R. Agrawal, R. Bayardo, C. Faloutsos, J. Kiernan, R. Rantzau et al., Auditing Compliance with a Hippocratic Database, Proceedings of the Thirtieth International Conference on Very Large Databases, pp.516-527, 2004.
DOI : 10.1016/B978-012088469-8.50047-4

N. Beebe and J. Clark, Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, pp.3-16, 2005.

N. Beebe and J. Clark, Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results, Digital Investigation, pp.49-54, 2007.
DOI : 10.1016/j.diin.2007.06.005

W. Cavnar and J. Trenkle, N-gram-based text categorization, Proceedings of the Third Annual Symposium on Document Analysis and Information Retrieval, pp.161-175, 1994.

N. Croft and M. Olivier, Sequenced release of privacy-accurate information in a forensic investigation, Digital Investigation, pp.95-101, 2010.
DOI : 10.1016/j.diin.2010.01.002

B. Fei, J. Eloff, M. Olivier, H. Tillwick, and H. Venter, Using selforganizing maps for anomalous behavior detection in a computer forensic investigation, Proceedings of the Fifth Annual South African Information Security Conference, 2005.

B. Fei, J. Eloff, H. Venter, and M. Olivier, Exploring forensic data with self-organizing maps, in Advances in Digital Forensics, pp.113-123, 2005.

S. Fischer-hubner, IT Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms, 2001.
DOI : 10.1007/3-540-45150-1

P. Gladyshev, Formalizing Event Reconstruction in Digital Investigations, 2004.

S. Johnson, Hierarchical clustering schemes, Psychometrika, vol.58, issue.4, pp.241-254, 1967.
DOI : 10.1007/BF02289588

T. Kohonen, Self-Organizing Maps, 2001.

G. Palmer, A Road Map for Digital Forensic Research, DFRWS Technical Report DTR-T001-01 Final, Digital Forensic Research Workshop, 2001.

C. Shannon, A mathematical theory of communication, Bell System Technical Journal, vol.XXVII, issue.3, pp.379-423, 1948.

R. Van-den-hoven-van-genderen, Cyber Crime Investigation and the Protection of Personal Data and Privacy, Discussion Paper, Economic Crime Division, 2008.

W. Van-staden and M. Olivier, On compound purposes and compound reasons for enabling privacy, Journal of Universal Computer Science, vol.17, issue.3, pp.426-450, 2011.

S. Warren and L. Brandeis, The Right to Privacy, Harvard Law Review, vol.4, issue.5, pp.193-220, 1890.
DOI : 10.2307/1321160

I. Witten, Text Mining, Practical Handbook of Internet Computing Chapman and Hall, pp.14-15, 2005.
DOI : 10.1201/9780203507223.ch14