Constructing and classifying email networks from raw forensic images

G Allen - 2016 - apps.dtic.mil
Email addresses extracted from secondary storage devices are important to a forensic
analyst when conducting an investigation. They can provide insight into the users social …

[PDF][PDF] Constructing Social Networks and Classifying Email Addresses from Raw Forensic Images

EC Ward, J Goodwin, R Gera - 2018 - apps.dtic.mil
The ability to find email addresses on digital storage media and deduce the relationships
between them is critical for the success of many law enforcement and intelligence collection …

Creating and understanding email communication networks to aid digital forensic investigations

M McCarrin, J Green, R Gera - arXiv preprint arXiv:1806.05327, 2018 - arxiv.org
Digital forensic analysts depend on the ability to understand the social networks of the
individuals they investigate. We develop a novel method for automatically constructing these …

[PDF][PDF] Constructing social networks from secondary storage with bulk analysis tools

JL Green - 2016 - core.ac.uk
Intelligence analysts depend on the ability to understand the social networks of suspects
and adversaries. We develop a novel method for automatically discovering this information …

Making sense of email addresses on drives

NC Rowe, R Schwamm, MR McCarrin… - Journal of Digital …, 2016 - commons.erau.edu
Drives found during investigations often have useful information in the form of email
addresses which can be acquired by search in the raw drive data independent of the file …

Shortlisting the influential members of criminal organizations and identifying their important communication channels

K Taha, PD Yoo - IEEE Transactions on Information Forensics …, 2019 - ieeexplore.ieee.org
Low-level criminals, who do the legwork in a criminal organization, are the most likely to be
arrested, whereas the high-level ones tend to avoid attention. But crippling the work of …

Forensic triage of email network narratives through visualisation

J Haggerty, S Haggerty, M Taylor - Information Management & …, 2014 - emerald.com
Purpose–The purpose of this paper is to propose a novel approach that automates the
visualisation of both quantitative data (the network) and qualitative data (the content) within …

Evidential structures and metrics for network forensics

AR Amran, RCW Phan, DJ Parish… - … Journal of Internet …, 2010 - inderscienceonline.com
Evaluation of forensics evidence is an essential step in proving the malicious intents of an
attacker or adversary and the severity of the damages caused to any network. This paper …

Social Network Visualization for Forensic Investigation of E-mail.

J Haggerty, DJ Lamb, MJ Taylor - WDFIA, 2009 - books.google.com
E-mail features as a key technology for both the dissemination of information and for social
networking. Given the volume of e-mail transmission combined with access opportunities, it …

Mining criminal networks from unstructured text documents

R Al-Zaidy, BCM Fung, AM Youssef, F Fortin - Digital Investigation, 2012 - Elsevier
Digital data collected for forensics analysis often contain valuable information about the
suspects' social networks. However, most collected records are in the form of unstructured …