Auditing Compliance with a Hippocratic Database, Proceedings of the Thirtieth International Conference on Very Large Databases, pp.516-527, 2004. ,
DOI : 10.1016/B978-012088469-8.50047-4
Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, pp.3-16, 2005. ,
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results, Digital Investigation, pp.49-54, 2007. ,
DOI : 10.1016/j.diin.2007.06.005
N-gram-based text categorization, Proceedings of the Third Annual Symposium on Document Analysis and Information Retrieval, pp.161-175, 1994. ,
Sequenced release of privacy-accurate information in a forensic investigation, Digital Investigation, pp.95-101, 2010. ,
DOI : 10.1016/j.diin.2010.01.002
Using selforganizing maps for anomalous behavior detection in a computer forensic investigation, Proceedings of the Fifth Annual South African Information Security Conference, 2005. ,
Exploring forensic data with self-organizing maps, in Advances in Digital Forensics, pp.113-123, 2005. ,
IT Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms, 2001. ,
DOI : 10.1007/3-540-45150-1
Formalizing Event Reconstruction in Digital Investigations, 2004. ,
Hierarchical clustering schemes, Psychometrika, vol.58, issue.4, pp.241-254, 1967. ,
DOI : 10.1007/BF02289588
Self-Organizing Maps, 2001. ,
A Road Map for Digital Forensic Research, DFRWS Technical Report DTR-T001-01 Final, Digital Forensic Research Workshop, 2001. ,
A mathematical theory of communication, Bell System Technical Journal, vol.XXVII, issue.3, pp.379-423, 1948. ,
Cyber Crime Investigation and the Protection of Personal Data and Privacy, Discussion Paper, Economic Crime Division, 2008. ,
On compound purposes and compound reasons for enabling privacy, Journal of Universal Computer Science, vol.17, issue.3, pp.426-450, 2011. ,
The Right to Privacy, Harvard Law Review, vol.4, issue.5, pp.193-220, 1890. ,
DOI : 10.2307/1321160
Text Mining, Practical Handbook of Internet Computing Chapman and Hall, pp.14-15, 2005. ,
DOI : 10.1201/9780203507223.ch14