Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations
暂无分享,去创建一个
George Oikonomou | Shancang Li | Theo Tryfonas | Panagiotis Andriotis | Panagiotis Andriotis | T. Tryfonas | G. Oikonomou | Shancang Li
[1] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[2] Theodore Tryfonas,et al. Forensic analysis of wireless networking evidence of Android smartphones , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[3] Edgar R. Weippl,et al. Social snapshots: digital forensics for online social networks , 2011, ACSAC '11.
[4] Martin Boldt,et al. Computer forensic timeline visualization tool , 2009 .
[5] Gary C. Kessler,et al. Android forensics: Simplifying cell phone examinations , 2010 .
[6] Domenico Rosaci,et al. Trust and Compactness in Social Network Groups , 2015, IEEE Transactions on Cybernetics.
[7] Amr M. Youssef,et al. Mining criminal networks from unstructured text documents , 2012, Digit. Investig..
[8] Edgar R. Weippl,et al. Data Visualization for Social Network Forensics , 2012, IFIP Int. Conf. Digital Forensics.
[9] Desheng Dash Wu,et al. Computational simulation and risk analysis: An introduction of state of the art research , 2013, Math. Comput. Model..
[10] Marc Lemercier,et al. A smartphone-based online social network trust evaluation system , 2013, Social Network Analysis and Mining.
[11] Efthimios Tambouris,et al. Understanding the Predictive Power of Social Media This is a pre-print version of the following article : , 2013 .
[12] Chen Wang,et al. A behavior-based SMS antispam system , 2010, IBM J. Res. Dev..
[13] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[14] Lillian Lee,et al. Opinion Mining and Sentiment Analysis , 2008, Found. Trends Inf. Retr..
[15] Gordon Thomson. BYOD: enabling the chaos , 2012, Netw. Secur..
[16] Yifan Hu,et al. Efficient, High-Quality Force-Directed Graph Drawing , 2006 .
[17] Emilio Ferrara,et al. Forensic analysis of phone call networks , 2012, Social Network Analysis and Mining.
[18] Desheng Dash Wu,et al. Business intelligence in risk management: Some recent progresses , 2014, Inf. Sci..
[19] Akebo Yamakami,et al. Contributions to the study of SMS spam filtering: new collection and results , 2011, DocEng '11.
[20] Lilian Mitrou,et al. Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition , 2012, SEC.
[21] Paul Steiner. Going beyond mobile device management , 2014 .
[22] Saif Mohammad,et al. NRC-Canada: Building the State-of-the-Art in Sentiment Analysis of Tweets , 2013, *SEMEVAL.
[23] Atsuhiro Takasu,et al. Smartphone Message Sentiment Analysis , 2014, IFIP Int. Conf. Digital Forensics.
[24] Adam Michael Edwards,et al. Digital social research, social media and the sociological imagination: surrogacy, augmentation and re-orientation , 2013 .
[25] Christopher Hargreaves,et al. An automated timeline reconstruction approach for digital forensic investigations , 2012 .
[26] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[27] Sotiris Ioannidis,et al. Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data , 2013, Int. J. Digit. Crime Forensics.
[28] Preslav Nakov,et al. SemEval-2014 Task 9: Sentiment Analysis in Twitter , 2014, *SEMEVAL.
[29] Luis Alfonso Ureña López,et al. Sentiment analysis in Twitter , 2012, Natural Language Engineering.
[30] Andrew Blyth,et al. A Unified Approach to Network Traffic and Network Security Visualisation , 2009, 2009 IEEE International Conference on Communications.
[31] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[32] Ibrahim Baggili,et al. Forensic analysis of social networking applications on mobile devices , 2012, Digit. Investig..
[33] Desheng Dash Wu,et al. A Decision Support Approach for Online Stock Forum Sentiment Analysis , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[34] Simson L. Garfinkel,et al. Digital forensics research: The next 10 years , 2010, Digit. Investig..
[35] Mark Newman,et al. Detecting community structure in networks , 2004 .
[36] Eugénio C. Oliveira,et al. Tokenizing micro-blogging messages using a text classification approach , 2010, AND '10.
[37] John Zimmerman,et al. Mining smartphone data to classify life-facets of social relationships , 2013, CSCW.
[38] Pierre Dragicevic,et al. GraphDice: A System for Exploring Multivariate Social Networks , 2010, Comput. Graph. Forum.
[39] Jennifer Jie Xu,et al. Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..
[40] William A. Arbaugh,et al. FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory , 2006, Digit. Investig..
[41] Nicolas Christin,et al. Toward a general collection methodology for Android devices , 2011, Digit. Investig..
[42] Anis Yazidi,et al. Learning-Automaton-Based Online Discovery and Tracking of Spatiotemporal Event Patterns , 2013, IEEE Transactions on Cybernetics.
[43] Uta K. Bindl,et al. Fuel of the self-starter: how mood relates to proactive goal regulation. , 2012, The Journal of applied psychology.