相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Formal knowledge model for online social network forensics
Humaira Arshad et al.
COMPUTERS & SECURITY (2020)
What's really 'Happning'? A forensic analysis of Android and iOS Happn dating apps
Shawn Knox et al.
COMPUTERS & SECURITY (2020)
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
Maria Stoyanova et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication Channels
Kamal Taha et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Large-scale group decision making model based on social network analysis: Trust relationship-based conflict detection and elimination
Bingsheng Liu et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2019)
Identifying substance use risk based on deep neural networks and Instagram social media data
Saeed Hassanpour et al.
NEUROPSYCHOPHARMACOLOGY (2019)
Social media big data analytics: A survey
Norjihan Abdul Ghani et al.
COMPUTERS IN HUMAN BEHAVIOR (2019)
Social Media and (Counter) Terrorist Finance: A Fund-Raising and Disruption Tool
Tom Keatinge et al.
STUDIES IN CONFLICT & TERRORISM (2019)
Detecting Android Malware Leveraging Text Semantics of Network Flows
Shanshan Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
A Hybrid Approach for Detecting Automated Spammers in Twitter
Mohd Fazil et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Feature selection considering the composition of feature relevancy
Wanfu Gao et al.
PATTERN RECOGNITION LETTERS (2018)
The science of fake news
David M. J. Lazer et al.
SCIENCE (2018)
Forensic Taxonomy of Android Social Apps
Abdullah Azfar et al.
JOURNAL OF FORENSIC SCIENCES (2017)
Towards Detecting Compromised Accounts on Social Networks
Manuel Egele et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)
Using the Spanning Tree of a Criminal Network for Identifying Its Leaders
Kamal Taha et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Identity Deception Prevention Using Common Contribution Network Data
Michail Tsikerdekis
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Discovering suspicious behavior in multilayer social networks
P. V. Bindu et al.
COMPUTERS IN HUMAN BEHAVIOR (2017)
Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google plus artefacts on Android and iOS platforms
Farhood Norouzizadeh Dezfouli et al.
AUSTRALIAN JOURNAL OF FORENSIC SCIENCES (2016)
SIIMCO: A Forensic Investigation Tool for Identifying the Influential Members of a Criminal Organization
Kamal Taha et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Profiling Online Social Behaviors for Compromised Account Detection
Xin Ruan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Network and device forensic analysis of Android social-messaging applications
Daniel Walnycky et al.
DIGITAL INVESTIGATION (2015)
A social graph based text mining framework for chat log investigation
Tarique Anwar et al.
DIGITAL INVESTIGATION (2014)
Detecting criminal organizations in mobile phone networks
Emilio Ferrara et al.
EXPERT SYSTEMS WITH APPLICATIONS (2014)
A Probabilistic Generative Model for Mining Cybercriminal Networks from Online Social Media
Raymond Y. K. Lau et al.
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE (2014)
Mining criminal networks from unstructured text documents
Rabeah Al-Zaidy et al.
DIGITAL INVESTIGATION (2012)
Unsupervised discovery of relations for analysis of textual data
A. L. Louis et al.
DIGITAL INVESTIGATION (2011)
Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data
Hai-Cheng Chu et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2011)
CrimeNet explorer: A framework for criminal network knowledge discovery
JJ Xu et al.
ACM TRANSACTIONS ON INFORMATION SYSTEMS (2005)