{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T11:25:53Z","timestamp":1743161153100,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T00:00:00Z","timestamp":1653350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T00:00:00Z","timestamp":1653350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Hochschule Mittweida, University of Applied Sciences"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["K\u00fcnstl Intell"],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Mobile communication devices are a popular means of planning, commissioning and carrying out criminal offenses. In particular, data from messengers such as WhatsApp or Telegram often contain conclusive information. Organized crime also usually involves many devices, but not all of them contain the full history of communication. Rather, it is heavily fragmented due to individual deletions of messages or different joining times to groups. A singular evaluation of individual devices is therefore often not expedient, since important relationships cannot be recognized. Furthermore, communication is often distributed across different channels and modalities and can only be fully and correctly understood through a joint semantic analysis. The linking of related communications of different devices enables an almost complete reconstruction of the communication with a simultaneous reduction in reading effort by merging identical messages. Grouping coherent messages into conversations enables efficient comparison with a knowledge model. Building such a model is complex, but can be supported by a term recommender system. In this paper, MoNA is presented as a platform that implements these approaches and enables an assisted analysis of mobile communications.<\/jats:p>","DOI":"10.1007\/s13218-022-00762-w","type":"journal-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T09:02:31Z","timestamp":1653382951000},"page":"163-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["MoNA: A Forensic Analysis Platform for Mobile Communication"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6780-0841","authenticated-orcid":false,"given":"Michael","family":"Spranger","sequence":"first","affiliation":[]},{"given":"Jian","family":"Xi","sequence":"additional","affiliation":[]},{"given":"Lukas","family":"Jaeckel","sequence":"additional","affiliation":[]},{"given":"Jenny","family":"Felser","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Labudde","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,24]]},"reference":[{"issue":"3","key":"762_CR1","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.diin.2014.04.003","volume":"11","author":"C Anglano","year":"2014","unstructured":"Anglano C (2014) Forensic analysis of whatsapp messenger on android smartphones. Digit Investig 11(3):201\u2013213. https:\/\/doi.org\/10.1016\/j.diin.2014.04.003","journal-title":"Digit Investig"},{"key":"762_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.diin.2017.09.002","volume":"23","author":"C Anglano","year":"2017","unstructured":"Anglano C, Canonico M, Guazzone M (2017) Forensic analysis of Telegram Messenger on Android smartphones. Digit Investig 23:31\u201349. https:\/\/doi.org\/10.1016\/j.diin.2017.09.002","journal-title":"Digit Investig"},{"key":"762_CR3","unstructured":"Baevski A, Zhou Y, Mohamed A, Auli M (2020) wav2vec 2.0 A framework for self-supervised learning of speech representations. In:\u00a0Larochelle H, Ranzato M, Hadsell R, Balcan M, Lin H (eds) Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS, pp 6\u201312"},{"key":"762_CR4","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3:993\u20131022","journal-title":"J Mach Learn Res"},{"key":"762_CR5","first-page":"828","volume":"22","author":"M Chang","year":"2020","unstructured":"Chang M, Yen CP (2020) Evidence gathering of facebook messenger on android. Int J Netw Secur 22:828\u2013837","journal-title":"Int J Netw Secur"},{"key":"762_CR6","doi-asserted-by":"crossref","unstructured":"Griffiths T, Steyvers M (2002) A probabilistic approach to semantic representation. In: Proceedings of the 24th Annual Conference of the Cognitive Science Society, pp 381\u2013386","DOI":"10.4324\/9781315782379-102"},{"key":"762_CR7","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.114.2.211","author":"TL Griffiths","year":"2007","unstructured":"Griffiths TL, Steyvers M, Tenenbaum JB (2007) Topics in semantic representation. Psychol Rev. https:\/\/doi.org\/10.1037\/0033-295X.114.2.211","journal-title":"Psychol Rev"},{"key":"762_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/su11164393","author":"B Hay Mele","year":"2019","unstructured":"Hay Mele B, Russo L, D\u2019Alelio D (2019) Combining marine ecology and economy to roadmap the integrated coastal management: a systematic literature review. Sustainability. https:\/\/doi.org\/10.3390\/su11164393","journal-title":"Sustainability"},{"key":"762_CR9","doi-asserted-by":"crossref","unstructured":"Iashin V, Rahtu E (2020) Multi-modal dense video captioning. CoRR abs\/2003.07758","DOI":"10.1109\/CVPRW50498.2020.00487"},{"key":"762_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00779-011-0428-7","volume":"16","author":"S Jeon","year":"2012","unstructured":"Jeon S, Bang J, Byun K, Lee S (2012) A recovery method of deleted record for sqlite database. Pers Ubiquitous Comput 16:1\u20139. https:\/\/doi.org\/10.1007\/s00779-011-0428-7","journal-title":"Pers Ubiquitous Comput"},{"key":"762_CR11","doi-asserted-by":"crossref","unstructured":"Karpathy A, Fei-Fei L (2015) Deep visual-semantic alignments for generating image descriptions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition(CVPR), pp 3128\u20133137","DOI":"10.1109\/CVPR.2015.7298932"},{"key":"762_CR12","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-319-59608-2_31","volume-title":"Security and privacy in communication networks","author":"Y Liu","year":"2017","unstructured":"Liu Y, Xu M, Xu J, Zheng N, Lin X (2017) Sqlite forensic analysis based on wal. In: Deng R, Weng J, Ren K, Yegneswaran V (eds) Security and privacy in communication networks. Springer International Publishing, Cham, pp 557\u2013574"},{"key":"762_CR13","doi-asserted-by":"crossref","unstructured":"Otto C, Springstein M, Anand A, Ewerth R (2019) Understanding, categorizing and predicting semantic image-text relations. In: Proceedings of the 2019 International Conference on Multimedia Retrieval, pp 168\u2013176","DOI":"10.1145\/3323873.3325049"},{"key":"762_CR14","unstructured":"Pawlaszczyk D (2021) Forensic SQLite data recovery tool. https:\/\/www.staff.hs-mittweida.de\/~pawlaszc\/fqlite\/. Accessed 11 May 2022"},{"key":"762_CR15","first-page":"5","volume":"5","author":"D Pawlaszczyk","year":"2021","unstructured":"Pawlaszczyk D, Hummert C (2021) Making the invisible visible - techniques for recovering deleted sqlite data records. Int J Cyber Forensics Adv Threat Investig 5:5","journal-title":"Int J Cyber Forensics Adv Threat Investig"},{"issue":"1&2","key":"762_CR16","first-page":"14","volume":"9","author":"M Spranger","year":"2016","unstructured":"Spranger M, Heinke F, Appelt L, Puder M, Labudde D (2016) MoNA: automated identification of evidence in forensic short messages. Int J Adv Secur 9(1&2):14\u201324","journal-title":"Int J Adv Secur"},{"key":"762_CR17","first-page":"1","volume-title":"Proceedings International Conference on Advances in Information Mining and Management (IMMM)","author":"M Spranger","year":"2014","unstructured":"Spranger M, Labudde D (2014) Semantic tools for forensics: towards finding evidence in short messages. In: Schmidt A, Yarali A (eds) Proceedings International Conference on Advances in Information Mining and Management (IMMM). IARIA, Paris, France, pp 1\u20134"},{"key":"762_CR18","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-662-53801-2_6","volume-title":"Forensik in der digitalen Welt","author":"M Spranger","year":"2017","unstructured":"Spranger M, Labudde D (2017) Textforensik. In: Labudde D, Spranger M (eds) Forensik in der digitalen Welt. Springer Spektrum Akademischer Verlag, Amsterdam, pp 167\u2013198. https:\/\/doi.org\/10.1007\/978-3-662-53801-2_6"},{"key":"762_CR19","unstructured":"Tenzer F (2021) Anzahl der Smartphone-Nutzer in Deutschland bis 2020. https:\/\/de.statista.com\/statistik\/daten\/studie\/198959\/umfrage\/anzahl-der-smartphonenutzer-in-deutschland-seit-2010\/. Accessed 11 May 2022"},{"key":"762_CR20","doi-asserted-by":"publisher","first-page":"32","DOI":"10.29042\/2020-10-4-32-38","volume":"10","author":"MA Thebaity","year":"2020","unstructured":"Thebaity MA, Mishra S, Shukla MK (2020) Forensic analysis of third-party mobile application. HELIX 10:32\u201338. https:\/\/doi.org\/10.29042\/2020-10-4-32-38","journal-title":"HELIX"},{"key":"762_CR21","first-page":"74","volume-title":"Proceedings international conference on data analytics","author":"J Xi","year":"2021","unstructured":"Xi J, Spranger M, Labudde D (2021) A concept for a comprehensive understanding of communication in mobile forensics. In: Bhulai S, Semanjski I,  Sztandera I (eds) Proceedings international conference on data analytics. IARIA, Barcelona, Spain, pp 74\u201376"},{"key":"762_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.330","author":"D Xu","year":"2017","unstructured":"Xu D, Zhu Y, Choy CB, Fei-Fei L (2017) Scene graph generation by iterative message passing. IEEE Conf Comput Vis Pattern Recogn (CVPR). https:\/\/doi.org\/10.1109\/CVPR.2017.330","journal-title":"IEEE Conf Comput Vis Pattern Recogn (CVPR)"},{"key":"762_CR23","doi-asserted-by":"crossref","unstructured":"Zhai X, Kolesnikov A, Houlsby N, Beyer L (2021) Scaling vision transformers. CoRR abs\/2106.04560","DOI":"10.1109\/CVPR52688.2022.01179"}],"container-title":["KI - K\u00fcnstliche Intelligenz"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13218-022-00762-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13218-022-00762-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13218-022-00762-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T08:30:33Z","timestamp":1670833833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13218-022-00762-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,24]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["762"],"URL":"https:\/\/doi.org\/10.1007\/s13218-022-00762-w","relation":{},"ISSN":["0933-1875","1610-1987"],"issn-type":[{"type":"print","value":"0933-1875"},{"type":"electronic","value":"1610-1987"}],"subject":[],"published":{"date-parts":[[2022,5,24]]},"assertion":[{"value":"27 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}