{"id":"https://openalex.org/W2035395173","doi":"https://doi.org/10.1145/1774088.1774428","title":"e-mail authorship verification for forensic investigation","display_name":"e-mail authorship verification for forensic investigation","publication_year":2010,"publication_date":"2010-03-22","ids":{"openalex":"https://openalex.org/W2035395173","doi":"https://doi.org/10.1145/1774088.1774428","mag":"2035395173"},"language":"en","primary_location":{"id":"doi:10.1145/1774088.1774428","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1774088.1774428","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068447696","display_name":"Farkhund Iqbal","orcid":"https://orcid.org/0000-0001-9081-3598"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Farkhund Iqbal","raw_affiliation_strings":["Concordia University, Montreal, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, Quebec, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100878842","display_name":"Liaquat Ali Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Liaquat A. Khan","raw_affiliation_strings":["Concordia University, Montreal, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, Quebec, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021788449","display_name":"Benjamin C. M. Fung","orcid":"https://orcid.org/0000-0001-8423-2906"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Benjamin C. M. Fung","raw_affiliation_strings":["Concordia University, Montreal, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, Quebec, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028605138","display_name":"Mourad Debbabi","orcid":"https://orcid.org/0000-0003-3015-3043"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mourad Debbabi","raw_affiliation_strings":["Concordia University, Montreal, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal, Quebec, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068447696"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":4.6549,"has_fulltext":false,"cited_by_count":65,"citation_normalized_percentile":{"value":0.94616521,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1591","last_page":"1598"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7701181769371033},{"id":"https://openalex.org/keywords/suspect","display_name":"Suspect","score":0.7471290826797485},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.6913770437240601},{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.6683540940284729},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6333987712860107},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5417441129684448},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5191878080368042},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4984581470489502},{"id":"https://openalex.org/keywords/plagiarism-detection","display_name":"Plagiarism detection","score":0.432931125164032},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.41300636529922485},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40133580565452576},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.360331654548645},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.35203081369400024},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32119524478912354},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.27650734782218933},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09492596983909607}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7701181769371033},{"id":"https://openalex.org/C2778223634","wikidata":"https://www.wikidata.org/wiki/Q224952","display_name":"Suspect","level":2,"score":0.7471290826797485},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.6913770437240601},{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.6683540940284729},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6333987712860107},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5417441129684448},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5191878080368042},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4984581470489502},{"id":"https://openalex.org/C2780907237","wikidata":"https://www.wikidata.org/wiki/Q2986238","display_name":"Plagiarism detection","level":2,"score":0.432931125164032},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.41300636529922485},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40133580565452576},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.360331654548645},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.35203081369400024},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32119524478912354},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.27650734782218933},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09492596983909607},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1774088.1774428","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1774088.1774428","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 ACM Symposium on Applied Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.329.7343","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.7343","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://users.encs.concordia.ca/~fung/pub/IKFD10sac.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1512098439","https://openalex.org/W1570448133","https://openalex.org/W1606480292","https://openalex.org/W1816167855","https://openalex.org/W1817561967","https://openalex.org/W1974719208","https://openalex.org/W1975653240","https://openalex.org/W1976095474","https://openalex.org/W1981745473","https://openalex.org/W1987380777","https://openalex.org/W1997840447","https://openalex.org/W2009312480","https://openalex.org/W2025403586","https://openalex.org/W2043976122","https://openalex.org/W2044794736","https://openalex.org/W2052354855","https://openalex.org/W2064762878","https://openalex.org/W2074459654","https://openalex.org/W2092475127","https://openalex.org/W2100304601","https://openalex.org/W2101717196","https://openalex.org/W2112076978","https://openalex.org/W2118537526","https://openalex.org/W2121360488","https://openalex.org/W2123407642","https://openalex.org/W2131904035","https://openalex.org/W2139212933","https://openalex.org/W2145748623","https://openalex.org/W2150999626","https://openalex.org/W2325881574","https://openalex.org/W2966207845","https://openalex.org/W3193477162","https://openalex.org/W4285719527","https://openalex.org/W6679539681","https://openalex.org/W7073546995"],"related_works":["https://openalex.org/W1987732684","https://openalex.org/W2286465138","https://openalex.org/W3197016913","https://openalex.org/W637393809","https://openalex.org/W2808742736","https://openalex.org/W1526983901","https://openalex.org/W3126526144","https://openalex.org/W2492910442","https://openalex.org/W2255926860","https://openalex.org/W2901744059"],"abstract_inverted_index":{"The":[0,149],"Internet":[1],"provides":[2],"a":[3,21,54,60,140,176],"convenient":[4],"platform":[5],"for":[6],"cyber":[7,37],"criminals":[8],"to":[9,74,163],"anonymously":[10],"conduct":[11],"their":[12],"illegitimate":[13],"activities,":[14],"such":[15],"as":[16,143],"phishing":[17],"and":[18,39,97,160],"spamming.":[19],"As":[20],"result,":[22],"in":[23,35,105,144,170],"recent":[24],"years,":[25],"authorship":[26,51,92,136],"analysis":[27],"of":[28,50,56,91,94,108,146,158,175],"anonymous":[29,80],"e-mails":[30,57],"has":[31],"received":[32],"some":[33],"attention":[34],"the":[36,48,69,85,89,106,113,130,134,173],"forensic":[38,109],"data":[40],"mining":[41],"communities.":[42],"In":[43],"this":[44],"paper,":[45],"we":[46,72,111],"study":[47],"problem":[49,90,138],"verification:":[52],"given":[53],"set":[55],"written":[58,83],"by":[59,84],"suspect":[61],"along":[62],"with":[63,139],"an":[64,79,153],"e-mail":[65,81,126,135],"dataset":[66,127],"collected":[67],"from":[68],"sample":[70],"population,":[71],"want":[73],"determine":[75],"whether":[76],"or":[77],"not":[78],"is":[82],"suspect.":[86],"To":[87],"address":[88],"verification":[93,137],"textual":[95],"documents":[96],"employ":[98],"detection":[99],"measures":[100],"that":[101,129],"are":[102],"more":[103],"suited":[104],"context":[107],"investigation,":[110],"borrow":[112],"NIST's":[114],"speaker":[115,147],"recognition":[116],"evaluation":[117],"(SRE)":[118],"framework.":[119],"Our":[120],"experimental":[121],"results":[122],"on":[123],"real":[124],"world":[125],"suggest":[128],"employed":[131],"framework":[132,151],"addresses":[133],"matching":[141],"success":[142],"case":[145],"verification.":[148],"proposed":[150],"produces":[152],"average":[154],"equal":[155,162],"error":[156],"rate":[157],"15--20%":[159],"minDCF":[161],"0.0671":[164],"(with":[165],"10-fold":[166],"cross":[167],"validation":[168],"technique)":[169],"correctly":[171],"verifying":[172],"author":[174],"malicious":[177],"e-mail.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":7}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
