{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:06Z","timestamp":1740099246667,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030027438"},{"type":"electronic","value":"9783030027445"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02744-5_25","type":"book-chapter","created":{"date-parts":[[2018,12,17]],"date-time":"2018-12-17T19:23:46Z","timestamp":1545074626000},"page":"337-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["User Relationship Classification of Facebook Messenger Mobile Data using WEKA"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9600-1646","authenticated-orcid":false,"given":"Amber","family":"Umair","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5748-155X","authenticated-orcid":false,"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8962-540X","authenticated-orcid":false,"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,18]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.diin.2017.09.002","volume":"23","author":"C Anglano","year":"2017","unstructured":"Anglano, C., Canonico, M., Guazzone, M.: Forensic analysis of telegram messenger on android smartphones. Digit. Invest. 23, 31\u201349 (2017)","journal-title":"Digit. Invest."},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1186\/1475-925X-5-51","volume":"5","author":"F Azuaje","year":"2006","unstructured":"Azuaje, F.: Witten IH, Frank E: data mining: practical machine learning tools and techniques 2nd edition. BioMed. Eng. OnLine 5(1), 51 (2006). \nhttps:\/\/doi.org\/10.1186\/1475-925X-5-51","journal-title":"BioMed. Eng. OnLine"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/3177847","volume":"51","author":"K Barmpatsalou","year":"2018","unstructured":"Barmpatsalou, K., Cruz, T., Monteiro, E., Simoes, P.: Current and future trends in mobile device forensics - a survey. ACM Comput. Surv. 51, 46 (2018)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"25_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"2","key":"25_CR5","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/s11036-016-0791-8","volume":"22","author":"NDW Cahyani","year":"2017","unstructured":"Cahyani, N.D.W., Ab Rahman, N.H., Glisson, W.B., Choo, K.K.R.: The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mob. Netw. Appl. 22(2), 240\u2013254 (2017)","journal-title":"Mob. Netw. Appl."},{"issue":"3","key":"25_CR6","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1080\/00450618.2016.1153714","volume":"49","author":"F Daryabar","year":"2017","unstructured":"Daryabar, F., Dehghantanha, A., Choo, K.K.R.: Cloud storage forensics: mega as a case study. Aust. J. Forensic Sci. 49(3), 344\u2013357 (2017). \nhttps:\/\/doi.org\/10.1080\/00450618.2016.1153714","journal-title":"Aust. J. Forensic Sci."},{"issue":"4","key":"25_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1080\/00450618.2015.1066854","volume":"48","author":"FN Dezfouli","year":"2016","unstructured":"Dezfouli, F.N., Dehghantanha, A., Eterovic-Soric, B., Choo, K.K.R.: Investigating social networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on android and iOS platforms. Aust. J. Forensic Sci. 48(4), 469\u2013488 (2016). \nhttps:\/\/doi.org\/10.1080\/00450618.2015.1066854","journal-title":"Aust. J. Forensic Sci."},{"key":"25_CR8","doi-asserted-by":"publisher","unstructured":"Lee, K., Palsetia, D., Narayanan, R., Patwary, M.M.A., Agrawal, A., Choudhary, A.: Twitter trending topic classification. In: IEEE 11th International Conference on Data Mining Workshops, pp. 251\u2013258, December 2011. \nhttps:\/\/doi.org\/10.1109\/ICDMW.2011.171","DOI":"10.1109\/ICDMW.2011.171"},{"key":"25_CR9","doi-asserted-by":"publisher","unstructured":"Marturana, F., Me, G., Berte, R., Tacconi, S.: A quantitative approach to triaging in mobile forensics. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 582\u2013588, November 2011. \nhttps:\/\/doi.org\/10.1109\/TrustCom.2011.75","DOI":"10.1109\/TrustCom.2011.75"},{"issue":"2","key":"25_CR10","first-page":"256","volume":"6","author":"TR Patil","year":"2013","unstructured":"Patil, T.R., Sherekar, S.: Performance analysis of Naive Bayes and J48 classification algorithm for data classification. Int. J. Comput. Sci. Appl. 6(2), 256\u2013261 (2013)","journal-title":"Int. J. Comput. Sci. Appl."},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.jnca.2016.11.018","volume":"86","author":"D Quick","year":"2017","unstructured":"Quick, D., Choo, K.K.R.: Pervasive social networking forensics: intelligence and evidence from mobile device extracts. J. Netw. Comput. Appl. 86, 24\u201333 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1007\/978-0-387-39940-9_565","volume-title":"Encyclopedia of Database Systems","author":"P Refaeilzadeh","year":"2009","unstructured":"Refaeilzadeh, P., Tang, L., Liu, H.: Cross-validation. In: Liu, L., \u00d6zsu, M.T. (eds.) Encyclopedia of Database Systems, pp. 532\u2013538. Springer, Boston (2009). \nhttps:\/\/doi.org\/10.1007\/978-0-387-39940-9_565"},{"key":"25_CR13","doi-asserted-by":"publisher","unstructured":"Umair, A., Nanda, P., He, X.: Online social network information forensics: a survey on use of various tools and determining how cautious Facebook users are? In: IEEE Trustcom\/BigDataSE\/ICESS, pp. 1139\u20131144, August 2017. \nhttps:\/\/doi.org\/10.1109\/Trustcom\/BigDataSE\/ICESS.2017.364","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.364"},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"S77","DOI":"10.1016\/j.diin.2015.05.009","volume":"14","author":"Daniel Walnycky","year":"2015","unstructured":"Walnycky, D., Baggili, I., Marrington, A., Moore, J., Breitinger, F.: Network and device forensic analysis of android social-messaging applications. Digit. Invest. 14, S77\u2013S84 (2015). \nhttps:\/\/doi.org\/10.1016\/j.diin.2015.05.009\n\n. \nhttp:\/\/www.sciencedirect.com\/science\/article\/pii\/S1742287615000547\n\n. The Proceedings of the Fifteenth Annual DFRWS Conference","journal-title":"Digital Investigation"},{"issue":"3","key":"25_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0150300","volume":"11","author":"TY Yang","year":"2016","unstructured":"Yang, T.Y., Dehghantanha, A., Choo, K.K.R., Muda, Z.: Windows instant messaging app forensics: Facebook and skype as case studies. PLoS ONE 11(3), 1\u201329 (2016). \nhttps:\/\/doi.org\/10.1371\/journal.pone.0150300","journal-title":"PLoS ONE"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02744-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,17]],"date-time":"2018-12-17T19:30:57Z","timestamp":1545075057000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02744-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030027438","9783030027445"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02744-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www4.comp.polyu.edu.hk\/~nss2018\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}