{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:26:13Z","timestamp":1745321173058},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s11432-014-5069-9","type":"journal-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T05:50:00Z","timestamp":1394171400000},"page":"1-20","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Virtual vignettes: the acquisition, analysis, and presentation of social network data"],"prefix":"10.1007","volume":"57","author":[{"given":"Chris","family":"Howden","sequence":"first","affiliation":[]},{"given":"Lu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"ZhiYuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"JianXin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Antonopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,15]]},"reference":[{"key":"5069_CR1","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1300\/J079v16n01_10","volume":"16","author":"C L Streeter","year":"1993","unstructured":"Streeter C L, Gillespie D F. Social network analysis. J Social Service Res, 1993, 16: 201\u2013222","journal-title":"J Social Service Res"},{"key":"5069_CR2","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.ijinfomgt.2009.03.006","volume":"29","author":"Z Souza de","year":"2009","unstructured":"de Souza Z, Dick G N. Disclosure of information by children in social networking \u2014 not just a case of \u201cyou show me yours and I\u2019ll show you mine\u201d. Int J Inf Manage, 2009, 29: 255\u2013261","journal-title":"Int J Inf Manage"},{"key":"5069_CR3","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1016\/j.clsr.2010.07.006","volume":"26","author":"P Eecke van","year":"2010","unstructured":"van Eecke P, Truyens M. Privacy and social networks. Comput Law Secur Rev, 2010, 26: 535\u2013546","journal-title":"Comput Law Secur Rev"},{"key":"5069_CR4","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D M Boyd","year":"2007","unstructured":"Boyd D M, Ellison N B. Social network sites: definition, history, and scholarship. J Comput Mediated Commun, 2007, 13: 210\u2013230","journal-title":"J Comput Mediated Commun"},{"key":"5069_CR5","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A Acquisti","year":"2006","unstructured":"Acquisti A, Gross R. Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis G, Golle P, eds. Privacy Enhancing Technologies, 2006. 36\u201358"},{"key":"5069_CR6","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/1102199.1102214","volume-title":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society","author":"R Gross","year":"2005","unstructured":"Gross R, Acquisti A. Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. Now York: ACM, 2005. 71\u201380"},{"key":"5069_CR7","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1177\/016555150202800601","volume":"28","author":"E Otte","year":"2002","unstructured":"Otte E, Rousseau R. Social network analysis: a powerful strategy, also for the information sciences. J Inf Sci, 2002, 28: 441\u2013453","journal-title":"J Inf Sci"},{"key":"5069_CR8","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1198\/016214502388618906","volume":"97","author":"P D Hoff","year":"2002","unstructured":"Hoff P D, Raftery A E, Handcock M S. Latent space approaches to social network analysis. J Am Stat Assoc, 2002, 97: 1090\u20131098","journal-title":"J Am Stat Assoc"},{"key":"5069_CR9","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1126\/science.1165821","volume":"323","author":"S P Borgatti","year":"2009","unstructured":"Borgatti S P, Mehra A, Brass D J, et al. Network analysis in the social sciences. Science, 2009, 323: 892\u2013895","journal-title":"Science"},{"key":"5069_CR10","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1177\/000169939403700403","volume":"37","author":"M S Mizruchi","year":"1994","unstructured":"Mizruchi M S. Social network analysis: recent achievements and current controversies. Acta Sociologica, 1994, 37: 329\u2013343","journal-title":"Acta Sociologica"},{"key":"5069_CR11","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1145\/544741.544854","volume-title":"Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: part 1","author":"J Sabater","year":"2002","unstructured":"Sabater J, Sierra C. Reputation and social network analysis in multi-agent systems. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: part 1. New York: ACM, 2002. 475\u2013482"},{"key":"5069_CR12","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/ISDA.2011.6121636","volume-title":"Proceedings of 2011 11th International Conference on Intelligent Systems Design and Applications","author":"P Meo de","year":"2011","unstructured":"de Meo P, Ferrara E, Fiumara G, et al. Generalized louvain method for community detection in large networks. In: Proceedings of 2011 11th International Conference on Intelligent Systems Design and Applications. Piscataway: IEEE, 2011. 88\u201393"},{"key":"5069_CR13","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1177\/1745691612442904","volume":"7","author":"R E Wilson","year":"2012","unstructured":"Wilson R E, Gosling S D, Graham L T. A review of Facebook research in the social sciences. Perspect Psycholog Sci, 2012, 7: 203\u2013220","journal-title":"Perspect Psycholog Sci"},{"key":"5069_CR14","doi-asserted-by":"crossref","first-page":"507","DOI":"10.5465\/amr.1979.4498309","volume":"4","author":"N M Tichy","year":"1979","unstructured":"Tichy N M, Tushman M L, Fombrun C. Social network analysis for organizations. Acad Manage Rev, 1979, 4: 507\u2013519","journal-title":"Acad Manage Rev"},{"key":"5069_CR15","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1126\/science.1116869","volume":"311","author":"G Kossinets","year":"2006","unstructured":"Kossinets G, Watts D J. Empirical analysis of an evolving social network. Science, 2006, 311: 88\u201390","journal-title":"Science"},{"key":"5069_CR16","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-0-387-77650-7_11","volume-title":"Handbook of Quantitative Criminology","author":"J M McGloin","year":"2010","unstructured":"McGloin J M, Kirk D S. Social network analysis. In: Piquero A R, Weisburd D, eds. Handbook of Quantitative Criminology. New York: Springer, 2010. 209\u2013224"},{"key":"5069_CR17","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1177\/0022427888025004003","volume":"25","author":"B Leighton","year":"1988","unstructured":"Leighton B. The community concept in criminology: toward a social network approach. J Res Crime Delinquency, 1988, 25: 351\u2013374","journal-title":"J Res Crime Delinquency"},{"key":"5069_CR18","first-page":"81","volume-title":"Social Service Rev","author":"M Fraser","year":"1984","unstructured":"Fraser M, Hawkins J D. Social network analysis and drug misuse. Social Service Rev, 1984: 81\u201397"},{"key":"5069_CR19","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1353-4858(10)70115-X","volume":"2010","author":"M Taylor","year":"2010","unstructured":"Taylor M, Haggerty J, Gresty D, et al. Forensic investigation of peer-to-peer networks. Netw Secur, 2010, 2010: 12\u201315","journal-title":"Netw Secur"},{"key":"5069_CR20","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1038\/scientificamerican1210-80","volume":"303","author":"T Berners-Lee","year":"2010","unstructured":"Berners-Lee T. Long live the Web. Sci Am, 2010, 303: 80\u201385","journal-title":"Sci Am"},{"key":"5069_CR21","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/TSC.2011.39","volume":"5","author":"K Chard","year":"2012","unstructured":"Chard K, Bubendorfer K, Caton S, et al. Social cloud computing: a vision for socially motivated resource sharing. IEEE Trans Services Computing, 2012, 5: 551\u2013563","journal-title":"IEEE Trans Services Computing"},{"key":"5069_CR22","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1016\/j.chb.2010.11.020","volume":"27","author":"K F Hew","year":"2011","unstructured":"Hew K F. Students\u2019 and teachers\u2019 use of Facebook. Comput Human Behav, 2011, 27: 662\u2013676","journal-title":"Comput Human Behav"},{"key":"5069_CR23","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1089\/cpb.2008.0226","volume":"12","author":"E Chrisofides","year":"2009","unstructured":"Chrisofides E, Muise A, Desmaris S. Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? Cyber Psychol Behav, 2009, 12: 341\u2013345","journal-title":"Cyber Psychol Behav"},{"key":"5069_CR24","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MIC.2007.138","volume":"11","author":"J Breslin","year":"2007","unstructured":"Breslin J, Decker S. The future of social networks on the Internet: the need for semantics. Internet Comput, 2007, 11: 86\u201390","journal-title":"Internet Comput"},{"key":"5069_CR25","volume-title":"Code Version 2.0","author":"L Lessig","year":"2006","unstructured":"Lessig L. Code Version 2.0. New York: Basic Books, 2006"},{"key":"5069_CR26","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"L A Cutillo","year":"2009","unstructured":"Cutillo L A, Molva R, Strufe T. Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun Mag, 2009, 47: 94\u2013101","journal-title":"IEEE Commun Mag"},{"key":"5069_CR27","first-page":"14","volume":"56","author":"A Sigman","year":"2008","unstructured":"Sigman A. Well connected? The biological implications of \u2018social networking\u2019. Biologist, 2008, 56: 14\u201320","journal-title":"Biologist"},{"key":"5069_CR28","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/TrustCom.2012.83","volume-title":"Proceedings of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications","author":"F Ahmed","year":"2012","unstructured":"Ahmed F, Abulaish M. An MCL-based approach for spam profile detection in online social networks. In: Proceedings of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Piscataway: IEEE, 2012. 602\u2013608"},{"key":"5069_CR29","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1109\/PDCAT.2011.8","volume-title":"Proceedings of 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","author":"S Li","year":"2011","unstructured":"Li S, Yun X, Hao Z, et al. A propagation model for social engineering botnets in social networks. In: Proceedings of 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies. Piscataway: IEEE, 2011. 423\u2013426"},{"key":"5069_CR30","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1109\/PDGC.2012.6449865","volume-title":"Proceedings of 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing","author":"P Jagnere","year":"2012","unstructured":"Jagnere P. Vulnerabilities in social networking sites. In: Proceedings of 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing. Piscataway: IEEE, 2012. 463\u2013468"},{"key":"5069_CR31","first-page":"8","volume-title":"Proceedings of 2012 4th International Conference on Computational Aspects of Social Networks","author":"C Bernard","year":"2012","unstructured":"Bernard C, Debar H, Benayoune S. Cross-domain vulnerabilities over social networks. In: Proceedings of 2012 4th International Conference on Computational Aspects of Social Networks. Piscataway: IEEE, 2012. 8\u201313"},{"key":"5069_CR32","first-page":"295","volume-title":"Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops","author":"G Kontaxis","year":"2011","unstructured":"Kontaxis G, Polakis I, Ioannidis S, et al. Detecting social network profile cloning. In: Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway: IEEE, 2011. 295\u2013300"},{"key":"5069_CR33","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1109\/ICDM.2012.28","volume-title":"Proceedings of 2012 IEEE 12th International Conference on Data Mining","author":"X Zhang","year":"2012","unstructured":"Zhang X, Zhu S, Liang W. Detecting spam and promoting campaigns in the Twitter social network. In: Proceedings of 2012 IEEE 12th International Conference on Data Mining. Piscataway: IEEE, 2012. 1194\u20131199"},{"key":"5069_CR34","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1109\/SP.2009.22","volume-title":"Proceedings of 2009 30th IEEE Symposium on Security and Privacy","author":"A Narayanan","year":"2009","unstructured":"Narayanan A, Shmatikov V. De-anonymizing social networks. In: Proceedings of 2009 30th IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2009. 173\u2013187"},{"key":"5069_CR35","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1177\/0270467607311484","volume":"28","author":"Z Tufekci","year":"2008","unstructured":"Tufekci Z. Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc, 2008, 28: 20\u201336","journal-title":"Bull Sci Technol Soc"},{"key":"5069_CR36","volume-title":"Secur Focus","author":"S Granger","year":"2001","unstructured":"Granger S. Social engineering fundamentals, part I: hacker tactics. Secur Focus, 2001"},{"key":"5069_CR37","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/CSE.2009.205","volume-title":"Proceedings of 2009 International Conference on Computational Science and Engineering (Volume 3)","author":"M Huber","year":"2009","unstructured":"Huber M, Kowalski S, Nohlberg M, et al. Towards automating social engineering using social networking sites. In: Proceedings of 2009 International Conference on Computational Science and Engineering (Volume 3). Piscataway: IEEE, 2009. 117\u2013124"},{"key":"5069_CR38","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-540-85886-7_10","volume-title":"Information Security","author":"E Athanasopoulos","year":"2008","unstructured":"Athanasopoulos E, Makridakis A, Antonatos S, et al. Antisocial networks: turning a social network into a botnet. In: Wu T C, Lei C L, Rijmen V, et al, eds. Information Security. Berlin: Springer, 2008. 146\u2013160"},{"key":"5069_CR39","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.ijinfomgt.2009.03.007","volume":"29","author":"S Weiss","year":"2009","unstructured":"Weiss S. Privacy threat model for data portability in social network applications. Int J Inf Manag, 2009, 29: 249\u2013254","journal-title":"Int J Inf Manag"},{"key":"5069_CR40","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.clsr.2010.09.002","volume":"26","author":"S Kierkegaard","year":"2010","unstructured":"Kierkegaard S. Twitter thou doeth? Comput Law Secur Rev, 2010, 26: 577\u2013594","journal-title":"Comput Law Secur Rev"},{"key":"5069_CR41","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-1-4419-6967-5_8","volume-title":"Economics of Information Security and Privacy","author":"J Bonneau","year":"2010","unstructured":"Bonneau J, Preibusch S. The privacy jungle: On the market for data protection in social networks. In: Moore T, Pym D, Ioannidis C, eds. Economics of Information Security and Privacy. Berlin: Springer, 2010. 121\u2013167"},{"key":"5069_CR42","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.chb.2009.11.012","volume":"26","author":"A Nosko","year":"2010","unstructured":"Nosko A, Wood E, Molema S. All about me: disclosure in online social networking profiles: the case of Facebook. Comput Human Behav, 2010, 26: 406\u2013418","journal-title":"Comput Human Behav"},{"key":"5069_CR43","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1093\/idpl\/ipq003","volume":"1","author":"O Tene","year":"2011","unstructured":"Tene O. Privacy: the new generations. Int Data Privacy Law, 2011, 1: 15\u201327","journal-title":"Int Data Privacy Law"},{"key":"5069_CR44","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1109\/MINES.2011.77","volume-title":"Proceedings of 2011 3rd International Conference on Multimedia Information Networking and Security","author":"J Lee","year":"2011","unstructured":"Lee J, Hong D. Pervasive Forensic Analysis Based on Mobile Cloud Computing. In: Proceedings of 2011 3rd International Conference on Multimedia Information Networking and Security. Piscataway: IEEE, 2011. 572\u2013576"},{"key":"5069_CR45","first-page":"43","volume-title":"Proceedings of 2007 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering","author":"M M Pollitt","year":"2007","unstructured":"Pollitt M M. An ad hoc review of digital forensic models. In: Proceedings of 2007 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering. Piscataway: IEEE, 2007. 43\u201354"},{"key":"5069_CR46","first-page":"17","volume":"3","author":"Y Yusoff","year":"2011","unstructured":"Yusoff Y, Ismail R, Hassan Z. Common phases of computer forensics investigation models. Int J Adv Comput Sci Inf Technol, 2011, 3: 17\u201331","journal-title":"Int J Adv Comput Sci Inf Technol"},{"key":"5069_CR47","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.diin.2006.06.004","volume":"3","author":"R S C Ieong","year":"2006","unstructured":"Ieong R S C. FORZA \u2014 digital forensics investigation framework that incorporate legal issues. Digital Invest, 2006, 3: 29\u201336","journal-title":"Digital Invest"},{"key":"5069_CR48","volume-title":"Proceedings of 8th Annual IFIP WG 11. 9 International Conference on Digital Forensics, Pretoria","author":"M Mulazzani","year":"2012","unstructured":"Mulazzani M, Huber M, Weippl E R. Social network forensics: tapping the data pool of social networks. In: Proceedings of 8th Annual IFIP WG 11. 9 International Conference on Digital Forensics, Pretoria, 2012"},{"key":"5069_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ICITST.2009.5402561","volume-title":"Proceedings of 2009 International Conference for Internet Technology and Secured Transactions","author":"S Biggs","year":"2009","unstructured":"Biggs S, Vidalis S. Cloud computing: the impact on digital forensic investigations. In: Proceedings of 2009 International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE, 2009. 1\u20136"},{"key":"5069_CR50","first-page":"487","volume-title":"Proceedings of the National Information Systems Security Conference, Baltimore","author":"M Pollitt","year":"1995","unstructured":"Pollitt M. Computer forensics: an approach to evidence in cyberspace. In: Proceedings of the National Information Systems Security Conference, Baltimore, 1995. 487\u2013491"},{"key":"5069_CR51","volume-title":"Good Practice Guide for Computer-Based Electronic Evidence","author":"ACPO.","year":"2007","unstructured":"ACPO. Good Practice Guide for Computer-Based Electronic Evidence, 2007"},{"key":"5069_CR52","volume-title":"Proceedings of 13th INTERPOL Forensic Science Symposium, Lyon","author":"M M Pollitt","year":"2001","unstructured":"Pollitt M M. Report on digital evidence. In: Proceedings of 13th INTERPOL Forensic Science Symposium, Lyon, 2001"},{"key":"5069_CR53","first-page":"1","volume-title":"Proceedings of 2010 International Conference for Internet Technology and Secured Transactions","author":"D Reilly","year":"2010","unstructured":"Reilly D, Wren C, Berry T. Cloud computing: forensic challenges for law enforcement. In: Proceedings of 2010 International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE, 2010. 1\u20137"},{"key":"5069_CR54","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, et al. A view of cloud computing. Commun ACM, 2010, 53: 50\u201358","journal-title":"Commun ACM"},{"key":"5069_CR55","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MIC.2010.113","volume":"14","author":"G Pallis","year":"2010","unstructured":"Pallis G. Cloud computing: the new frontier of internet computing. IEEE Internet Comput, 2010, 14: 70\u201373","journal-title":"IEEE Internet Comput"},{"key":"5069_CR56","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-145","volume-title":"The NIST definition of cloud computing","author":"P Mell","year":"2011","unstructured":"Mell P, Grance T. The NIST definition of cloud computing. NIST Special Publication 800-145. 2011"},{"key":"5069_CR57","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MIC.2009.103","volume":"13","author":"M D Dikaiakos","year":"2009","unstructured":"Dikaiakos M D, Katsaros D, Mehra P, et al. Cloud computing: distributed internet computing for IT and scientific research. IEEE Internet Comput, 2009, 13: 10\u201313","journal-title":"IEEE Internet Comput"},{"key":"5069_CR58","first-page":"612","volume-title":"Proceedings of 2011 International Conference on Image Analysis and Signal Processing","author":"C Yan","year":"2011","unstructured":"Yan C. Cybercrime forensic system in cloud computing. In: Proceedings of 2011 International Conference on Image Analysis and Signal Processing. Piscataway: IEEE, 2011. 612\u2013615"},{"key":"5069_CR59","first-page":"1","volume-title":"Proceedings of 2011 IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering","author":"D Birk","year":"2011","unstructured":"Birk D, Wegener C. Technical issues of forensic investigations in cloud computing environments. In: Proceedings of 2011 IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering. Piscataway: IEEE, 2011. 1\u201310"},{"key":"5069_CR60","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.diin.2012.07.001","volume":"9","author":"B Martini","year":"2012","unstructured":"Martini B, Choo K K R. An integrated conceptual digital forensic framework for cloud computing. Digital Invest, 2012, 9: 71\u201380","journal-title":"Digital Invest"},{"key":"5069_CR61","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/ISDEA.2012.29","volume-title":"Proceedings of 2013 3rd International Conference on Intelligent System Design and Engineering Applications","author":"T Sang","year":"2013","unstructured":"Sang T. A Log Based Approach to Make Digital Forensics Easier on Cloud Computing. In: Proceedings of 2013 3rd International Conference on Intelligent System Design and Engineering Applications. Piscataway: IEEE, 2013. 91\u201394"},{"key":"5069_CR62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/SADFE.2011.17","volume-title":"Proceedings of 2011 IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering","author":"D Birk","year":"2011","unstructured":"Birk D, Wegener C. Technical issues of forensic investigations in cloud computing environments. In: Proceedings of 2011 IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering. Piscataway: IEEE, 2011. 1\u201310"},{"key":"5069_CR63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISSA.2012.6320451","volume-title":"Proceedings of 2012 Information Security for South Africa Conference","author":"G Sibiya","year":"2012","unstructured":"Sibiya G, Venter H S, Ngobeni S, et al. Guidelines for procedures of a harmonised digital forensic process in network forensics. In: Proceedings of 2012 Information Security for South Africa Conference. Piscataway: IEEE, 2012: 1\u20137"},{"key":"5069_CR64","first-page":"617","volume-title":"Proceedings of 2012 International Conference on Advances in Engineering, Science and Management","author":"H Sharma","year":"2012","unstructured":"Sharma H, Sabharwal N. Investigating the implications of virtual forensics. In: Proceedings of 2012 International Conference on Advances in Engineering, Science and Management. Piscataway: IEEE, 2012. 617\u2013620"},{"key":"5069_CR65","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/COMPSACW.2012.44","volume-title":"Proceedings of 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops","author":"S Thorpe","year":"2012","unstructured":"Thorpe S, Ray I, Grandison T, et al. Cloud log forensics metadata analysis. In: Proceedings of 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops. Piscataway: IEEE, 2012. 194\u2013199"},{"key":"5069_CR66","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/ASONAM.2011.79","volume-title":"Proceedings of 2011 International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung","author":"B W Yang","year":"2011","unstructured":"Yang B W, Tsai W C, Chen A P, et al. Cloud computing architecture for social comuting \u2014 a comparison study of Facebook and Google. In: Proceedings of 2011 International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, 2011. 741\u2013745"},{"key":"5069_CR67","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1109\/IIHMSP.2011.28","volume-title":"Proceedings of 2011 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing","author":"S Hou","year":"2011","unstructured":"Hou S, Uehara T, Yiu S M, et al. Privacy preserving confidential forensic investigation for shared or remote servers. In: Proceedings of 2011 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE, 2011. 378\u2013383"},{"key":"5069_CR68","first-page":"66","volume-title":"Proceedings of the 4th International Conference on Forensic Computer Science, Natal","author":"A M G Paula de","year":"2009","unstructured":"de Paula A M G. Security aspects and future trends of social networks. In: Proceedings of the 4th International Conference on Forensic Computer Science, Natal, 2009. 66\u201374"},{"key":"5069_CR69","first-page":"21","volume-title":"Proceedings of the 11th Annual Conference on the Convergence of Telecommunications","author":"N M Zainudin","year":"2010","unstructured":"Zainudin N M, Merabti M, Llewellyn-Jones D. A digital forensic investigation model for online social networking. In: Proceedings of the 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting, Liverpool, 2010. 21\u201322"},{"key":"5069_CR70","first-page":"A4.1","volume-title":"Proceedings of Student-Faculty Research Day","author":"J Cheng","year":"2009","unstructured":"Cheng J, Hoffman J, Lamarche T, et al. Forensics tools for social network security solutions. In: Proceedings of Student-Faculty Research Day. New York: Pace University, 2009. A4.1\u2013A4.8"},{"key":"5069_CR71","doi-asserted-by":"crossref","first-page":"S64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"S L Garfinkel","year":"2010","unstructured":"Garfinkel S L. Digital forensics research: the next 10 years. Digital Invest, 2010, 7: S64\u2013S73","journal-title":"Digital Invest"},{"key":"5069_CR72","doi-asserted-by":"crossref","first-page":"1368","DOI":"10.1109\/JSAC.2011.110804","volume":"29","author":"H C Chu","year":"2011","unstructured":"Chu H C, Deng D J, Park J H. Live data mining concerning social networking forensics based on a Facebook session through aggregation of social data. IEEE J Sel Areas Commun, 2011, 29: 1368\u20131376","journal-title":"IEEE J Sel Areas Commun"},{"key":"5069_CR73","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/ARES.2010.73","volume-title":"Proceedings of 2010 International Conference on Availability, Reliability, and Security","author":"M Simon","year":"2010","unstructured":"Simon M, Slay J. Recovery of skype application activity data from physical memory. In: Proceedings of 2010 International Conference on Availability, Reliability, and Security. Piscataway: IEEE, 2010. 283\u2013288"},{"key":"5069_CR74","first-page":"33","volume-title":"Proceedings of the 10th Australian Digital Forensics Conference, Perth","author":"B Cusack","year":"2012","unstructured":"Cusack B, Son J. Evidence examination tools for social networks. In: Proceedings of the 10th Australian Digital Forensics Conference, Perth, 2012. 33\u201340"},{"key":"5069_CR75","first-page":"771","volume-title":"Proceedings of 2011 International Conference for Internet Technology and Secured Transactions","author":"N Mutawa Al","year":"2011","unstructured":"Al Mutawa N, Al Awadhi I, Baggili I, et al. Forensic artifacts of Facebook\u2019s instant messaging service. In: Proceedings of 2011 International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE, 2011. 771\u2013776"},{"key":"5069_CR76","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/INCoS.2011.17","volume-title":"Proceedings of 2011 3rd International Conference on Intelligent Networking and Collaborative Systems","author":"A Castiglione","year":"2011","unstructured":"Castiglione A, Cattaneo G, de Santis A. A forensic analysis of images on online social networks. In: Proceedings of 2011 3rd International Conference on Intelligent Networking and Collaborative Systems. Piscataway: IEEE, 2011. 679\u2013684"},{"key":"5069_CR77","first-page":"1","volume-title":"Proceedings of 2011 International Conference on Research and Innovation in Information Systems","author":"N M Zainudin","year":"2011","unstructured":"Zainudin N M, Merabti M, Llewellyn-Jones D. Online social networks as supporting evidence: a digital forensic investigation model and its application design. In: Proceedings of 2011 International Conference on Research and Innovation in Information Systems. Piscataway: IEEE, 2011. 1\u20136"},{"key":"5069_CR78","doi-asserted-by":"crossref","first-page":"45","DOI":"10.7815\/ijorcs.24.2012.039","volume":"2","author":"M R Burde","year":"2012","unstructured":"Burde M R, Khan M T. Tracebility in digital forensic investigation process. Int J Adv Res Comput Sci Softw Eng, 2012, 2: 45\u201347","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"5069_CR79","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jdcf.2011070101","volume":"3","author":"J Haggerty","year":"2011","unstructured":"Haggerty J, Karran A J, Lamb D J, et al. A framework for the forensic investigation of unstructured email relationship data. Int J Digital Crime Forensics, 2011, 3: 1\u201318","journal-title":"Int J Digital Crime Forensics"},{"key":"5069_CR80","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.diin.2006.06.012","volume":"3","author":"V Roussev","year":"2006","unstructured":"Roussev V, Chen Y, Bourg T, et al. Forensic filesystem hashing revisited. Digital Invest, 2006, 3: 82\u201390","journal-title":"Digital Invest"},{"key":"5069_CR81","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2009.40","volume":"7","author":"V Roussev","year":"2009","unstructured":"Roussev V. Hashing and data fingerprinting in digital forensics. IEEE Secur Privacy, 2009, 7: 49\u201355","journal-title":"IEEE Secur Privacy"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5069-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-014-5069-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-014-5069-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T06:17:01Z","timestamp":1565245021000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-014-5069-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":81,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["5069"],"URL":"https:\/\/doi.org\/10.1007\/s11432-014-5069-9","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2]]}}}