2013
DOI: 10.1007/s10115-013-0658-2
|View full text |Cite
|
Sign up to set email alerts
|

Email mining: tasks, common techniques, and tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
5

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 56 publications
(23 citation statements)
references
References 41 publications
0
18
0
5
Order By: Relevance
“…A number of email mining studies have focused on people-related tasks, including name recognition and reference resolution, contact information extraction, identity modeling and resolution, role discovery, and expert identification, as well as the generation of access to large-scale email archives from multiple viewpoints by using a faceted search [115]. Moreover, some significant applications of email mining include tasks, such as filtering emails based on priority and identifying spam and phishing emails, as well as automatic answering, thread summarization, contact analysis, email visualization, network property analysis, and categorization [116,117].…”
Section: Email Miningmentioning
confidence: 99%
“…A number of email mining studies have focused on people-related tasks, including name recognition and reference resolution, contact information extraction, identity modeling and resolution, role discovery, and expert identification, as well as the generation of access to large-scale email archives from multiple viewpoints by using a faceted search [115]. Moreover, some significant applications of email mining include tasks, such as filtering emails based on priority and identifying spam and phishing emails, as well as automatic answering, thread summarization, contact analysis, email visualization, network property analysis, and categorization [116,117].…”
Section: Email Miningmentioning
confidence: 99%
“…For example, a sender wants to erase permanently and completely the message within a specified number of times, so that the sender does not need to worry about adverse effects as a result that the message will maintain long-term residence in system. Faced with the fact that various data mining techniques [12] have been applied on privacy data, it is obviously essential and necessary for a secure communication system that the sensitive data is timely destroyed to evade detection and forensic investigator.…”
Section: Forward Secrecy Encryptionmentioning
confidence: 99%
“…The content of business email is normally different from general text data in many documents. As pointed out by Tang et al [22], emails are often much shorter and more briefly written compared with documents such as stories and user manuals. In addition, emails often contain some faddish words or abbreviations that may not appear in traditional dictionaries.…”
Section: A Overivewmentioning
confidence: 99%
“…Over the past five decades, email has become one of the easiest and reliable modes of communication, mainly because of its efficiency, low cost and support for wide range of information [1]. Recent studies show that email is still number one online activity though there are new concepts like social networking [3].…”
Section: Introductionmentioning
confidence: 99%