Towards an integrated e-mail forensic analysis framework

R Hadjidj, M Debbabi, H Lounis, F Iqbal, A Szporer… - digital investigation, 2009 - Elsevier
Due to its simple and inherently vulnerable nature, e-mail communication is abused for
numerous illegitimate purposes. E-mail spamming, phishing, drug trafficking, cyber bullying …

[PDF][PDF] A novel method of spam mail detection using text based clustering approach

M Basavaraju, DR Prabhakar - International Journal of Computer …, 2010 - Citeseer
ABSTRACT A novel method of efficient spam mail classification using clustering techniques
is presented in this research paper. E-mail spam is one of the major problems of the today's …

ML-EC2: an algorithm for multi-label email classification using clustering

A Sharaff, NK Nagwani - … Journal of Web-Based Learning and …, 2020 - igi-global.com
A multi-label variant of email classification named ML-EC2 (multi-label email classification
using clustering) has been proposed in this work. ML-EC2 is a hybrid algorithm based on …

[图书][B] Machine learning for authorship attribution and cyber forensics

F Iqbal, M Debbabi, BCM Fung - 2020 - Springer
The International Series on Computer Entertainment and Media Technology presents
forward-looking ideas, cutting-edge research, and in-depth case studies across a wide …

Annotating needles in the haystack without looking: Product information extraction from emails

W Zhang, A Ahmed, J Yang, V Josifovski… - Proceedings of the 21th …, 2015 - dl.acm.org
Business-to-consumer (B2C) emails are usually generated by filling structured user data (eg
purchase, event) into templates. Extracting structured data from B2C emails allows users to …

[HTML][HTML] InVEST: Intelligent visual email search and triage

J Koven, E Bertini, L Dubois, N Memon - Digital Investigation, 2016 - Elsevier
Large email data sets are often the focus of criminal and civil investigations. This has
created a daunting task for investigators due to the extraordinary size of many of these …

Lessons learned developing a visual analytics solution for investigative analysis of scamming activities

J Koven, C Felix, H Siadati… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
The forensic investigation of communication datasets which contain unstructured text, social
network information, and metadata is a complex task that is becoming more important due to …

An object oriented email clustering model using weighted similarities between emails attributes

NK Nagwani, A Bhansali - … Journal of research and reviews in …, 2010 - search.proquest.com
Email mining is a process of discovering useful patterns from emails. Clustering techniques
can be applied over email data to create groups of similar emails. An email can be …

Template induction over unstructured email corpora

J Proskurnia, MA Cartright, L Garcia-Pueyo… - Proceedings of the 26th …, 2017 - dl.acm.org
Unsupervised template induction over email data is a central component in applications
such as information extraction, document classification, and auto-reply. The benefits of …

Generating and applying outgoing communication templates

B Miklos, J Proskurnia, LG Pueyo, MA Cartright… - US Patent …, 2018 - Google Patents
Methods, apparatus, systems, and computer-readable media are provided for generating
and applying outgoing communication templates. In various implementations a corpus of …