{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:48Z","timestamp":1750308528314,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905346","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Digital Forensics Investigation Model for Social Networking Site"],"prefix":"10.1145","author":[{"given":"Ankita R.","family":"Jadhao","sequence":"first","affiliation":[{"name":"Ramdeobaba College of Engineering &amp; Management, Nagpur, Maharashtra, India"}]},{"given":"Avinash J.","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Ramdeobaba College of Engineering &amp; Management, Nagpur, Maharashtra, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"42","volume-title":"IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions, IIT Kanpur","author":"Ali M. Mahmood","year":"2013","unstructured":"M. Mahmood Ali , and Lakshmi Rajamani , \" Framework for Surveillance of Emails to Detect Multilingual Spam and Suspicious Messages ,\" IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions, IIT Kanpur , India , pp. 42 -- 56 , 2013 . M. Mahmood Ali, and Lakshmi Rajamani, \"Framework for Surveillance of Emails to Detect Multilingual Spam and Suspicious Messages,\" IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions, IIT Kanpur, India, pp. 42--56, 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"And Lakshmi Rajamani,\"APD: ARM Deceptive Phishing Detector SystemPhishing Detection In Instant Messengers Using Data Mining Approach","author":"Ali Mohd Mahmood","year":"2012","unstructured":"Mohd Mahmood Ali , And Lakshmi Rajamani,\"APD: ARM Deceptive Phishing Detector SystemPhishing Detection In Instant Messengers Using Data Mining Approach \", Springer-Verlag Berlin Heidelberg , in 2012 . Mohd Mahmood Ali, And Lakshmi Rajamani,\"APD: ARM Deceptive Phishing Detector SystemPhishing Detection In Instant Messengers Using Data Mining Approach\", Springer-Verlag Berlin Heidelberg, in 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551509360123"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2013.058292"},{"key":"e_1_3_2_1_5_1","volume-title":"Using Social Networks to Help Detect Malicious Web Content,\" published by IEEE","author":"Robertson Michael","year":"2010","unstructured":"Michael Robertson , Yin Pan , and Bo Yuan , \" A Social Approach to Security : Using Social Networks to Help Detect Malicious Web Content,\" published by IEEE in 2010 . Michael Robertson, Yin Pan, and Bo Yuan, \"A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content,\" published by IEEE in 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.122"},{"key":"e_1_3_2_1_7_1","unstructured":"Anagha R Kulkarnia Vrinda Tokekarb Parag Kulkarnic \"Identifying Context of Text Documents using Na\u00efve Bayes Classification and Apriori Association Rule Mining\" published by IEEE in 2009.  Anagha R Kulkarnia Vrinda Tokekarb Parag Kulkarnic \"Identifying Context of Text Documents using Na\u00efve Bayes Classification and Apriori Association Rule Mining\" published by IEEE in 2009."},{"issue":"1","key":"e_1_3_2_1_8_1","article-title":"Chopde\" A Review on Various Approaches for Detection of Cyber Crimes via Instant Messaging Filters","volume":"5","author":"Shendurkar Ankita","year":"2015","unstructured":"Ankita M. Shendurkar and Nitin R . Chopde\" A Review on Various Approaches for Detection of Cyber Crimes via Instant Messaging Filters \" International Journal of Current Engineering and Technology , Vol. 5 , No. 1 ( Feb 2015 ) Ankita M.Shendurkar and Nitin R.Chopde\" A Review on Various Approaches for Detection of Cyber Crimes via Instant Messaging Filters\" International Journal of Current Engineering and Technology, Vol. 5, No. 1 (Feb 2015)","journal-title":"International Journal of Current Engineering and Technology"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2089678"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2009.02.002"},{"key":"e_1_3_2_1_11_1","volume-title":"And Et Al,\" A Relational Wrapper For RDF Reification","author":"Ramanujam Sunitha","year":"2009","unstructured":"Sunitha Ramanujam , And Et Al,\" A Relational Wrapper For RDF Reification \", IFIP International Federation For Information Processing IFIP AICT 300, in 2009 . Sunitha Ramanujam, And Et Al,\" A Relational Wrapper For RDF Reification\", IFIP International Federation For Information Processing IFIP AICT 300, in 2009."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:55:49Z","timestamp":1750272949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":11,"alternative-id":["10.1145\/2905055.2905346","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905346","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}