowdsourcing based description of urban emergency events using social media big data
-
Xu, Z., et al.: Crowdsourcing based description of urban emergency events using social media big data. In: IEEE Transactions on Cloud Computing, PP(99): pp. 1–1, 2016
-
(2016)
IEEE Transactions on Cloud Computing, PP(99)
, pp. 1
-
-
Xu, Z.1
-
21
-
-
33745308255
-
Design of a digital forensics image mining system
-
Brown, R., Pham, B., de Vel, O.: Design of a digital forensics image mining system. In: Knowledge-Based Intelligent Information and Engineering Systems, pp. 395–404, 2005
-
(2005)
Knowledge-Based Intelligent Information and Engineering Systems
, pp. 395-404
-
-
Brown, R.1
Pham, B.2
de Vel, O.3
-
22
-
-
84883551275
-
Triage: a practical solution or admission of failure
-
Pollitt, M.M.: Triage: a practical solution or admission of failure. Digit. Investig. 10(2), 87–88 (2013)
-
(2013)
Digit. Investig.
, vol.10
, Issue.2
, pp. 87-88
-
-
Pollitt, M.M.1
-
23
-
-
3042816360
-
Current issues confronting well-established computer-assisted child exploitation and computer crime task forces
-
Ferraro, M.M., Russell, A.: Current issues confronting well-established computer-assisted child exploitation and computer crime task forces. Digit. Investig. 1(1), 7–15 (2004)
-
(2004)
Digit. Investig.
, vol.1
, Issue.1
, pp. 7-15
-
-
Ferraro, M.M.1
Russell, A.2
-
24
-
-
33847357771
-
Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags
-
Turner, P.: Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags. Digit. Investig. 4(1), 30–35 (2007)
-
(2007)
Digit. Investig.
, vol.4
, Issue.1
, pp. 30-35
-
-
Turner, P.1
-
26
-
-
84883551108
-
On-scene triage open source forensic tool chests: are they effective?
-
Shiaeles, S., Chryssanthou, A., Katos, V.: On-scene triage open source forensic tool chests: are they effective? Digit. Investig. 10(2), 99–115 (2013)
-
(2013)
Digit. Investig.
, vol.10
, Issue.2
, pp. 99-115
-
-
Shiaeles, S.1
Chryssanthou, A.2
Katos, V.3
-
27
-
-
85083946044
-
-
Roussev, V., Richard, G.: Breaking the performance wall: The case for distributed digital forensics, . , Vol. 94
-
Roussev, V., Richard, G.: Breaking the performance wall: The case for distributed digital forensics, 2004. In: Proceedings of the 2004 Digital Forensics Research Workshop, Vol. 94
-
(2004)
In: Proceedings of the 2004 Digital Forensics Research Workshop
-
-
-
28
-
-
84868561949
-
High-speed search using Tarari content processor in digital forensics
-
Lee, J., Un, S., Hong, D.: High-speed search using Tarari content processor in digital forensics. Digit. Investig. 5, S91–S95 (2008)
-
(2008)
Digit. Investig.
, vol.5
, pp. S91-S95
-
-
Lee, J.1
Un, S.2
Hong, D.3
-
29
-
-
84873127082
-
-
Pringle, N., Sutherland, I.: Is a Computational Grid a Suitable Platform for High Performance Digital Forensics? , Academic Conferences Limited, p. 175
-
Pringle, N., Sutherland, I.: Is a Computational Grid a Suitable Platform for High Performance Digital Forensics? In: Proceedings of the 7th European Conference on Information Warfare and Security 2008, Academic Conferences Limited, p. 175
-
(2008)
In: Proceedings of the 7th European Conference on Information Warfare and Security
-
-
-
30
-
-
14544299160
-
The future of forensic computing
-
Sheldon, A.: The future of forensic computing. Digit. Investig. 2(1), 31–35 (2005)
-
(2005)
Digit. Investig.
, vol.2
, Issue.1
, pp. 31-35
-
-
Sheldon, A.1
-
31
-
-
33746000061
-
XIRAF—XML-based indexing and querying for digital forensics
-
Alink, W., et al.: XIRAF—XML-based indexing and querying for digital forensics. Digit. Investig. 3, 50–58 (2006)
-
(2006)
Digit. Investig.
, vol.3
, pp. 50-58
-
-
Alink, W.1
-
32
-
-
84870254143
-
Engineering an online computer forensic service
-
Bhoedjang, R.A.F., et al.: Engineering an online computer forensic service. Digit. Investig. 9(2), 96–108 (2012)
-
(2012)
Digit. Investig.
, vol.9
, Issue.2
, pp. 96-108
-
-
Bhoedjang, R.A.F.1
-
33
-
-
30344488429
-
The contribution of forensic science to crime analysis and investigation: forensic intelligence
-
Ribaux, O., Walsh, S.J., Margot, P.: The contribution of forensic science to crime analysis and investigation: forensic intelligence. Forensic Sci. Int. 156(2), 171–181 (2006)
-
(2006)
Forensic Sci. Int.
, vol.156
, Issue.2
, pp. 171-181
-
-
Ribaux, O.1
Walsh, S.J.2
Margot, P.3
-
34
-
-
84891584057
-
-
Wiley, New York
-
Kantardzic, M.: Data Mining: Concepts, Models, Methods, and Algorithms. Wiley, New York (2011)
-
(2011)
Data Mining: Concepts, Models, Methods, and Algorithms
-
-
Kantardzic, M.1
-
36
-
-
85130734369
-
Knowledge discovery and data mining: towards a unifying framework
-
Fayyad, U., Piatetsky-Shapiro, G.: Knowledge discovery and data mining: towards a unifying framework. In: KDD, pp. 82–88, 1996
-
(1996)
KDD
, pp. 82-88
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
-
37
-
-
33845532477
-
Forensic relative strength scoring: ASCII and entropy scoring
-
Shannon, M.: Forensic relative strength scoring: ASCII and entropy scoring. Int. J. Digit. Evid. 2(4), 151–169 (2004)
-
(2004)
Int. J. Digit. Evid.
, vol.2
, Issue.4
, pp. 151-169
-
-
Shannon, M.1
-
38
-
-
84930520292
-
Particle swarm optimization based dictionary learning for remote sensing big data
-
Wang, L., et al.: Particle swarm optimization based dictionary learning for remote sensing big data. Knowl. Based Syst. 79, 43–50 (2015)
-
(2015)
Knowl. Based Syst.
, vol.79
, pp. 43-50
-
-
Wang, L.1
-
39
-
-
84906572582
-
IK-SVD: dictionary learning for spatial big data via incremental atom update
-
Wang, L., et al.: IK-SVD: dictionary learning for spatial big data via incremental atom update. Comput. Sci. Eng. 16(4), 41–52 (2014)
-
(2014)
Comput. Sci. Eng.
, vol.16
, Issue.4
, pp. 41-52
-
-
Wang, L.1
-
40
-
-
84954563842
-
Towards building a data-intensive index for big data computing—a case study of remote sensing data processing
-
Ma, Y., et al.: Towards building a data-intensive index for big data computing—a case study of remote sensing data processing. In: Information Sciences, 2014
-
(2014)
Information Sciences
-
-
Ma, Y.1
-
41
-
-
85052185060
-
Selective imaging: creating efficient forensic images by selecting content first
-
Stüttgen, J.: Selective imaging: creating efficient forensic images by selecting content first. Mannheim University, 2011
-
(2011)
Mannheim University
-
-
Stüttgen, J.1
-
42
-
-
78651545956
-
Forensic feature extraction and cross-drive analysis
-
Garfinkel, S.L.: Forensic feature extraction and cross-drive analysis. Digit. Investig. 3, 71–81 (2006)
-
(2006)
Digit. Investig.
, vol.3
, pp. 71-81
-
-
Garfinkel, S.L.1
-
43
-
-
84883554056
-
A practical and robust approach to coping with large volumes of data submitted for digital forensic examination
-
Shaw, A., Browne, A.: A practical and robust approach to coping with large volumes of data submitted for digital forensic examination. Digit. Investig. 10(2), 116–128 (2013)
-
(2013)
Digit. Investig.
, vol.10
, Issue.2
, pp. 116-128
-
-
Shaw, A.1
Browne, A.2
-
44
-
-
84938976836
-
Rapid forensic acquisition of large media with sifting collectors
-
Grier, J., Richard III, G.G.: Rapid forensic acquisition of large media with sifting collectors. Digit. Investig. 2015(14), S34–S44 (2015)
-
(2015)
Digit. Investig.
, vol.2015
, Issue.14
, pp. S34-S44
-
-
Grier, J.1
Richard, G.G.2
-
45
-
-
84907215855
-
Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive. Trends Issues Crime Crim
-
Quick, D., Choo, K.-K.R.: Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive. Trends Issues Crime Crim. Justice 480, 1–11 (2014)
-
(2014)
Justice
, vol.480
, pp. 1-11
-
-
Quick, D.1
Choo, K.-K.R.2
-
48
-
-
84991910551
-
-
NIJ: Forensic Examination of Digital Evidence: A Guide for Law Enforcement
-
NIJ: Forensic Examination of Digital Evidence: A Guide for Law Enforcement, 2004. http://nij.gov/nij/pubs-sum/199408.htm
-
(2004)
-
-
-
49
-
-
85015273146
-
A forensic acquisition and analysis system for IaaS
-
Alqahtany, S., et al.: A forensic acquisition and analysis system for IaaS. In: Cluster Computing, pp. 1–15, 2015
-
(2015)
Cluster Computing
, pp. 1-15
-
-
Alqahtany, S.1
-
50
-
-
84903603461
-
Semantic link network-based model for organizing multimedia big data
-
Hu, C., et al.: Semantic link network-based model for organizing multimedia big data. IEEE Trans. Emerg. Top. Comput. 2(3), 376–387 (2014)
-
(2014)
IEEE Trans. Emerg. Top. Comput.
, vol.2
, Issue.3
, pp. 376-387
-
-
Hu, C.1
-
51
-
-
84923248155
-
Semantic based representing and organizing surveillance big data using video structural description technology
-
Xu, Z., et al.: Semantic based representing and organizing surveillance big data using video structural description technology. J. Syst. Softw. 102, 217–225 (2015)
-
(2015)
J. Syst. Softw.
, vol.102
, pp. 217-225
-
-
Xu, Z.1
-
52
-
-
84946498612
-
Video structural description technology for the new generation video surveillance systems
-
Hu, C., et al.: Video structural description technology for the new generation video surveillance systems. Front. Comput. Sci. 9(6), 980–989 (2015)
-
(2015)
Front. Comput. Sci.
, vol.9
, Issue.6
, pp. 980-989
-
-
Hu, C.1
-
53
-
-
84988388814
-
Semantic enhanced cloud environment for surveillance data management using video structural description
-
Xu, Z., et al.: Semantic enhanced cloud environment for surveillance data management using video structural description. In: Computing, pp. 1–20, 2014
-
(2014)
Computing
, pp. 1-20
-
-
Xu, Z.1
-
54
-
-
84954311506
-
Automatic facial emotion recognition using weber local descriptor for e-Healthcare system
-
Alhussein, M.: Automatic facial emotion recognition using weber local descriptor for e-Healthcare system. In: Cluster Computing, pp. 1–10, 2016
-
(2016)
Cluster Computing
, pp. 1-10
-
-
Alhussein, M.1
-
55
-
-
84864600197
-
The use of random sampling in investigations involving child abuse material
-
Jones, B., Pleno, S., Wilkinson, M.: The use of random sampling in investigations involving child abuse material. Digit. Investig. 9, S99–S107 (2012)
-
(2012)
Digit. Investig.
, vol.9
, pp. S99-S107
-
-
Jones, B.1
Pleno, S.2
Wilkinson, M.3
-
56
-
-
68649110054
-
Bringing science to digital forensics with standardized forensic corpora
-
Garfinkel, S., et al.: Bringing science to digital forensics with standardized forensic corpora. Digit. Investig. 6, S2–S11 (2009)
-
(2009)
Digit. Investig.
, vol.6
, pp. S2-S11
-
-
Garfinkel, S.1
-
57
-
-
74749094583
-
Intelligence-led crime scene processing. Part I: Forensic intelligence
-
Ribaux, O., et al.: Intelligence-led crime scene processing. Part I: Forensic intelligence. Forensic Sci. Int. 195(1–3), 10–16 (2010)
-
(2010)
Forensic Sci. Int.
, vol.195
, Issue.1-3
, pp. 10-16
-
-
Ribaux, O.1
-
58
-
-
79960112691
-
Building association link network for semantic link on web resources
-
Luo, X., et al.: Building association link network for semantic link on web resources. IEEE Trans. Autom. Sci. Eng. 8(3), 482–494 (2011)
-
(2011)
IEEE Trans. Autom. Sci. Eng.
, vol.8
, Issue.3
, pp. 482-494
-
-
Luo, X.1
-
59
-
-
84892524042
-
Measuring the semantic discrimination capability of association relations
-
Xu, Z., et al.: Measuring the semantic discrimination capability of association relations. Concurr. Comput. 26(2), 380–395 (2014)
-
(2014)
Concurr. Comput.
, vol.26
, Issue.2
, pp. 380-395
-
-
Xu, Z.1
-
60
-
-
84900841698
-
Generating temporal semantic context of concepts using web search engines
-
Xu, Z., et al.: Generating temporal semantic context of concepts using web search engines. J. Netw. Comput. Appl. 43, 42–55 (2014)
-
(2014)
J. Netw. Comput. Appl.
, vol.43
, pp. 42-55
-
-
Xu, Z.1
-
61
-
-
84934978192
-
Online comment-based hotel quality automatic assessment using improved fuzzy comprehensive evaluation and fuzzy cognitive map
-
Wei, X., et al.: Online comment-based hotel quality automatic assessment using improved fuzzy comprehensive evaluation and fuzzy cognitive map. IEEE Trans. Fuzzy Syst. 23(1), 72–84 (2015)
-
(2015)
IEEE Trans. Fuzzy Syst.
, vol.23
, Issue.1
, pp. 72-84
-
-
Wei, X.1
-
62
-
-
84901641463
-
Mining temporal explicit and implicit semantic relations between entities using web search engines
-
Xu, Z., et al.: Mining temporal explicit and implicit semantic relations between entities using web search engines. Future Gener. Comput. Syst. 37, 468–477 (2014)
-
(2014)
Future Gener. Comput. Syst.
, vol.37
, pp. 468-477
-
-
Xu, Z.1
-
63
-
-
84991850943
-
-
Xuan, J., et al.: Uncertainty analysis for the keyword system of web events
-
Xuan, J., et al.: Uncertainty analysis for the keyword system of web events, 2015
-
(2015)
-
-
-
64
-
-
84969891769
-
Geographical information system parallelization for spatial big data processing: a review
-
Zhao, L., et al.: Geographical information system parallelization for spatial big data processing: a review. In: Cluster Computing, pp. 1–14, 2015
-
(2015)
Cluster Computing
, pp. 1-14
-
-
Zhao, L.1
-
65
-
-
84925534015
-
Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
-
Punithavathani, D.S., Sujatha, K., Jain, J.M.: Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Clust. Comput. 18(1), 435–451 (2015)
-
(2015)
Clust. Comput.
, vol.18
, Issue.1
, pp. 435-451
-
-
Punithavathani, D.S.1
Sujatha, K.2
Jain, J.M.3
-
66
-
-
84991888349
-
Techniques and countermeasures of website/wireless traffic analysis and fingerprinting
-
Ghaleb, T.A.: Techniques and countermeasures of website/wireless traffic analysis and fingerprinting. In: Cluster Computing, pp. 1–12, 2015
-
(2015)
Cluster Computing
, pp. 1-12
-
-
Ghaleb, T.A.1
|