{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T22:44:12Z","timestamp":1649198652830},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,2,18]],"date-time":"2014-02-18T00:00:00Z","timestamp":1392681600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s12083-014-0250-x","type":"journal-article","created":{"date-parts":[[2014,2,17]],"date-time":"2014-02-17T15:54:15Z","timestamp":1392652455000},"page":"911-924","source":"Crossref","is-referenced-by-count":1,"title":["A granular approach for user-centric network analysis to identify digital evidence"],"prefix":"10.1007","volume":"8","author":[{"given":"Muhammad","family":"Yasin","sequence":"first","affiliation":[]},{"given":"Junaid Ahmad","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Firdous","family":"Kausar","sequence":"additional","affiliation":[]},{"given":"Jongsung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jungtaek","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,18]]},"reference":[{"key":"250_CR1","unstructured":"WebWatcher. http:\/\/www.webwatchernow.com\/Record-Instant-Messages.html"},{"key":"250_CR2","unstructured":"Spector Pro. http:\/\/www.spectorsoft.com\/products\/SpectorPro_Windows\/"},{"key":"250_CR3","unstructured":"Chat Watch. http:\/\/download.cnet.com\/Chat-Watch\/3000-2150_4-27839.html"},{"key":"250_CR4","doi-asserted-by":"crossref","unstructured":"Hui SC, Yulan H, Haichao D (2008) Text mining for chat message analysis. IEEE Conf Cybern Intell Syst","DOI":"10.1109\/ICCIS.2008.4670827"},{"key":"250_CR5","unstructured":"Resig J, Ankur T (2004) A framework for mining instant messaging services. Workshop on Link Analysis, Counter-Terrorism & Privacy, SIAM DM"},{"key":"250_CR6","unstructured":"Resig J, Dawara S, Homan CM, Teredesai A (2004) Extracting social networks from instant messaging populations. In: the Proceeding of the 7th ACM SIGKDD Workshop on Link KDD"},{"key":"250_CR7","doi-asserted-by":"crossref","unstructured":"Jamali M, Abolhhassani H (2006) Different aspects of social network analysis. In the Proceedings of the 2006 I.E. WIC ACM Int. Conf. on Web Intelligence","DOI":"10.1109\/WI.2006.61"},{"key":"250_CR8","unstructured":"Resig J, Teredesai A (2004) A framework for mining instant messaging services. In: the Proceedings of the SIAM DM Conference"},{"key":"250_CR9","unstructured":"Access Data, \u201cRegistry quick find chart\u201d. http:\/\/accessdata.com\/downloads\/media\/Registry%20Quick%20Find%20Chart%20%207-22-08.pdf"},{"issue":"2","key":"250_CR10","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.diin.2006.04.002","volume":"3","author":"D Mike","year":"2006","unstructured":"Mike D (2006) An examination into MSN Messenger 7.5 contact identification. Digit Investig 3(2):79\u201383","journal-title":"Digit Investig"},{"issue":"2","key":"250_CR11","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.diin.2007.06.019","volume":"4","author":"SD Wouter","year":"2007","unstructured":"Wouter SD (2007) Forensic artefacts left by Windows Live Messenger 8.0. Digit Investig 4(2):73\u201387","journal-title":"Digit Investig"},{"key":"250_CR12","unstructured":"Parsonage H (2008) The forensic recovery of instant messages from MSN messenger and Windows Live Messenger. http:\/\/computerforensics.parsonage.co.uk\/downloads\/MSNandLiveMessenger-ArtefactsOfConversations.pdf"},{"key":"250_CR13","doi-asserted-by":"crossref","unstructured":"Yang Y et al (2010) Forensic analysis of popular Chinese internet applications. In: the Proceedings of IFIP Int. Conf. Digital Forensics, 285\u2013295","DOI":"10.1007\/978-3-642-15506-2_20"},{"key":"250_CR14","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of 'small-world' networks. Nature 393:440\u2013442","journal-title":"Nature"},{"key":"250_CR15","unstructured":"Barmpoutis D, Murray RM (2010) \u201cNetworks with the smallest average distance and the largest average clustering\u201d, arXiv, q-bio. MN"},{"key":"250_CR16","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis. Cambridge University Press, Cambridge"},{"key":"250_CR17","volume-title":"Social network analysis: a handbook","author":"J Scott","year":"2000","unstructured":"Scott J (2000) Social network analysis: a handbook, 2nd edn. Sage Publications, London","edition":"2"},{"key":"250_CR18","doi-asserted-by":"crossref","unstructured":"Zaphiris P, Pfeil U (2007) Introduction to social network analysis. In: the proceedings of the 21st BCS HCI Group Conference, Volume 2, 3\u20137 Sept","DOI":"10.14236\/ewic\/HCI2007.89"},{"key":"250_CR19","unstructured":"Goos G, Hartmanis J et al (1973) Network analysis methodological foundations, Lecture Notes in Computer Science, Commenced Publication"},{"key":"250_CR20","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1038\/35065725","volume":"410","author":"SH Strogatz","year":"2001","unstructured":"Strogatz SH (2001) Exploring complex networks. Nature (London) 410:268\u2013276","journal-title":"Nature (London)"},{"key":"250_CR21","unstructured":"Krebs V (2002) Mapping networks of terrorist cells"},{"key":"250_CR22","unstructured":"Fu D, Remolina E, Eilbert J (2003) A CBR approach to asymmetric plan detection. In: the Proceedings of Workshop on Link Analysis for Detecting Complex Behavior, Washington, DC"},{"key":"250_CR23","doi-asserted-by":"crossref","unstructured":"Thilagam PS (2010) Applications of social network analysis. In: Handbook of social network technologies and applications, Springer, 637\u2013649","DOI":"10.1007\/978-1-4419-7142-5_29"},{"key":"250_CR24","doi-asserted-by":"crossref","unstructured":"Jamali M, Abolhassani H (2006) Different aspects of social network analysis. In: the proceedings of IEEE\/WIC\/ACM conference on Web Intelligence","DOI":"10.1109\/WI.2006.61"},{"key":"250_CR25","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1080\/0022250X.2001.9990249","volume":"25","author":"U Brandes","year":"2001","unstructured":"Brandes U (2001) A faster algorithm for betweenness centrality. Journal of Mathematical Sociology 25:163\u2013177","journal-title":"Journal of Mathematical Sociology"},{"key":"250_CR26","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1978","unstructured":"Freeman LC (1978) Centrality in social networks: conceptual clarification. Soc Networks 1:215\u2013239","journal-title":"Soc Networks"},{"key":"250_CR27","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.socnet.2010.03.006","volume":"32","author":"T Opsahl","year":"2010","unstructured":"Opsahl T, Agneessens F, Skvoretz J (2010) Node centrality in weighted networks: generalizing degree and shortest paths. Soc Networks 32:245\u2013251","journal-title":"Soc Networks"},{"key":"250_CR28","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, New York"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0250-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0250-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0250-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T12:30:17Z","timestamp":1597494617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0250-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,18]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["250"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0250-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,18]]}}}