{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:00:00Z","timestamp":1743080400554,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_36","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"404-414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Extensible Platform for the Forensic Analysis of Social Media Data"],"prefix":"10.1007","author":[{"given":"Huw","family":"Read","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Xynos","sequence":"additional","affiliation":[]},{"given":"Iain","family":"Sutherland","sequence":"additional","affiliation":[]},{"given":"Frode","family":"Roarson","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Andriotis","sequence":"additional","affiliation":[]},{"given":"George","family":"Oikonomou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"36_CR1","unstructured":"Samsung Galaxy S5. \n                      http:\/\/www.samsung.com\/global\/microsite\/galaxys5\/features.html"},{"key":"36_CR2","unstructured":"Cellebrite: Cellebrite\u2019 s outlook for the mobile forensics industry 2014. White Paper (2014). \n                      http:\/\/www.cellebrite.com\/collateral\/OUTLOOK_FOR_THE_MOBILE_FORENSICS_INDUSTRY_2014_WP.pdf"},{"key":"36_CR3","doi-asserted-by":"publisher","unstructured":"Catanese S.A., Fiumara, G.: A visual tool for forensic analysis of mobile phone traffic. In: Proceedings of the 2nd ACM workshop on Multimedia in Forensics, Security And Intelligence, pp. 71\u201376 (2010). ISBN:978-1-4503-0157-2, doi:\n                      10.1145\/1877972.1877992\n                      \n                    , \n                      http:\/\/dl.acm.org\/citation.cfm?id=1877992","DOI":"10.1145\/1877972.1877992"},{"issue":"5","key":"36_CR4","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1109\/TVCG.2006.122","volume":"12","author":"A Perer","year":"2006","unstructured":"Perer, A., Shneiderman, B.: Balancing systematic and flexible, exploration of social networks. IEEE Trans. Visual. Comput. Graphics 12(5), 693\u2013700 (2006). \n                      http:\/\/hcil2.cs.umd.edu\/trs\/2006-25\/2006-25.pdf","journal-title":"IEEE Trans. Visual. Comput. Graphics"},{"key":"36_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.4018\/ijdcf.2013100103","volume":"5","author":"P Andriotis","year":"2013","unstructured":"Andriotis, P., Tzermias, Z., Mparmpaki, A., Ioannidis, S., Oikonomou, G.: Multilevel visualization using enhanced social network analysis with smartphone data. Int. J. Digit. Crime Forensics 5, 34\u201354 (2013)","journal-title":"Int. J. Digit. Crime Forensics"},{"key":"36_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/978-3-319-08593-7_17","volume-title":"Trust and Trustworthy Computing","author":"P Andriotis","year":"2014","unstructured":"Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., Read, H., Prevelakis, V.: On the development of automated forensic analysis methods for mobile devices. In: Holz, T., Ioannidis, S. (eds.) Trust 2014. LNCS, vol. 8564, pp. 212\u2013213. Springer, Heidelberg (2014)"},{"key":"36_CR7","unstructured":"Garfinkel, S.L.: Forensics Visualizations with Open Source Tools (2013). \n                      http:\/\/simson.net\/ref\/2013\/2013-11-05_VizSec.pdf"},{"key":"36_CR8","first-page":"465","volume":"14","author":"JG Browning","year":"2010","unstructured":"Browning, J.G.: Digging for the digital dirt: discovery and use of evidence from social media sites. SMU Sci Tech L Rev. 14, 465 (2010). \n                      http:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/comlrtj14&div=26&id=&page=","journal-title":"SMU Sci Tech L Rev."},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. In: Proceedings of the 2012 Digital Forensic Research Workshop. \n                      http:\/\/www.dfrws.org\/2012\/proceedings\/DFRWS2012-3.pdf","DOI":"10.1016\/j.diin.2012.05.007"},{"key":"36_CR10","doi-asserted-by":"publisher","unstructured":"Smith, M. A., Shneiderman, B., Milic-Frayling, N., Mendes Rodrigues, E., Barash, V., Dunne, C., Capone, T., Perer, A., Gleave, E.: Analyzing (social media) networks with NodeXL. In: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 255\u2013264, New York, NY, USA (2009). ISBN:978-1-60558-713-4, doi:\n                      10.1145\/1556460.1556497\n                      \n                    , \n                      http:\/\/hcil2.cs.umd.edu\/trs\/2009-11\/2009-11.pdf","DOI":"10.1145\/1556460.1556497"},{"key":"36_CR11","unstructured":"Afentis Facebook Forensics Tool. \n                      http:\/\/www.facebookforensics.com\/features.html"},{"issue":"4","key":"36_CR12","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(06)70332-3","volume":"2006","author":"D Forte","year":"2006","unstructured":"Forte, D., Power, R.: Electronic discovery: digital forensics and beyond. Comput. Fraud Secur. 2006(4), 8\u201310 (2006)","journal-title":"Comput. Fraud Secur."},{"key":"36_CR13","unstructured":"Ringtail E-discovery Tool. \n                      http:\/\/www.ftitechnology.com\/Products-Services\/Software-and-Services\/Ringtail\/Ringtail.aspx"},{"key":"36_CR14","unstructured":"Attenex E-Discovery Software. \n                      http:\/\/www.ftitechnology.com\/Products-Services\/Software-and-Services\/Attenex.aspx"},{"key":"36_CR15","unstructured":"Xera I-conect. \n                      http:\/\/www.iconect.com\/"},{"key":"36_CR16","unstructured":"AccessData Mobile Phone Examiner. \n                      http:\/\/www.accessdata.com\/solutions\/digital-forensics\/mobile-phone-examiner"},{"key":"36_CR17","unstructured":"AccessData, Mobile Device data Visualization with MPE+ (2012). \n                      https:\/\/www.youtube.com\/watch?v=bjcLDjju-kU"},{"key":"36_CR18","unstructured":"Micro Systemation, XAMN (2014). \n                      https:\/\/www.msab.com\/xry\/xamn"},{"key":"36_CR19","unstructured":"Cellebrite, UFED Link Analysis (2014). \n                      http:\/\/www.cellebrite.com\/mobile-forensics\/products\/applications\/ufed-link-analysis"},{"key":"36_CR20","unstructured":"Oxygen Forensics, Social Graph Tool (2014). \n                      http:\/\/www.oxygen-forensic.com\/en\/features\/analyst\/social-graph"},{"key":"36_CR21","unstructured":"ViaForensics, Aflogical OSE (2014). \n                      https:\/\/viaforensics.com\/resources\/tools\/android-forensics-tool\/#aflogical-ose"},{"key":"36_CR22","unstructured":"Ztedd, Whatsapp Xtract: Backup messages extractor (2012). \n                      http:\/\/forum.xda-developers.com\/showthread.php?t=1583021"},{"key":"36_CR23","unstructured":"Garronski, N.: Skype Xtrator v.0.1.8.8 (2014). \n                      http:\/\/www.skypextractor.com\/"},{"key":"36_CR24","unstructured":"Forensics WIKI: Graph and (Social) Network Visualization (2013). \n                      http:\/\/www.forensicswiki.org\/wiki\/Tools:Visualization#Graph_and_.28Social.29_Network_Visualization"},{"key":"36_CR25","unstructured":"Mulazzani, M., Huber, M., Weippl, E.R.: Social Network forensics: tapping the data pool of social networks. In: Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics (2012). \n                      https:\/\/www.sba-research.org\/wp-content\/uploads\/publications\/socialForensics_preprint.pdf"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:19:13Z","timestamp":1583507953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}