S. Abdallah, K. Shaalan, and M. Shoaib, Integrating Rule-Based System with Classification for Arabic Named Entity Recognition, Proceedings of the Thirteenth International Conference on Computational Linguistics and Intelligent Text Processing, pp.311-322, 2012.
DOI : 10.1007/978-3-642-28604-9_26

N. Bach and S. Badaskar, A Review of Relation Extraction, Language Technologies Institute, 2007.

N. Beebe, Digital forensic research: The good, the bad and the unaddressed , in Advances in Digital Forensics, pp.17-36, 2009.

N. Beebe and J. Clark, Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, pp.3-16, 2005.

N. Beebe and L. Liu, Clustering digital forensic string search output, Digital Investigation, pp.314-322, 2014.
DOI : 10.1016/j.diin.2014.10.002

R. Bunescu and R. Mooney, Collective information extraction with relational Markov networks, Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics , ACL '04, 2004.
DOI : 10.3115/1218955.1219011

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.5677

C. Cardie, Empirical methods in information extraction, AI Magazine, pp.65-79, 1997.

M. Chau, J. Xu, and H. Chen, Extracting meaningful entities from police narrative reports, Proceedings of the Annual National Conference on Digital Government Research, 2002.

J. Chen, D. Ji, C. Tan, and Z. Niu, Relation extraction using label propagation based semi-supervised learning, Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the ACL , ACL '06, pp.129-136, 2006.
DOI : 10.3115/1220175.1220192

J. Colombe and G. Stephens, Statistical profiling and visualization for detection of malicious insider attacks on computer networks, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.138-142, 2004.
DOI : 10.1145/1029208.1029231

A. De-waal, J. Venter, and E. Barnard, Applying topic modeling to forensic data, in Advances in Digital Forensics IV, I Ray and, pp.115-126, 2008.

J. Finkel, T. Grenager, and C. Manning, Incorporating non-local information into information extraction systems by Gibbs sampling, Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics , ACL '05, pp.363-370, 2005.
DOI : 10.3115/1219840.1219885

URL : http://acl.ldc.upenn.edu/p/p05/p05-1045.pdf

S. Garfinkel, Digital forensics research: The next ten years, pp.64-73, 2010.

J. Guo, G. Xu, X. Cheng, and H. Li, Named entity recognition in query, Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, SIGIR '09, pp.267-274, 2009.
DOI : 10.1145/1571941.1571989

R. Hadjidj, M. Debbabi, H. Lounis, F. Iqbal, A. Szporer et al., Towards an integrated e-mail forensic analysis framework, Digital Investigation, pp.3-4, 2009.
DOI : 10.1016/j.diin.2009.01.004

M. Hearst, TileBars, Proceedings of the SIGCHI conference on Human factors in computing systems, CHI '95, pp.59-66, 1995.
DOI : 10.1145/223904.223912

M. Hearst and D. Rosner, Tag Clouds: Data Analysis Tool or Social Signaller?, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008.
DOI : 10.1109/HICSS.2008.422

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.916

J. Jung, Online named entity recognition method for microtexts in social networking services: A case study of twitter, Expert Systems with Applications, vol.39, issue.9, pp.8066-8070, 2012.
DOI : 10.1016/j.eswa.2012.01.136

B. Klimt and Y. Yang, Introducing the Enron corpus, Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, 2004.

C. Ku, A. Iriberri, and G. Leroy, Natural language processing and egovernment: Crime information extraction from heterogeneous data sources, Proceedings of the Ninth Annual International Conference on Digital Government Research, pp.162-170, 2008.

J. Kuperus, C. Veenman, and M. Van-keulen, Increasing NER Recall with Minimal Precision Loss, 2013 European Intelligence and Security Informatics Conference, pp.106-111, 2013.
DOI : 10.1109/EISIC.2013.23

URL : http://eprints.eemcs.utwente.nl/23400/01/PID2822297.pdf

J. Lafferty, A. Mccallum, and F. Pereira, Conditional random fields: Probabilistic models for segmenting and labeling sequence data, Proceedings of the Eighteenth International Conference on Machine Learning, pp.282-289, 2001.

A. Louis, A. De-waal, and C. Venter, Named entity recognition in a South African context, Proceedings of the 2006 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing couuntries , SAICSIT '06, pp.170-179, 2006.
DOI : 10.1145/1216262.1216281

A. Louis and A. Engelbrecht, Unsupervised discovery of relations for analysis of textual data, Digital Investigation, pp.154-171, 2011.
DOI : 10.1016/j.diin.2010.08.004

A. Maedche and S. Staab, Ontology learning for the Semantic Web, IEEE Intelligent Systems, vol.16, issue.2, pp.72-79, 2001.
DOI : 10.1109/5254.920602

D. Maynard, V. Tablan, C. Ursu, H. Cunningham, and Y. Wilks, Named entity recognition from diverse text types, Proceedings of the Conference on Recent Advances in Natural Language Processing, pp.257-274, 2001.

A. Mccallum and W. Li, Early results for named entity recognition with conditional random fields, feature induction and web-enhanced lexicons, Proceedings of the seventh conference on Natural language learning at HLT-NAACL 2003 -, pp.188-191, 2003.
DOI : 10.3115/1119176.1119206

E. Minkov, R. Wang, and W. Cohen, Extracting personal names from email, Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing , HLT '05, pp.443-450, 2005.
DOI : 10.3115/1220575.1220631

R. Mooney and R. Bunescu, Mining knowledge from text using information extraction, ACM SIGKDD Explorations Newsletter, vol.7, issue.1, pp.3-10, 2005.
DOI : 10.1145/1089815.1089817

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.4183

D. Nadeau and S. Sekine, A survey of named entity recognition and classification, Lingvisticae Investigationes, pp.3-26, 2007.
DOI : 10.1075/bct.19.03nad

J. Okolica, G. Peterson, and R. Mills, Using PLSI-U To Detect Insider Threats from Email Traffic, Advances in Digital Forensics II, pp.91-103, 2006.
DOI : 10.1007/0-387-36891-4_8

D. Newman, C. Chemudugunta, P. Smyth, and M. Steyvers, Analyzing Entities and Topics in News Articles Using Statistical Topic Models, Proceedings of the Fourth IEEE International Conference on Intelligence and Security Informatics, pp.93-104, 2006.
DOI : 10.1007/11760146_9

S. Orlando, P. Palmerini, and R. Perego, Enhancing the Apriori algorithm for frequent set counting, Proceedings of the Third International Conference on Data Warehousing and Knowledge Discovery, pp.71-82, 2001.

M. Pollitt and A. Whitledge, Exploring big haystacks, in Advances in Digital Forensics II, pp.67-76, 2006.

L. Rau, P. Jacobs, and U. Zernik, Information extraction and text summarization using linguistic knowledge acquisition, Information Processing & Management, vol.25, issue.4, pp.419-428, 1989.
DOI : 10.1016/0306-4573(89)90069-1

M. Schwartz and L. Liebrock, A Term Distribution Visualization Approach to Digital Forensic String Search, Proceedings of the Fifth International Workshop on Visualization for Computer Security, pp.36-43, 2008.
DOI : 10.1007/978-3-540-85933-8_4

A. Sun, R. Grishman, and S. Sekine, Semi-supervised relation extraction with large-scale word clustering, Proceedings of the Forty- Ninth Annual Meeting of the Association for Computational Linguistics, pp.521-529, 2011.

C. Sutton and A. Mccallum, An introduction to conditional random fields for relational learning, in Introduction to Statistical Relational Learning, pp.93-128, 2007.

P. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining, 2005.

J. Venter, A. De-waal, and C. Willers, Specializing CRISP-DM for Evidence Mining, Advances in Digital Forensics III, pp.303-315, 2007.
DOI : 10.1007/978-0-387-73742-3_21

URL : http://researchspace.csir.co.za/dspace/bitstream/10204/5539/1/Venter3_2007.pdf

S. Whittaker, J. Hirschberg, J. Choi, D. Hindle, F. Pereira et al., SCAN, Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval , SIGIR '99, pp.26-33, 1999.
DOI : 10.1145/312624.312639

Y. Yan, N. Okazaki, Y. Matsuo, Z. Yang, and M. Ishizuka, Unsupervised relation extraction by mining Wikipedia texts using information from the web, Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP: Volume 2, ACL-IJCNLP '09, pp.1021-1029, 2009.
DOI : 10.3115/1690219.1690289

D. Zelenko, C. Aone, and A. Richardella, Kernel methods for relation extraction, Proceedings of the ACL-02 conference on Empirical methods in natural language processing , EMNLP '02, pp.1083-1106, 2003.
DOI : 10.3115/1118693.1118703

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.821

S. Zhao and R. Grishman, Extracting relations with integrated information using kernel methods, Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics , ACL '05, pp.419-426, 2005.
DOI : 10.3115/1219840.1219892

URL : http://acl.ldc.upenn.edu/P/P05/P05-1052.pdf