{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:57Z","timestamp":1771661097990,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_51","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"743-760","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Analysis of Twitter Security and Privacy Using Memory Forensics"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Ghafarian","sequence":"first","affiliation":[]},{"given":"Darius","family":"Fiallo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"51_CR1","first-page":"55","volume":"3","author":"MS Chang","year":"2016","unstructured":"Chang, M.S., Chang, C.Y.: Twitter social network forensics on Windows 10. IJISET \u2013 Int. J. Innov. Sci. Eng. Technol. 3(9), 55\u201360 (2016)","journal-title":"IJISET \u2013 Int. J. Innov. Sci. Eng. Technol."},{"key":"51_CR2","doi-asserted-by":"crossref","unstructured":"Ali, S., Islam, N., Rauf, A, Din, I.U., Guizani, M., Rodrigues, J.P.C.: Privacy and security issues in online social networks. Future Internet 10(12), 1\u201312 (2018)","DOI":"10.3390\/fi10120114"},{"key":"51_CR3","unstructured":"Krishnamurthy, B.: Privacy and Social Media Networks: Can colorless green ideas sleep furiously: http:\/\/research.microsoft.com\/pubs\/64346\/dwork.pdf"},{"key":"51_CR4","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.chb.2015.05.045","volume":"52","author":"F Buccafurri","year":"2015","unstructured":"Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Comparing Twitter and Facebook user behavior: privacy and other aspects. Comput. Hum. Behav. 52, 87\u201395 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"Umair, A., Nanda, P., He, X.: Online social network information forensics: a survey on use of various tools and determining how cautious Facebook users are? IEEE Trustcom\/BigDataSE\/ICESS, pp. 1139\u20131144 (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.364"},{"key":"51_CR6","unstructured":"Fire, M, Kagan, D., Elishar, A., Elovici, Y.: Social Privacy Protector - Protecting Users\u2019 Privacy in Social Networks (2012)"},{"issue":"9","key":"51_CR7","first-page":"1","volume":"3","author":"MS Chang","year":"2016","unstructured":"Chang, M.S.: Digital forensic investigation of facebook on Windows 10. Int. J. Innov. Sci. Eng. Technol. 3(9), 1\u20137 (2016)","journal-title":"Int. J. Innov. Sci. Eng. Technol."},{"issue":"9","key":"51_CR8","first-page":"55","volume":"3","author":"MS Chang","year":"2016","unstructured":"Chang, M.S., Yen, C.P.: Twitter social network forensics on Windows 10. Int. J. Innov. Sci. Eng. Technol. 3(9), 55\u201360 (2016)","journal-title":"Int. J. Innov. Sci. Eng. Technol."},{"issue":"1","key":"51_CR9","first-page":"37","volume":"10","author":"A Majeed","year":"2017","unstructured":"Majeed, A., Saleem, S.: Forensics analysis of social media apps in Windows 10. NUST J. Eng. Sci. 10(1), 37\u201345 (2017)","journal-title":"NUST J. Eng. Sci."},{"issue":"2","key":"51_CR10","first-page":"1","volume":"4","author":"A Singh","year":"2016","unstructured":"Singh, A., Sharma, P., Sharma, S.: A novel memory forensics technique for Windows 10. J. Network Inf. Secur. 4(2), 1\u201310 (2016)","journal-title":"J. Network Inf. Secur."},{"issue":"3","key":"51_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0150300","volume":"11","author":"TY Yang","year":"2016","unstructured":"Yang, T.Y., Dehghantanha, A., Choo, K.K., Muda, Z.: Windows instant messaging app forensics: Facebook and Skype as case studies. PLoS ONE 11(3), 1\u201329 (2016)","journal-title":"PLoS ONE"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Yusoff, M.N., Dehghantanha, A., Mahmod, R.: Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies. In book: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Elsevier, pp. 41\u201362 (2016)","DOI":"10.1016\/B978-0-12-805303-4.00004-6"},{"key":"51_CR13","unstructured":"Bachler, M.: An Analysis of Smartphones Using Open Source Tools versus the Proprietary Tool Cellebrite UFED Touch. https:\/\/www.marshall.edu\/forensics\/files\/BACHLER_MARCIE_Research-Paper_Aug-5.pdf"},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Venkateswara, R.V., Chakravarthy, A.S.N.: Survey on android forensic tools and methodologies. Int. J. Comput. Appl. 154(8), 17\u201321 (2016)","DOI":"10.5120\/ijca2016912182"},{"issue":"2","key":"51_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.51983\/ajcst-2015.4.2.1758","volume":"4","author":"M Junaid","year":"2015","unstructured":"Junaid, M., Tewari, J.P., Kumar, R., Vaish, A.: Proposed methodology for smart phone forensic tool. Asian J. Comput. Sci. Technol. 4(2), 1\u20135 (2015)","journal-title":"Asian J. Comput. Sci. Technol."},{"key":"51_CR16","unstructured":"VMware Workstation Player 15. https:\/\/www.vmware.com"},{"key":"51_CR17","unstructured":"Redline. https:\/\/www.fireeye.com\/services\/freeware\/redline.html"},{"key":"51_CR18","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.cose.2012.09.011","volume":"32","author":"SL Garfinkel","year":"2013","unstructured":"Garfinkel, S.L.: Digital media triage with bulk data analysis and bulk_extractor. Comput. Secur. 32, 56\u201372 (2013)","journal-title":"Comput. Secur."},{"key":"51_CR19","unstructured":"Magnet RAM Capture. Acquiring Memory with Magnet RAM Capture. https:\/\/www.magnetforensics.com\/blog\/acquiring-memory-with-magnet-ram-capture\/"},{"key":"51_CR20","unstructured":"Twitter privacy policy. https:\/\/twitter.com\/en\/privacy"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:14:39Z","timestamp":1771658079000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_51","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}