Abstract
Nowadays, Social Networks (SNs) are penetrating into all areas of human life including relationships, shopping, education and so on and this growing expansion is inevitable. In addition to their invaluable benefits, due to the plethora of confidential private/corporate information in SNs, these places become the potential target for criminal/illegal activities such as identity theft, fraud, organized crimes and even terrorist attacks. To cope with such issues, it is useful to incorporate social network forensics (SNF) techniques for analyzing and surveying social interactions to detect, predict and prevent all forms of potential criminal activities. This chapter is organized in two main parts. First, SNs, their security and privacy issues are introduced and analyzed. Then, as a reference point for future studies in the field, forensics methods within SNs are explained and classified; then the related literature is reviewed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hampton, K., et al.: Social networking sites and our lives. Technical report, Pew Internet & American Life Project (2011)
Rainie, L., Smith, A.: Politics on Social Networking Sites. press release, Pew Research Center (September 4, 2012), http://www.pewinternet.org/Press-Releases/2012/Politics-on-Social-Networking-Sites.aspx
Cheng, J., et al.: Forensics Tools for Social Network Security Solutions. In: Proceedings of Student-Faculty Research Day. CSIS, Pace University, NY, USA (2009)
Silva, M., et al.: Virtual Forensics: Social Network Security Solutions. In: Proceedings of Student-Faculty Research Day. CSIS, Pace University, NY, USA (2009)
O’Reilly, T.: What is Web 2.0-Design Patterns and Business Models for the Next Generation of Software (2005), http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html (accessed February 2013)
Rimskii, V.: The influence of the Internet on active social involvement and the formation and development of identities. Russian Social Science Review 52(1), 79–101 (2011)
Edosomwan, S., et al.: The History of Social Media and its Impact on Business. The Journal of Applied Management and Entrepreneurship 16(3) (2011)
Boyd, D.M., Ellison, N.B.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1), article 11 (2007)
Coyle, C.L., Vaughn, H.: Social networking: Communication revolution or evolution? Bell Labs Technical Journal 13(2), 13–17 (2008)
Geierhos, M., Ebrahim, M.: Customer Interaction Management Goes Social: Getting Business Processes Plugged in Social Networks. In: Computational Social Networks, pp. 367–389. Springer, London (2012)
Costa, A.A., Tavares, L.V.: Social e-business and the Satellite Network model: Innovative concepts to improve collaboration in construction. Automation in Construction 22, 387–397 (2012)
Zhu, Z.: Discovering the influential users oriented to viral marketing based on online social networks. Physica A: Statistical Mechanics and its Applications 392(16), 3459–3469 (2013)
Domingo, M.C.: Managing Healthcare through Social Networks. Computer 43(7), 20–25 (2010)
Meltzer, D., et al.: Exploring the use of social network methods in designing healthcare quality improvement teams. Social Science & Medicine 71(6), 1119–1130 (2010)
Li, S., Hao, F., Li, M., Kim, H.-C.: Medicine Rating Prediction and Recommendation in Mobile Social Networks. In: Park, J.J(J.H.), Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol. 7861, pp. 216–223. Springer, Heidelberg (2013)
Greenhow, C., Schultz, K.: Using online social networks to support underrepresented students’ engagement in postsecondary education. In: Chinn, C.A., et al. (eds.) Proceedings of the 8th International Conference on Computer Supported Collaborative Learning (CSCL 2007). International Society of the Learning Sciences, pp. 232–233 (2007)
Fardoun, H.M., Alghazzawi, D.M., López, S.R., Penichet, V.M.R., Gallud, J.A.: Online Social Networks Impact in Secondary Education. In: Vittorini, P., Gennari, R., Marenzi, I., de la Prieta, F., Rodríguez, J.M.C. (eds.) International Workshop on Evidence-Based TEL. AISC, vol. 152, pp. 37–45. Springer, Heidelberg (2012)
Miloslava, Č., et al.: Utilization of learning management systems & social networking systems not only in the process of education. In: Mastorakis, N., et al. (eds.) Proceedings of the 10th WSEAS International Conference on Communications, Electrical & Computer Engineering, and 9th WSEAS International Conference on Applied Electromagnetics, Wireless and Optical Communications (ACELAE 2011), pp. 154–159. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point (2011)
Potts, J., et al.: Social network markets: a new definition of the creative industries. Journal of Cultural Economics 32(3), 167–185 (2008)
Dong, Y., et al.: TeleDatA: data mining, social network analysis and statistics analysis system based on cloud computing in telecommunication industry. In: Proceedings of the Third International Workshop on Cloud Data Management (CloudDB 2011), pp. 41–48. ACM, New York (2011)
Felzensztein, C., Gimmon, E.: Industrial clusters and social networking for enhancing inter-firm cooperation: the case of natural resources-based industries in Chile. Journal of Business Market Management 2(4), 187–202 (2008)
ter Maat, J.: Identifying centrality metrics for different types of social networks. In: The 18th Twente Student Conference, Enschede, Netherlands (2008), http://referaat.cs.utwente.nl/conference/18/paper
Takaffoli, M., et al.: A framework for analyzing dynamic social networks. In: 7th Conference on Applications of Social Network Analysis (ASNA 2010). University of Zurich (2010)
Dwyer, C., et al.: Trust and privacy concerns within social networking sites: A comparison of Facebook and MySpace. In: Proceedings of the 13th Americas Conference on Information Systems. Keystone, Colorado (2007)
Subrahmanyam, K., et al.: Online and offline social networks: Use of social networking sites by emerging adults. Journal of Applied Developmental Psychology 29(6), 420–433 (2008)
Toriumi, F., et al.: Classification of social network sites based on network indexes and communication patterns. In: Proceedings of International Workshop on Social Web Mining Co-located with The Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI) (2011)
Yammer, The Enterprise Social Network, https://www.yammer.com/
Conti, M., Hasani, A., Crispo, B.: Virtual private social networks. In: Proceedings of the first ACM Conference on Data and Application Security and Privacy (CODASPY 2011), pp. 39–50. ACM, New York (2011)
Allman, M.: On building special-purpose social networks for emergency communication. ACM SIGCOMM Computer Communication Review 40(5), 27–34 (2010)
http://nucleusresearch.com/news/press-releases/facebook-costs-companies-1-dot-5-percent-of-total-productivity/ (accessed May 2013)
Isheriff.: Strategies for managing social networking and personal web use in the workplace. White paper. Isheriff Company, Costa Mesa (2010)
Rooksby, J., et al.: Social Networking and the Workplace. School of Computer Science, North Haugh, University of St Andrews (2009)
http://www.dailymail.co.uk/femail/article-2080398/Facebook-cited-THIRD-divorces.html (accessed March 2013)
http://www.guardian.co.uk/technology/2011/mar/08/facebook-us-divorces (accessed March 2013)
http://nakedsecurity.sophos.com/2012/05/04/13-million-us-facebook-users-not-using-or-oblivious-to-privacy-controls/ (accessed May 2013)
http://nakedsecurity.sophos.com/2012/08/02/fake-facebook-accounts (accessed May 2013)
http://www.infosecurity-magazine.com/view/23520/outhoover-hoover-fbi-wants-massive-datamining-capability-for-social-media/ (accessed May 2013)
Chen, Y.: Research on Social Media Network and National Security. In: Du, W. (ed.) Informatics and Management Science II. LNEE, vol. 205, pp. 593–599. Springer, Heidelberg (2013)
Abdulhamid, S., et al.: Privacy and National Security Issues in Social Networks: the Challenges. International Journal of the Computer, the Internet and Management 19(3), 14–20 (2011)
Hare, F., Goldstein, J.: The interdependent security problem in the defense industrial base: An agent-based model on a social network. International Journal of Critical Infrastructure Protection 3(3), 128–139 (2010)
Symantec Corporation: Internet Security Threat Report, 2012 Trends (18), 32 (2013)
Gao, H., et al.: Security issues in online social networks. IEEE Internet Computing 15(4), 56–63 (2011)
Brown, G., et al.: Social Networks and Context- Aware Spam. In: Proceedings of ACM Conference on Computer Supported Cooperative Work (CSCW 2008), pp. 403–412. ACM Press (2008)
Galam, S.: Modeling rumors: the no plane Pentagon French hoax case. Physica A: Statistical Mechanics and Its Applications 320, 571–580 (2003)
Kimmel, A.J.: Rumors and the financial marketplace. The Journal of Behavioral Finance 5(3), 134–141 (2004)
Nekovee, M., Moreno, Y., Bianconi, G., Marsili, M.: Theory of rumor spreading in complex social networks. Physica A: Statistical Mechanics and its Applications 374(1), 457–470 (2007)
Karp, R., et al.: Randomized rumor spreading. In: Proceedings of the 41st Annual Symposium on Foundations of Computer Science, pp. 565–574. IEEE (2000)
Sauerwald, T., Stauffer, A.: Rumor spreading and vertex expansion on regular graphs. In: Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 462–475. SIAM (2011)
Xu, W., Zhang, F., Zhu, S.: Toward Worm Detection in Online Social Networks. In: Proceedings 26th Annual Computer Security Applications Conference (ACSAC 2010), pp. 11–20. ACM Press (2010)
Schmugar, C.: The Future of Social Networking Sites. McAfee Security Journal: Security Vision from McAfee Labs, 28–30 (2008)
http://www.net-security.org/secworld.php?id=10661 (accessed May 2013)
Zheleva, E., Getoor, L.: Privacy in social networks: A survey. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 277–306. Springer, US (2011)
Beach, A., et al.: Solutions to security and privacy issues in mobile social networking. In: Proceedings of International Conference on Computational Science and Engineering (CSE 2009), vol. 4, pp. 1036–1042. IEEE (2009)
Rodríguez, E., et al.: A Digital Rights Management approach to privacy in online social networks. In: Workshop on Privacy and Protection in Web-based Social Networks (within ICAIL 2009), Barcelona (2009)
Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, Article 9. ACM (2012)
Sahinoglu, M., Akkaya, A.D., Ang, D.: Can We Assess and Monitor Privacy and Security Risk for Social Networks? Procedia-Social and Behavioral Sciences 57, 163–169 (2012)
Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, pp. 351–360. ACM (2010)
Kafali, O., et al.: PROTOSS: A Run Time Tool for Detecting Privacy Violations in Online Social Networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), pp. 429–433. IEEE Computer Society, Washington, DC (2012)
Sundsoy, P.R., et al.: The Activation of Core Social Networks in the Wake of the Oslo Bombing. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), pp. 586–590. IEEE Computer Society, Washington, DC (2012)
Memon, N., Larsen, H.L., Hicks, D., Harkiolakis, N.: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies. In: Yang, C.C., et al. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 477–489. Springer, Heidelberg (2008)
Memon, N., et al.: Understanding the structure of terrorist networks. Int. J. Bus. Intell. Data Min. 2(4), 401–425 (2007)
Morselli, C., Décary-Hétu, D.: Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the " cyberbanging" Phenomenon. Public Safety Canada, Ottawa (2010)
Womer, S., Bunker, R.J.: Surños Gangs and Mexican Cartel Use of Social Networking Sites. Small Wars & Insurgencies 21(1), 81–94 (2010)
Palmer, G.: A road map for digital forensics research. Technical Report from the first Digital Forensics Research Workshop (DFRWS), Utica, New York (2001)
http://www.mashable.com/2012/02/13/social-media-forensics (accessed March 2013)
Zhao, H., et al.: Behavior modeling and forensics for multimedia social networks. IEEE Signal Processing Magazine 26(1), 118–139 (2009)
Lau, S.: Uncovering Communications: A Forensic Look at Online Social Networking Communities. Financial Fraud Law Report (2009)
Nagy, Z.: Social media risks from forensic point of view. International Journal of Computers and Communications 6(4), 245–253 (2012)
Huber, M., et al.: Social snapshots: Digital forensics for online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 113–122. ACM (2011)
Zainudin, N.M., Merabti, M., Llewellyn-Jones, D.: A Digital Forensic Investigation Model for Online Social Networking. In: Proceedings of The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK, pp. 21–22 (2010)
Mulazzani, M., et al.: Social Network Forensics: Tapping the Data Pool of Social Network. In: Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics. University of Pretoria, Pretoria (2012)
Castiglione, A., Cattaneo, G., De Santis, A.: A forensic analysis of images on online social networks. In: Proceedings of Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 679–684. IEEE (2011)
Araujo-Valdez, K., et al.: Social Network Forensic Tools. In: Proceedings of Student-Faculty Research Day. CSIS, Pace University, NY, USA (2012)
Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digital Investigation 9, 24–33 (2012)
Lau, R.Y.K., et al.: Social Media Analytics for Cyber Attack Forensic. International Journal of Research in Engineering and Technology (IJRET) 1(4), 217–220 (2012)
Chu, H.C., Deng, D.J., Park, J.H.: Live data mining concerning social networking forensics based on a Facebook session through aggregation of social data. IEEE Journal on Selected Areas in Communications 29(7), 1368–1376 (2011)
Son, J.: Social Network Forensics: Evidence Extraction Tool Capabilities. Masters Theses, AUT University (2012)
Alzaidy, R.: Criminal Network Mining and Analysis for Forensic Investigations. Doctoral dissertation, Faculty of Engineering and Computer Science, Concordia University, Canada (2010)
Ressler, S.: Social network analysis as an approach to combat terrorism: past, present, and future research. Homeland Security Affairs 2(2), 1–10 (2006)
Svenson, P., Svensson, P., Tullberg, H.: Social Network Analysis And Information Fusion For Anti-Terrorism. In: Proceedings of the Conference on Civil and Military Readiness 2006 (CIMI 2006), Enköping, Stockholm, Sweden, paper S3.1 (2006)
Lu, Y., et al.: Social network analysis of a criminal hacker community. Journal of Computer Information Systems 51(2), 31–41 (2010)
Yang, C.C., Sageman, M.: Analysis of terrorist social networks with fractal views. Journal of Information Science 35(3), 299–320 (2009)
Kerschbaum, F., Schaad, A.: Privacy-preserving social network analysis for criminal investigations. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 9–14. ACM (2008)
L’Huillier, G., et al.: Topic-based social network analysis for virtual communities of interests in the dark web. SIGKDD Explor. Newsl. 12(2), 66–73 (2011)
http://www.nytimes.com/2012/01/14/us/federal-security-program-monitored-public-opinion.html?_r=0 (accessed March 2013)
news.bbc.co.uk/2/hi/7962631.stm (accessed May 2013)
Chakraborty, A., et al.: SPAM: A Framework for Social Profile Abuse Monitoring. Course Project, Department of Computer Science. Stony Brook University (2012), http://www.cs.sunysb.edu/~aychakrabort/courses/cse508/
Corley, C.D., et al.: Monitoring influenza trends through mining social media. In: International Conference on Bioinformatics & Computational Biology, pp. 340–346 (2009)
Patrick, A.S.: Monitoring corporate password sharing using social network analysis. In: International Sunbelt Social Network Conference. St. Pete Beach, Florida (2008)
Sindhu, K.K., Meshram, B.B.: Digital Forensics and Cyber Crime Datamining. Journal of Information Security 3(3), 196–201 (2012)
Brown, R., Pham, B., de Vel, O.: Design of a digital forensics image mining system. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 395–404. Springer, Heidelberg (2005)
Qin, L.: Data mining method based on computer forensics-based ID3 algorithm. In: Proceedings of the 2nd IEEE International Conference on Information Management and Engineering (ICIME), pp. 340–343. IEEE (2010)
Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., Sageman, M., Chen, H.: Terrorism knowledge discovery project: A knowledge discovery approach to addressing the threats of terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 125–145. Springer, Heidelberg (2004)
Ozgul, F., Bondy, J., Aksoy, H.: Mining for offender group detection and story of a police operation. In: Proceedings of the Sixth Australasian Conference on Data Mining and Analytics, vol. 70, pp. 189–193. Australian Computer Society, Inc. (2007)
Xu, J.J., Chen, H.: CrimeNet explorer: a framework for criminal network knowledge discovery. ACM Transactions on Information Systems (TOIS) 23(2), 201–226 (2005)
Chaurasia, N., et al.: A Survey on Terrorist Network Mining: Current Trends and Opportunities. International Journal of Computer Science and Engineering Survey 3(4) (2012)
Hosseinkhani, J., Chaprut, S., Taherdoost, H.: Criminal Network Mining by Web Structure and Content Mining. In: Proceedings of the 11th WSEAS International Conference on Information Security and Privacy (ISP 2012), Prague, Czech Republic, pp. 210–215 (2012)
Nohuddin, P.N., et al.: Finding “interesting” trends in social networks using frequent pattern mining and self organizing maps. Knowledge-Based Systems 29, 104–113 (2012)
Maruhashi, K., Guo, F., Faloutsos, C.: MultiAspectForensics: Pattern mining on large-scale heterogeneous networks with tensor analysis. In: Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 203–210. IEEE (2011)
Brandes, U., Wagner, D.: Analysis and visualization of social networks. In: Graph Drawing Software, pp. 321–340. Springer, Heidelberg (2004)
Henry, N., Fekete, J.D., McGuffin, M.J.: NodeTrix: a hybrid visualization of social networks. IEEE Transactions on Visualization and Computer Graphics 13(6), 1302–1309 (2007)
Boman, M., et al.: Social network visualization as a contact tracing tool. In: Proceedings of the First International Workshop on Agent Technology for Disaster Management, pp. 131–133 (2006)
Bosma, M., Meij, E., Weerkamp, W.: A framework for unsupervised spam detection in social networking sites. In: Baeza-Yates, R., de Vries, A.P., Zaragoza, H., Cambazoglu, B.B., Murdock, V., Lempel, R., Silvestri, F. (eds.) ECIR 2012. LNCS, vol. 7224, pp. 364–375. Springer, Heidelberg (2012)
Gao, H., et al.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35–47. ACM (2010)
Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1–9. ACM (2010)
Wang, D., Irani, D., Pu, C.: A social-spam detection framework. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pp. 46–54. ACM (2011)
Huber, M., et al.: Exploiting social networking sites for spam. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 693–695 (2010)
Lumezanu, C., Feamster, N.: Observing common spam in Twitter and email. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference (IMC 2012), pp. 461–466. ACM, New York (2012)
Wang, A.H.: Detecting spam bots in online social networking sites: A machine learning approach. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol. 6166, pp. 335–342. Springer, Heidelberg (2010)
Sharma, A., Panigrahi, P.K.: A Review of Financial Accounting Fraud Detection based on Data Mining Techniques. International Journal of Computer Applications 39(1), 37–47 (2012)
Wiil, U.K., Memon, N., Karampelas, P.: Detecting new trends in terrorist networks. In: Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 435–440. IEEE (2010)
Halalai, R., Lemnaru, C., Potolea, R.: Distributed community detection in social networks with genetic algorithms. In: Proceedings of International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 35–41. IEEE (2010)
Blondel, V.D., et al.: Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment (10), P10008 (2008)
Greene, D., Doyle, D., Cunningham, P.: Tracking the evolution of communities in dynamic social networks. In: Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 176–183. IEEE (2010)
Altshuler, Y., Fire, M., Shmueli, E., Elovici, Y., Bruckstein, A., Pentland, A(S.), Lazer, D.: Detecting Anomalous Behaviors Using Structural Properties of Social Networks. In: Greenberg, A.M., Kennedy, W.G., Bos, N.D. (eds.) SBP 2013. LNCS, vol. 7812, pp. 433–440. Springer, Heidelberg (2013)
Heard, N.A., et al.: Bayesian anomaly detection methods for social networks. The Annals of Applied Statistics 4(2), 645–662 (2010)
Bilgin, C.C., Yener, B.: Dynamic Network Evolution: Models, Clustering, Anomaly detection. IEEE Networks (2006)
Gupta, N., Dey, L.: Detection and Characterization of Anomalous Entities in Social Communication Networks. In: Proceedings of 20th International Conference on Pattern Recognition (ICPR), pp. 738–741. IEEE (2010)
Chen, Z., Hendrix, W., Samatova, N.F.: Community-based anomaly detection in evolutionary networks. Journal of Intelligent Information Systems 39(1), 59–85 (2012)
Krombholz, K., Merkl, D., Weippl, E.: Fake identities in social media: A case study on the sustainability of the Facebook business model. Journal of Service Science Research 4(2), 175–212 (2012)
Dinakar, K., et al.: Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS) 2(3), Article 18 (2012)
Ying, X., Wu, X., Barbará, D.: Spectrum based fraud detection in social networks. In: Proceedings of 27th International Conference on Data Engineering (ICDE), pp. 912–923. IEEE (2011)
Cetintas, S., et al.: Identifying similar people in professional social networks with discriminative probabilistic models. In: Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 1209–1210. ACM (2011)
Liu, X., Troncy, R., Huet, B.: Using social media to identify events. In: Proceedings of the 3rd ACM SIGMM International Workshop on Social Media, pp. 3–8. ACM (2011)
Saraf, P., et al.: Social Media Analysis and Geospatial Crime Report Clustering for Crime Prediction & Prevention. Data Analytics Course Project, Department of Computer Science. Virginia Tech University (2011)
Uchida, C.D.: Predictive Policing in Los Angeles: Planning and Development. Justice & Security Strategies, Inc. (2009)
http://rt.com/news/software-tracks-predicts-raytheon-878/ (accessed June 2013)
Liben‐Nowell, D., Kleinberg, J.: The link‐prediction problem for social networks. Journal of the American Society for Information Science and Technology 58(7), 1019–1031 (2007)
Chaurasia, N., et al.: Exploring the Current Trends and Future Prospects in Terrorist Network Mining. In: Wyld, C.D., et al. (eds.) Proceedings of The Second International Conference on Computer Science, Engineering and Applications (CCSEA 2012), Delhi, India, vol. 2(2) (2012)
Grover, V., Adderley, R., Bramer, M.: Review of current crime prediction techniques. In: Springer London, Applications and Innovations in Intelligent Systems XIV, pp. 233–237 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Keyvanpour, M., Moradi, M., Hasanzadeh, F. (2014). Digital Forensics 2.0. In: Muda, A., Choo, YH., Abraham, A., N. Srihari, S. (eds) Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Studies in Computational Intelligence, vol 555. Springer, Cham. https://doi.org/10.1007/978-3-319-05885-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-05885-6_2
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05884-9
Online ISBN: 978-3-319-05885-6
eBook Packages: EngineeringEngineering (R0)