Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
17
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(19 citation statements)
references
References 16 publications
1
17
0
1
Order By: Relevance
“…Source node selects a destination node based on rank based network model. The primary and secondary networks achieves the common scaling law as being stand alone networks Chuet al, [15]describe a spatial social union, a method to measure user similarity and integrate connections between user, item and locations. Modified Fast-Floyd algorithm is used to compute the multi-dimensional matrix and vector.…”
Section: Trustworthy Large Scale Social Network Evaluationmentioning
confidence: 99%
“…Source node selects a destination node based on rank based network model. The primary and secondary networks achieves the common scaling law as being stand alone networks Chuet al, [15]describe a spatial social union, a method to measure user similarity and integrate connections between user, item and locations. Modified Fast-Floyd algorithm is used to compute the multi-dimensional matrix and vector.…”
Section: Trustworthy Large Scale Social Network Evaluationmentioning
confidence: 99%
“…Data can be retrieved from volatile memory that can be used to reconstruct previous session information and chats by using live memory acquisition techniques [4]. This plays an extremely important role in assisting digital forensic investigators to incubate additional thoughtful decisions concerning the discovery of breadcrumb digital evidence in the unparalleled cyber-crime incident era.…”
Section: Volatile Memory Analysismentioning
confidence: 99%
“…As a result, This paper highlight on live data acquisition within the RAM of the desktop PC with prominence on some dissimilar strings that could be found in order to renovate the previous Face book session, which plays an tremendously valuable role for the associate digital forensics investigators to nurture additional thoughtful decisions concerning the discovery of breadcrumb digital evidences in this unmatched cybercrime incidents epoch. [5] Investigating of possibility of predicting several user and message attributes in text-based, real-time, online messaging services is discussed in the paper Chat Mining. For this purpose, a large collection of chat messages is examined [6].…”
Section: Literature Surveymentioning
confidence: 99%