There is an alarming increase in the number of cyber-crime incidents through anonymous e-mails. The problem of email authorship attribution is to identify the most plausible author of an anonymous e-mail from a group of potential suspects. Most previous contributions employed a traditional classification approach, such as decision tree and Support Vector Machine (SVM), to identify the author and studied the effects of different writing style features on the classification accuracy. However, little attention has been given on ensuring the quality of the evidence. In this paper, we introduce an innovative data mining method to capture the writeprint of every suspect and model it as combinations of features that occurred frequently in the susp...
In this paper, we describe our work which attempts to mine e-mail authorship for the purpose of comp...
In this paper, we describe our work which attempts to mine e-mail authorship for the purpose of comp...
This series vol. entitled: ICT Systems Security and Privacy Protection: 29th IFIP TC 11 Internationa...
Many criminals exploit the convenience of anonymity in the cyber world to conduct illegal activities...
We describe an investigation into e-mail content mining for author identification, or authorship att...
E-mail has become the most common way to communicate on the Internet, but e-mail security and privac...
In this paper we describe an investigation of forensic authorship identification or categorisation u...
The cyber world provides an anonymous environment for criminals to conduct malicious activities such...
E-mail communication is often abused for conducting social engineering attacks including spamming, p...
E-mail communication is often abused for conducting social engineering attacks including spamming, p...
E-mail has become the most popular Internet application and with its rise in use has come an inevita...
We describe an investigation into e-mail content mining for author identification, or authorship att...
E-mail communication is often abused for conducting social engineering attacks including spamming, p...
In this chapter, we briefly overview the relatively new discipline of computer forensics and describ...
In this chapter, we briefly overview the relatively new discipline of computer forensics and describ...
In this paper, we describe our work which attempts to mine e-mail authorship for the purpose of comp...
In this paper, we describe our work which attempts to mine e-mail authorship for the purpose of comp...
This series vol. entitled: ICT Systems Security and Privacy Protection: 29th IFIP TC 11 Internationa...
Many criminals exploit the convenience of anonymity in the cyber world to conduct illegal activities...
We describe an investigation into e-mail content mining for author identification, or authorship att...
E-mail has become the most common way to communicate on the Internet, but e-mail security and privac...
In this paper we describe an investigation of forensic authorship identification or categorisation u...
The cyber world provides an anonymous environment for criminals to conduct malicious activities such...
E-mail communication is often abused for conducting social engineering attacks including spamming, p...
E-mail communication is often abused for conducting social engineering attacks including spamming, p...
E-mail has become the most popular Internet application and with its rise in use has come an inevita...
We describe an investigation into e-mail content mining for author identification, or authorship att...
E-mail communication is often abused for conducting social engineering attacks including spamming, p...
In this chapter, we briefly overview the relatively new discipline of computer forensics and describ...
In this chapter, we briefly overview the relatively new discipline of computer forensics and describ...
In this paper, we describe our work which attempts to mine e-mail authorship for the purpose of comp...
In this paper, we describe our work which attempts to mine e-mail authorship for the purpose of comp...
This series vol. entitled: ICT Systems Security and Privacy Protection: 29th IFIP TC 11 Internationa...