{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:34:24Z","timestamp":1775745264409,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T00:00:00Z","timestamp":1458518400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10586-016-0553-1","type":"journal-article","created":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T07:59:25Z","timestamp":1458547165000},"page":"723-740","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":100,"title":["Big forensic data reduction: digital forensic images and electronic evidence"],"prefix":"10.1007","volume":"19","author":[{"given":"Darren","family":"Quick","sequence":"first","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,21]]},"reference":[{"key":"553_CR1","unstructured":"Gartner. IT Glossary: Big Data. http:\/\/www.gartner.com\/it-glossary\/big-data\/ (2013). Accessed 21 July 2013"},{"key":"553_CR2","doi-asserted-by":"crossref","first-page":"S64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"S Garfinkel","year":"2010","unstructured":"Garfinkel, S.: Digital forensics research: the next 10 years. Digit. Investig. 7, S64\u2013S73 (2010)","journal-title":"Digit. Investig."},{"issue":"1","key":"553_CR3","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s40012-012-0008-7","volume":"1","author":"S Raghavan","year":"2013","unstructured":"Raghavan, S.: Digital forensic research: current state of the art. CSI Trans. ICT 1(1), 91\u2013114 (2013)","journal-title":"CSI Trans. ICT"},{"key":"553_CR4","unstructured":"FBI_RCFL: FBI Regional Computer Forensic Laboratory Annual Reports 2003\u20132012. 2003\u20132012; http:\/\/www.rcfl.gov\/downloads"},{"key":"553_CR5","unstructured":"Australia, C.o., National plan to combat cybercrime, A.C. Commission, Editor 2013: Canberra"},{"key":"553_CR6","unstructured":"Palmer, G.: A road map for digital forensic research. Report from the First Digital Forensic Research Workshop (DFRWS) (2001)"},{"key":"553_CR7","doi-asserted-by":"crossref","unstructured":"Richard, G., Roussev, V.: Digital Forensics Tools: The Next Generation. Digital Crime and Forensic Science in Cyberspace, p. 75, 2006","DOI":"10.4018\/978-1-59140-872-7.ch004"},{"key":"553_CR8","doi-asserted-by":"crossref","unstructured":"Beebe, N.: Digital Forensic Research: The Good, the Bad and the Unaddressed. Advances in Digital Forensics, pp. 17\u201336. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-04155-6_2"},{"issue":"2","key":"553_CR9","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.diin.2005.02.001","volume":"2","author":"E Kenneally","year":"2005","unstructured":"Kenneally, E., Brown, C.: Risk sensitive digital evidence collection. Digit. Investig. 2(2), 101\u2013119 (2005)","journal-title":"Digit. Investig."},{"issue":"4","key":"553_CR10","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/1655737.1655740","volume":"13","author":"L Greiner","year":"2009","unstructured":"Greiner, L.: Sniper Forensics. netWorker 13(4), 8\u201310 (2009)","journal-title":"netWorker"},{"key":"553_CR11","first-page":"3","volume-title":"Advances in Digital Forensics","author":"N Beebe","year":"2005","unstructured":"Beebe, N., Clark, J.: Dealing with terabyte data sets in digital investigations. Advances in Digital Forensics, pp. 3\u201316. Springer, Berlin (2005)"},{"key":"553_CR12","unstructured":"Alzaabi, M., Jones, A., Martin, T.A.: An Ontology-Based Forensic Analysis Tool. Journal of Digital Forensics, Security & Law, 2013. In: 2013 Conference Supplement, pp. 121\u2013135"},{"key":"553_CR13","doi-asserted-by":"crossref","first-page":"S54","DOI":"10.1016\/j.diin.2014.03.007","volume":"11","author":"RB Baar van","year":"2014","unstructured":"van Baar, R.B., van Beek, H.M.A., van Eijk, E.J.: Digital forensics as a service: a game changer. Digit. Investig. 11, S54\u2013S62 (2014)","journal-title":"Digit. Investig."},{"issue":"6","key":"553_CR14","doi-asserted-by":"crossref","first-page":"1353","DOI":"10.1111\/j.1556-4029.2009.01150.x","volume":"54","author":"E Casey","year":"2009","unstructured":"Casey, E., Ferraro, M., Nguyen, L.: Investigation delayed is justice denied: proposals for expediting forensic examinations of digital evidence. J. Forensic Sci. 54(6), 1353\u20131364 (2009)","journal-title":"J. Forensic Sci."},{"issue":"2","key":"553_CR15","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.diin.2013.07.002","volume":"10","author":"E Casey","year":"2013","unstructured":"Casey, E., Katz, G., Lewthwaite, J.: Honing digital forensic processes. Digit. Investig. 10(2), 138\u2013147 (2013)","journal-title":"Digit. Investig."},{"key":"553_CR16","doi-asserted-by":"crossref","first-page":"S45","DOI":"10.1016\/j.diin.2014.03.006","volume":"11","author":"T Vidas","year":"2014","unstructured":"Vidas, T., Kaplan, B., Geiger, M.: OpenLV: empowering investigators and first-responders in the digital forensics process. Digit. Investig. 11, S45\u2013S53 (2014)","journal-title":"Digit. Investig."},{"issue":"1","key":"553_CR17","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.diin.2014.02.001","volume":"11","author":"GE Noel","year":"2014","unstructured":"Noel, G.E., Peterson, G.L.: Applicability of latent Dirichlet allocation to multi-disk search. Digit. Investig. 11(1), 43\u201356 (2014)","journal-title":"Digit. Investig."},{"key":"553_CR18","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.future.2014.04.002","volume":"43","author":"Z Xu","year":"2015","unstructured":"Xu, Z., et al.: Knowle: a semantic link network based system for organizing large scale online news events. Future Gener. Comput. Syst. 43, 40\u201350 (2015)","journal-title":"Future Gener. Comput. Syst."},{"key":"553_CR19","unstructured":"Xu, Z., et al.: Crowdsourcing based social media data analysis of urban emergency events. In: Multimedia Tools and Applications, pp. 1\u201318, 2015"},{"key":"553_CR20","doi-asserted-by":"crossref","unstructured":"Xu, Z., et al.: Crowdsourcing based description of urban emergency events using social media big data. In: IEEE Transactions on Cloud Computing, PP(99): pp. 1\u20131, 2016","DOI":"10.1109\/TCC.2016.2517638"},{"key":"553_CR21","doi-asserted-by":"crossref","unstructured":"Brown, R., Pham, B., de Vel, O.: Design of a digital forensics image mining system. In: Knowledge-Based Intelligent Information and Engineering Systems, pp. 395\u2013404, 2005","DOI":"10.1007\/11553939_57"},{"issue":"2","key":"553_CR22","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.diin.2013.01.002","volume":"10","author":"MM Pollitt","year":"2013","unstructured":"Pollitt, M.M.: Triage: a practical solution or admission of failure. Digit. Investig. 10(2), 87\u201388 (2013)","journal-title":"Digit. Investig."},{"issue":"1","key":"553_CR23","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.diin.2004.01.004","volume":"1","author":"MM Ferraro","year":"2004","unstructured":"Ferraro, M.M., Russell, A.: Current issues confronting well-established computer-assisted child exploitation and computer crime task forces. Digit. Investig. 1(1), 7\u201315 (2004)","journal-title":"Digit. Investig."},{"issue":"1","key":"553_CR24","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.diin.2007.01.002","volume":"4","author":"P Turner","year":"2007","unstructured":"Turner, P.: Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags. Digit. Investig. 4(1), 30\u201335 (2007)","journal-title":"Digit. Investig."},{"key":"553_CR25","unstructured":"Parsonage, H.: Computer Forensics Case Assessment and Triage\u2014some ideas for discussion, 2009. http:\/\/computerforensics.parsonage.co.uk\/triage\/triage.htm . Accessed 4 Aug 2013"},{"issue":"2","key":"553_CR26","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.diin.2013.04.002","volume":"10","author":"S Shiaeles","year":"2013","unstructured":"Shiaeles, S., Chryssanthou, A., Katos, V.: On-scene triage open source forensic tool chests: are they effective? Digit. Investig. 10(2), 99\u2013115 (2013)","journal-title":"Digit. Investig."},{"key":"553_CR27","unstructured":"Roussev, V., Richard, G.: Breaking the performance wall: The case for distributed digital forensics, 2004. In: Proceedings of the 2004 Digital Forensics Research Workshop, Vol. 94"},{"key":"553_CR28","doi-asserted-by":"crossref","first-page":"S91","DOI":"10.1016\/j.diin.2008.05.006","volume":"5","author":"J Lee","year":"2008","unstructured":"Lee, J., Un, S., Hong, D.: High-speed search using Tarari content processor in digital forensics. Digit. Investig. 5, S91\u2013S95 (2008)","journal-title":"Digit. Investig."},{"key":"553_CR29","unstructured":"Pringle, N., Sutherland, I.: Is a Computational Grid a Suitable Platform for High Performance Digital Forensics? In: Proceedings of the 7th European Conference on Information Warfare and Security 2008, Academic Conferences Limited, p. 175"},{"issue":"1","key":"553_CR30","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.diin.2005.01.005","volume":"2","author":"A Sheldon","year":"2005","unstructured":"Sheldon, A.: The future of forensic computing. Digit. Investig. 2(1), 31\u201335 (2005)","journal-title":"Digit. Investig."},{"key":"553_CR31","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.diin.2006.06.016","volume":"3","author":"W Alink","year":"2006","unstructured":"Alink, W., et al.: XIRAF\u2014XML-based indexing and querying for digital forensics. Digit. Investig. 3, 50\u201358 (2006)","journal-title":"Digit. Investig."},{"issue":"2","key":"553_CR32","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.diin.2012.10.001","volume":"9","author":"RAF Bhoedjang","year":"2012","unstructured":"Bhoedjang, R.A.F., et al.: Engineering an online computer forensic service. Digit. Investig. 9(2), 96\u2013108 (2012)","journal-title":"Digit. Investig."},{"issue":"2","key":"553_CR33","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.forsciint.2004.12.028","volume":"156","author":"O Ribaux","year":"2006","unstructured":"Ribaux, O., Walsh, S.J., Margot, P.: The contribution of forensic science to crime analysis and investigation: forensic intelligence. Forensic Sci. Int. 156(2), 171\u2013181 (2006)","journal-title":"Forensic Sci. Int."},{"key":"553_CR34","doi-asserted-by":"crossref","DOI":"10.1002\/9781118029145","volume-title":"Data Mining: Concepts, Models, Methods, and Algorithms","author":"M Kantardzic","year":"2011","unstructured":"Kantardzic, M.: Data Mining: Concepts, Models, Methods, and Algorithms. Wiley, New York (2011)"},{"key":"553_CR35","volume-title":"Data Preparation for Data Mining","author":"D Pyle","year":"1999","unstructured":"Pyle, D.: Data Preparation for Data Mining, vol. 1. Morgan Kaufmann, Burlington (1999)"},{"key":"553_CR36","unstructured":"Fayyad, U., Piatetsky-Shapiro, G.: Knowledge discovery and data mining: towards a unifying framework. In: KDD, pp. 82\u201388, 1996"},{"issue":"4","key":"553_CR37","first-page":"151","volume":"2","author":"M Shannon","year":"2004","unstructured":"Shannon, M.: Forensic relative strength scoring: ASCII and entropy scoring. Int. J. Digit. Evid. 2(4), 151\u2013169 (2004)","journal-title":"Int. J. Digit. Evid."},{"key":"553_CR38","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.knosys.2014.10.004","volume":"79","author":"L Wang","year":"2015","unstructured":"Wang, L., et al.: Particle swarm optimization based dictionary learning for remote sensing big data. Knowl. Based Syst. 79, 43\u201350 (2015)","journal-title":"Knowl. Based Syst."},{"issue":"4","key":"553_CR39","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MCSE.2014.52","volume":"16","author":"L Wang","year":"2014","unstructured":"Wang, L., et al.: IK-SVD: dictionary learning for spatial big data via incremental atom update. Comput. Sci. Eng. 16(4), 41\u201352 (2014)","journal-title":"Comput. Sci. Eng."},{"key":"553_CR40","unstructured":"Ma, Y., et al.: Towards building a data-intensive index for big data computing\u2014a case study of remote sensing data processing. In: Information Sciences, 2014"},{"key":"553_CR41","unstructured":"St\u00fcttgen, J.: Selective imaging: creating efficient forensic images by selecting content first. Mannheim University, 2011"},{"key":"553_CR42","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.diin.2006.06.007","volume":"3","author":"SL Garfinkel","year":"2006","unstructured":"Garfinkel, S.L.: Forensic feature extraction and cross-drive analysis. Digit. Investig. 3, 71\u201381 (2006)","journal-title":"Digit. Investig."},{"issue":"2","key":"553_CR43","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.diin.2013.04.003","volume":"10","author":"A Shaw","year":"2013","unstructured":"Shaw, A., Browne, A.: A practical and robust approach to coping with large volumes of data submitted for digital forensic examination. Digit. Investig. 10(2), 116\u2013128 (2013)","journal-title":"Digit. Investig."},{"issue":"14","key":"553_CR44","doi-asserted-by":"crossref","first-page":"S34","DOI":"10.1016\/j.diin.2015.05.006","volume":"2015","author":"J Grier","year":"2015","unstructured":"Grier, J., Richard III, G.G.: Rapid forensic acquisition of large media with sifting collectors. Digit. Investig. 2015(14), S34\u2013S44 (2015)","journal-title":"Digit. Investig."},{"key":"553_CR45","unstructured":"Quick, D., Choo, K.-K.R.: Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive. Trends Issues Crime Crim. Justice 480, 1\u201311 (2014)"},{"key":"553_CR46","unstructured":"ISO\/IEC, 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence, in Information technology\u2014Security techniques. ISO, Geneva (2012)"},{"key":"553_CR47","unstructured":"ACPO: Good Practice Guidelines for Computer Based Evidence v4.0. 2006. www.7safe.com\/electronic_evidence . Accessed 5 Mar 2014"},{"key":"553_CR48","unstructured":"NIJ: Forensic Examination of Digital Evidence: A Guide for Law Enforcement, 2004. http:\/\/nij.gov\/nij\/pubs-sum\/199408.htm"},{"key":"553_CR49","unstructured":"Alqahtany, S., et al.: A forensic acquisition and analysis system for IaaS. In: Cluster Computing, pp. 1\u201315, 2015"},{"issue":"3","key":"553_CR50","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TETC.2014.2316525","volume":"2","author":"C Hu","year":"2014","unstructured":"Hu, C., et al.: Semantic link network-based model for organizing multimedia big data. IEEE Trans. Emerg. Top. Comput. 2(3), 376\u2013387 (2014)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"553_CR51","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.jss.2014.07.024","volume":"102","author":"Z Xu","year":"2015","unstructured":"Xu, Z., et al.: Semantic based representing and organizing surveillance big data using video structural description technology. J. Syst. Softw. 102, 217\u2013225 (2015)","journal-title":"J. Syst. Softw."},{"issue":"6","key":"553_CR52","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1007\/s11704-015-3482-x","volume":"9","author":"C Hu","year":"2015","unstructured":"Hu, C., et al.: Video structural description technology for the new generation video surveillance systems. Front. Comput. Sci. 9(6), 980\u2013989 (2015)","journal-title":"Front. Comput. Sci."},{"key":"553_CR53","unstructured":"Xu, Z., et al.: Semantic enhanced cloud environment for surveillance data management using video structural description. In: Computing, pp. 1\u201320, 2014"},{"key":"553_CR54","doi-asserted-by":"crossref","unstructured":"Alhussein, M.: Automatic facial emotion recognition using weber local descriptor for e-Healthcare system. In: Cluster Computing, pp. 1\u201310, 2016","DOI":"10.1007\/s10586-016-0535-3"},{"key":"553_CR55","doi-asserted-by":"crossref","first-page":"S99","DOI":"10.1016\/j.diin.2012.05.011","volume":"9","author":"B Jones","year":"2012","unstructured":"Jones, B., Pleno, S., Wilkinson, M.: The use of random sampling in investigations involving child abuse material. Digit. Investig. 9, S99\u2013S107 (2012)","journal-title":"Digit. Investig."},{"key":"553_CR56","doi-asserted-by":"crossref","first-page":"S2","DOI":"10.1016\/j.diin.2009.06.016","volume":"6","author":"S Garfinkel","year":"2009","unstructured":"Garfinkel, S., et al.: Bringing science to digital forensics with standardized forensic corpora. Digit. Investig. 6, S2\u2013S11 (2009)","journal-title":"Digit. Investig."},{"issue":"1\u20133","key":"553_CR57","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.forsciint.2009.10.027","volume":"195","author":"O Ribaux","year":"2010","unstructured":"Ribaux, O., et al.: Intelligence-led crime scene processing. Part I: Forensic intelligence. Forensic Sci. Int. 195(1\u20133), 10\u201316 (2010)","journal-title":"Forensic Sci. Int."},{"issue":"3","key":"553_CR58","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/TASE.2010.2094608","volume":"8","author":"X Luo","year":"2011","unstructured":"Luo, X., et al.: Building association link network for semantic link on web resources. IEEE Trans. Autom. Sci. Eng. 8(3), 482\u2013494 (2011)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"2","key":"553_CR59","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1002\/cpe.2999","volume":"26","author":"Z Xu","year":"2014","unstructured":"Xu, Z., et al.: Measuring the semantic discrimination capability of association relations. Concurr. Comput. 26(2), 380\u2013395 (2014)","journal-title":"Concurr. Comput."},{"key":"553_CR60","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2014.04.002","volume":"43","author":"Z Xu","year":"2014","unstructured":"Xu, Z., et al.: Generating temporal semantic context of concepts using web search engines. J. Netw. Comput. Appl. 43, 42\u201355 (2014)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"553_CR61","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/TFUZZ.2015.2390226","volume":"23","author":"X Wei","year":"2015","unstructured":"Wei, X., et al.: Online comment-based hotel quality automatic assessment using improved fuzzy comprehensive evaluation and fuzzy cognitive map. IEEE Trans. Fuzzy Syst. 23(1), 72\u201384 (2015)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"553_CR62","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1016\/j.future.2013.09.027","volume":"37","author":"Z Xu","year":"2014","unstructured":"Xu, Z., et al.: Mining temporal explicit and implicit semantic relations between entities using web search engines. Future Gener. Comput. Syst. 37, 468\u2013477 (2014)","journal-title":"Future Gener. Comput. Syst."},{"key":"553_CR63","unstructured":"Xuan, J., et al.: Uncertainty analysis for the keyword system of web events, 2015"},{"key":"553_CR64","unstructured":"Zhao, L., et al.: Geographical information system parallelization for spatial big data processing: a review. In: Cluster Computing, pp. 1\u201314, 2015"},{"issue":"1","key":"553_CR65","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s10586-014-0403-y","volume":"18","author":"DS Punithavathani","year":"2015","unstructured":"Punithavathani, D.S., Sujatha, K., Jain, J.M.: Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Clust. Comput. 18(1), 435\u2013451 (2015)","journal-title":"Clust. Comput."},{"key":"553_CR66","unstructured":"Ghaleb, T.A.: Techniques and countermeasures of website\/wireless traffic analysis and fingerprinting. In: Cluster Computing, pp. 1\u201312, 2015"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-016-0553-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0553-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0553-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0553-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T19:49:46Z","timestamp":1567712986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-016-0553-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,21]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["553"],"URL":"https:\/\/doi.org\/10.1007\/s10586-016-0553-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,21]]}}}