{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:50:32Z","timestamp":1729666232831,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275710","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"814-817","source":"Crossref","is-referenced-by-count":5,"title":["Email forensic analysis based on k- means clustering"],"prefix":"10.1109","author":[{"given":"Arya P","family":"Nampoothiri","sequence":"first","affiliation":[]},{"given":"Minu Lalitha","family":"Madhavu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-011-0017-9"},{"key":"ref11","first-page":"359","article-title":"Analyzing and Visualizing Criminal Network Dynamics: A Case Study","author":"jennifer","year":"2004","journal-title":"Lecture Notes in Computer Science[M]"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1020723730930","article-title":"NETEST: Estimating a Terrorist Network's Structure","volume":"8","author":"matthew","year":"2002","journal-title":"Computational &Mathematical Organization Theory"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.81"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.01.004"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jdcf.2011070101","article-title":"Lamb, Mark Taylor. A Framework for the Forensic Investigation of Unstructured EmailRelationship Data","volume":"3","author":"john","year":"2011","journal-title":"International Journal of Digital Crime and Forensics"},{"key":"ref17","article-title":"Web Document Clustering Approaches Using K-Means Algorithm","volume":"3","author":"kaur","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CNMT.2009.5374551"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2009.02.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.026113"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2005.11.005"},{"key":"ref2","article-title":"Email Network Analysis for Leadership","author":"tashiro","year":"0","journal-title":"Proceedings of 2011 IEEE IEEM"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUDCOM-ASIA.2013.38"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5634437"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275710.pdf?arnumber=7275710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:23:31Z","timestamp":1498235011000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275710","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}