2008
DOI: 10.1016/j.diin.2008.05.001
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach of mining write-prints for authorship attribution in e-mail forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
65
0
2

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 101 publications
(68 citation statements)
references
References 18 publications
1
65
0
2
Order By: Relevance
“…It implements a key word search by using SQL-like queries. Additionally, it provides data mining models to classify messages in different categories and applies authorship analysis (Iqbal, Hadjidj, Fung, & Debbabi, 2008) on the basis of stylemetric (Abbasi & Chen, 2008) features in order to identify the most conceivable authors of anonymous messages. A drawback of the tool is that it allows almost no interaction with the resulting graph or charts, as they are are only printed in a static way.…”
Section: Related Workmentioning
confidence: 99%
“…It implements a key word search by using SQL-like queries. Additionally, it provides data mining models to classify messages in different categories and applies authorship analysis (Iqbal, Hadjidj, Fung, & Debbabi, 2008) on the basis of stylemetric (Abbasi & Chen, 2008) features in order to identify the most conceivable authors of anonymous messages. A drawback of the tool is that it allows almost no interaction with the resulting graph or charts, as they are are only printed in a static way.…”
Section: Related Workmentioning
confidence: 99%
“…Forged Message Detection: A large corpus of research has been performed on determining the author of an email. These techniques typically leverage stylometry and machine learning and return the most probable author among a set of candidates [4,7,8,13,15]. From our point of view, these approaches suffer of two major problems: the first one is that they typically need a set of possible authors, which in our case we do not have.…”
Section: Related Workmentioning
confidence: 99%
“…A considerable number of studies have been conducted on authorship identification and characterization. For instance, previous studies on authorship identification investigated ways to identify patterns of terrorist communications [8], the author of a particular e-mail for computer forensic purposes [9][10][11], as well as how to collect digital evidence for investigations [12] or solve a disputed literary, historical [13], or musical authorship [14][15][16]. Work on authorship characterization has targeted primarily gender attribution [17][18][19] and the classification of the author education level [20].…”
Section: Related Workmentioning
confidence: 99%