{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:18:59Z","timestamp":1760955539386},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,3,14]],"date-time":"2015-03-14T00:00:00Z","timestamp":1426291200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Vis"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s12650-015-0276-z","type":"journal-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T11:22:15Z","timestamp":1426245735000},"page":"173-184","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A semantic-enhanced trajectory visual analytics for digital forensic"],"prefix":"10.1007","volume":"18","author":[{"given":"Zhi-fang","family":"Liao","sequence":"first","affiliation":[]},{"given":"Yong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanni","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Fang-fang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhi-ning","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Sandra","family":"Dudley","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Ghavami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,14]]},"reference":[{"key":"276_CR1","doi-asserted-by":"crossref","unstructured":"Andrienko G, Andrienko N (2008) Spatio-temporal aggregation for visual analysis of movements[C]. In: Visual Analytics Science and Technology, VAST\u201908. IEEE Symposium, pp 51\u201358","DOI":"10.1109\/VAST.2008.4677356"},{"key":"276_CR2","doi-asserted-by":"crossref","unstructured":"Andrienko N, Andrienko G, Fuchs G (2013) Towards privacy-preserving semantic mobility analysis[C]. In: EuroVis workshop on visual analytics. The Eurographics Association, pp 19\u201323","DOI":"10.1007\/978-3-642-37583-5"},{"key":"276_CR3","doi-asserted-by":"crossref","unstructured":"Aravecchia M, Calderara S, Chiossi S, Cucchiara R (2010) A videosurveillance data browsing software architecture for forensics: from trajectories similarities to video fragments[C]. In: Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence. ACM, pp 37\u201342","DOI":"10.1145\/1877972.1877984"},{"issue":"2","key":"276_CR4","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.diin.2005.04.002","volume":"2","author":"NL Beebe","year":"2005","unstructured":"Beebe NL, Clark JG (2005) A hierarchical, objectives-based framework for the digital investigations process[J]. Digit Inv 2(2):147\u2013167","journal-title":"Digit Inv"},{"key":"276_CR5","unstructured":"Boyandin I, Bertini E, Lalanne D (2010) Using flow maps to explore migrations over time[C]. In: Geospatial Visual Analytics Workshop in conjunction with the 13th AGILE International Conference on Geographic Information Science. vol. 2, no. 3"},{"issue":"2","key":"276_CR6","first-page":"1","volume":"2","author":"B Carrier","year":"2003","unstructured":"Carrier B, Spafford EH (2003) Getting physical with the digital investigation process[J]. Int J Digit Evid 2(2):1\u201320","journal-title":"Int J Digit Evid"},{"key":"276_CR7","unstructured":"Casey E (2011) Digital evidence and computer crime: forensic science, computers and the internet[M]. Academic press"},{"key":"276_CR8","doi-asserted-by":"crossref","unstructured":"Chainey S, Ratcliffe J (2005) GIS and crime mapping[M]. Wiley","DOI":"10.1002\/9781118685181"},{"issue":"5","key":"276_CR9","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.cose.2008.12.003","volume":"28","author":"H Choi","year":"2009","unstructured":"Choi H, Lee H, Kim H (2009) Fast detection and visualization of network attacks on parallel coordinates[J]. Comput Secur 28(5):276\u2013288","journal-title":"Comput Secur"},{"key":"276_CR10","unstructured":"Ester M, Kriegel H P, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Kdd (vol. 96). pp 226\u2013231"},{"key":"276_CR11","doi-asserted-by":"crossref","first-page":"S64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"Simson L Garfinkel","year":"2010","unstructured":"Garfinkel Simson L (2010) Digital forensics research: the next 10\u00a0years[J]. Digit Inv 7:S64\u2013S73","journal-title":"Digit Inv"},{"key":"276_CR12","unstructured":"Guidance Software. EnCase Forensics\u2014Computer Forensics Data Col-lection for Digital Evidence Examiners[EB\/OL] (2014) http:\/\/www.guidancesoftware.com\/encase-forensic.htm . Accessed on October"},{"key":"276_CR13","doi-asserted-by":"crossref","unstructured":"Guo H, Wang Z, Yu B, Zhao H, Yuan X (2011) TripVista: triple perspective visual trajectory analytics and its application on microscopic traffic data at a road intersection[C]. In: Pacific Visualization Symposium (PacificVis), IEEE, pp 163\u2013170","DOI":"10.1109\/PACIFICVIS.2011.5742386"},{"key":"276_CR14","unstructured":"Heim K (2014) Visualization and modeling for crime data indexed by road segments[D]. George Mason University"},{"issue":"2","key":"276_CR15","first-page":"32","volume":"8","author":"E Huebner","year":"2007","unstructured":"Huebner E, Bem D, Bem O (2007) Computer forensics\u2013past, present and future[J]. Inform Secur Tech Rep 8(2):32\u201346","journal-title":"Inform Secur Tech Rep"},{"issue":"2","key":"276_CR16","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1057\/palgrave.ivs.9500097","volume":"4","author":"T Kapler","year":"2005","unstructured":"Kapler T, Wright W (2005) GeoTime information visualization[J]. Inform Vis 4(2):136\u2013146","journal-title":"Inform Vis"},{"key":"276_CR17","doi-asserted-by":"crossref","unstructured":"Kr\u00fcger R, Thom D, W\u00f6rner M, Bosch H, Ertl T (2013) Trajectory lenses\u2013a set-based filtering and exploration technique for long-term Trajectory Data[C]. In: Computer Graphics Forum vol. 32, no. 3pt4). Blackwell Publishing Ltd, pp 451\u2013460","DOI":"10.1111\/cgf.12132"},{"key":"276_CR18","doi-asserted-by":"crossref","unstructured":"Kr\u00fcger R, Thom D, Ertl T (2014) Visual analysis of movement behavior using web data for context enrichment. In: Pacific Visualization Symposium (PacificVis). IEEE, pp 193\u2013200","DOI":"10.1109\/PacificVis.2014.57"},{"key":"276_CR19","doi-asserted-by":"crossref","first-page":"S76","DOI":"10.1016\/j.diin.2014.05.008","volume":"11","author":"A Lang","year":"2014","unstructured":"Lang A, Bashir M, Campbell R, DeStefano L (2014) Developing a new digital forensics curriculum[J]. Digit Inv 11:S76\u2013S84","journal-title":"Digit Inv"},{"key":"276_CR20","doi-asserted-by":"crossref","unstructured":"Lee J G, Han J, Li X (2008) Trajectory outlier detection: a partition-and-detect framework[C]. In: Data Engineering, ICDE. IEEE 24th International Conference, pp 140\u2013149","DOI":"10.1109\/ICDE.2008.4497422"},{"key":"276_CR21","doi-asserted-by":"crossref","unstructured":"Liao Z, Yu Y, Chen B (2010) Anomaly detection in GPS data based on visual analytics[C]. In: Visual Analytics Science and Technology (VAST), IEEE Symposium, pp 51\u201358","DOI":"10.1109\/VAST.2010.5652467"},{"key":"276_CR22","doi-asserted-by":"crossref","unstructured":"Malik A, Maciejewski R, Collins TF, Ebert DS (2010) Visual analytics law enforcement toolkit. In: Technologies for Homeland Security (HST). IEEE International Conference, pp 222\u2013228","DOI":"10.1109\/THS.2010.5655057"},{"key":"276_CR23","doi-asserted-by":"crossref","unstructured":"Mburu L, Helbich M (2014) Evaluating the accuracy and effectiveness of criminal geographic profiling methods: the case of dandora, Kenya[J]. The Professional Geographer","DOI":"10.1080\/00330124.2014.886921"},{"issue":"4","key":"276_CR24","first-page":"1","volume":"2","author":"MG Noblett","year":"2000","unstructured":"Noblett MG, Pollitt MM, Presley LA (2000) Recovering and examining computer forensic evidence[J]. Forensic Sci Commun 2(4):1\u201313","journal-title":"Forensic Sci Commun"},{"key":"276_CR25","doi-asserted-by":"crossref","unstructured":"Pasquale L, Yu Y, Salehie M, Cavallaro L, Tun TT, Nuseibeh B (2013) Requirements-driven adaptive digital forensics[C]. In: Requirements Engineering Conference (RE), 21st IEEE International. IEEE, pp 340\u2013341","DOI":"10.1109\/RE.2013.6636745"},{"key":"276_CR26","unstructured":"Pirolli P, Card S (2005) The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis[C]. In: Proceedings of International Conference on Intelligence Analysis (vol. 5). pp 2\u20134"},{"key":"276_CR27","doi-asserted-by":"crossref","unstructured":"Pollitt M (2010) A history of digital forensics[M]. In: Advances in Digital Forensics VI. Springer, Berlin, pp 3\u201315","DOI":"10.1007\/978-3-642-15506-2_1"},{"issue":"3","key":"276_CR28","first-page":"1","volume":"1","author":"M Reith","year":"2002","unstructured":"Reith M, Carr C, Gunsch G (2002) An examination of digital forensic models[J]. Int J Digit Evid 1(3):1\u201312","journal-title":"Int J Digit Evid"},{"key":"276_CR29","doi-asserted-by":"crossref","unstructured":"Scheepens R, Willems N, van de Wetering H, van Wijk JJ (2011) Interactive visualization of multivariate trajectory data with density maps[C]. In: Pacific Visualization Symposium (PacificVis). IEEE, pp 147\u2013154","DOI":"10.1109\/PACIFICVIS.2011.5742384"},{"issue":"1","key":"276_CR30","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1057\/ivs.2008.29","volume":"8","author":"T Schreck","year":"2009","unstructured":"Schreck T, Bernard J, Von Landesberger T, Kohlhammer J (2009) Visual cluster analysis of trajectory data with interactive kohonen maps[J]. Inform Vis 8(1):14\u201329","journal-title":"Inform Vis"},{"issue":"8","key":"276_CR31","doi-asserted-by":"crossref","first-page":"1313","DOI":"10.1109\/TVCG.2011.144","volume":"18","author":"H Shiravi","year":"2012","unstructured":"Shiravi H, Shiravi A, Ghorbani AA (2012) A survey of visualization systems for network security[J]. Vis Comput Gr IEEE Trans 18(8):1313\u20131329","journal-title":"Vis Comput Gr IEEE Trans"},{"key":"276_CR32","doi-asserted-by":"crossref","unstructured":"Song X, Zhang Q, Sekimoto Y, Horanont T, Ueyama S, Shibasaki R (2013) Modeling and probabilistic reasoning of population evacuation during large-scale disaster[C]. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge discovery and data mining. ACM, pp 1231\u20131239","DOI":"10.1145\/2487575.2488189"},{"key":"276_CR33","doi-asserted-by":"crossref","unstructured":"Song X, Zhang Q, Sekimoto Y, Shibasaki R (2014) Prediction of human emergency behavior and their mobility following large-scale disaster[C]. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge discovery and data mining. ACM, pp 5\u201314","DOI":"10.1145\/2623330.2623628"},{"issue":"12","key":"276_CR34","doi-asserted-by":"crossref","first-page":"2565","DOI":"10.1109\/TVCG.2012.265","volume":"18","author":"C Tominski","year":"2012","unstructured":"Tominski C, Schumann H, Andrienko G, Andrienko N (2012) Stacking-based visualization of trajectory attribute data[J]. Vis Comput Gr IEEE Trans 18(12):2565\u20132574","journal-title":"Vis Comput Gr IEEE Trans"},{"key":"276_CR35","unstructured":"VAST Challenge Homepage [EB\/OL] (2014) http:\/\/vacommunity.org\/VAST+Challenge+2014 . Accessed on October"},{"issue":"12","key":"276_CR36","doi-asserted-by":"crossref","first-page":"2159","DOI":"10.1109\/TVCG.2013.228","volume":"19","author":"Z Wang","year":"2013","unstructured":"Wang Z, Lu M, Yuan X, Zhang J, Wetering HVD (2013) Visual traffic jam analysis based on trajectory data[J]. Vis Comput Gr IEEE Trans 19(12):2159\u20132168","journal-title":"Vis Comput Gr IEEE Trans"},{"key":"276_CR37","unstructured":"X-Ways Software for Forensics, Data Recovery and ITSecurity X-Ways Software Technology AG [EB\/OL] (2014) http:\/\/www.winhex.com\/ . Accessed on October"},{"issue":"3","key":"276_CR38","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s12650-014-0213-6","volume":"17","author":"Y Zhao","year":"2014","unstructured":"Zhao Y, Liang X, Fan X, Wang Y, Yang M, Zhou F (2014) MVSec: multi-perspective and deductive visual analytics on heterogeneous network security data[J]. J Vis 17(3):181\u2013196","journal-title":"J Vis"}],"container-title":["Journal of Visualization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-015-0276-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12650-015-0276-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-015-0276-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T19:51:25Z","timestamp":1566417085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12650-015-0276-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,14]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["276"],"URL":"https:\/\/doi.org\/10.1007\/s12650-015-0276-z","relation":{},"ISSN":["1343-8875","1875-8975"],"issn-type":[{"value":"1343-8875","type":"print"},{"value":"1875-8975","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,14]]}}}