{"id":"https://openalex.org/W2119582996","doi":"https://doi.org/10.1145/2676723.2693634","title":"Parallel Author Verification of E-mail (Abstract Only)","display_name":"Parallel Author Verification of E-mail (Abstract Only)","publication_year":2015,"publication_date":"2015-02-24","ids":{"openalex":"https://openalex.org/W2119582996","doi":"https://doi.org/10.1145/2676723.2693634","mag":"2119582996"},"language":"en","primary_location":{"id":"doi:10.1145/2676723.2693634","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2676723.2693634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 46th ACM Technical Symposium on Computer Science Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024658548","display_name":"Andreas Kellas","orcid":"https://orcid.org/0009-0001-8763-2400"},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andreas Kellas","raw_affiliation_strings":["United States Military Academy, West Point, NY, USA"],"affiliations":[{"raw_affiliation_string":"United States Military Academy, West Point, NY, USA","institution_ids":["https://openalex.org/I192545095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058689143","display_name":"Alexander Molnar","orcid":null},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alexander Molnar","raw_affiliation_strings":["United States Military Academy, West Point, NY, USA"],"affiliations":[{"raw_affiliation_string":"United States Military Academy, West Point, NY, USA","institution_ids":["https://openalex.org/I192545095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065996818","display_name":"Leo St. Amour","orcid":null},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Leo St. Amour","raw_affiliation_strings":["United States Military Academy, West Point, NY, USA"],"affiliations":[{"raw_affiliation_string":"United States Military Academy, West Point, NY, USA","institution_ids":["https://openalex.org/I192545095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039280448","display_name":"Frederick Ulrich","orcid":null},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frederick Ulrich","raw_affiliation_strings":["United States Military Academy, West Point, NY, USA"],"affiliations":[{"raw_affiliation_string":"United States Military Academy, West Point, NY, USA","institution_ids":["https://openalex.org/I192545095"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083319931","display_name":"Suzanne J. Matthews","orcid":"https://orcid.org/0000-0001-9170-2240"},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Suzanne J. Matthews","raw_affiliation_strings":["United States Military Academy, West Point, NY, USA"],"affiliations":[{"raw_affiliation_string":"United States Military Academy, West Point, NY, USA","institution_ids":["https://openalex.org/I192545095"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5024658548"],"corresponding_institution_ids":["https://openalex.org/I192545095"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05066979,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"717","last_page":"717"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7831889390945435},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6547819972038269},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.626586377620697},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5659510493278503},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5493707656860352},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5439915060997009},{"id":"https://openalex.org/keywords/style","display_name":"Style (visual arts)","score":0.515929102897644},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4967504143714905},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.49202343821525574},{"id":"https://openalex.org/keywords/writing-style","display_name":"Writing style","score":0.47234880924224854},{"id":"https://openalex.org/keywords/harassment","display_name":"Harassment","score":0.4467528164386749},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4441072642803192},{"id":"https://openalex.org/keywords/authorship-attribution","display_name":"Authorship attribution","score":0.43555355072021484},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.43131914734840393},{"id":"https://openalex.org/keywords/attribution","display_name":"Attribution","score":0.4241774082183838},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15415427088737488},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.12165522575378418},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.07161915302276611}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7831889390945435},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6547819972038269},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.626586377620697},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5659510493278503},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5493707656860352},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5439915060997009},{"id":"https://openalex.org/C2776445246","wikidata":"https://www.wikidata.org/wiki/Q1792644","display_name":"Style (visual arts)","level":2,"score":0.515929102897644},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4967504143714905},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.49202343821525574},{"id":"https://openalex.org/C13622073","wikidata":"https://www.wikidata.org/wiki/Q2243831","display_name":"Writing style","level":2,"score":0.47234880924224854},{"id":"https://openalex.org/C2778976716","wikidata":"https://www.wikidata.org/wiki/Q3240539","display_name":"Harassment","level":2,"score":0.4467528164386749},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4441072642803192},{"id":"https://openalex.org/C3020202489","wikidata":"https://www.wikidata.org/wiki/Q2032038","display_name":"Authorship attribution","level":2,"score":0.43555355072021484},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.43131914734840393},{"id":"https://openalex.org/C143299363","wikidata":"https://www.wikidata.org/wiki/Q900584","display_name":"Attribution","level":2,"score":0.4241774082183838},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15415427088737488},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.12165522575378418},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.07161915302276611},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2676723.2693634","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2676723.2693634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 46th ACM Technical Symposium on Computer Science Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3213969421","https://openalex.org/W4205570701","https://openalex.org/W2610868728","https://openalex.org/W2975078241","https://openalex.org/W3007882868","https://openalex.org/W2621283262","https://openalex.org/W2891733904","https://openalex.org/W2623063325","https://openalex.org/W2785638271","https://openalex.org/W4382050487"],"abstract_inverted_index":{"Cyber-crime":[0],"is":[1,39,61,84],"becoming":[2],"alarmingly":[3],"common":[4],"through":[5,18],"the":[6,31,52,56,78],"use":[7],"of":[8,22,96,104],"anonymous":[9,57,102],"e-mails.":[10],"Author":[11],"attribution":[12,94],"helps":[13],"digital":[14,64],"forensics":[15],"investigators":[16],"filter":[17],"a":[19,42,62,72,82,89,97],"large":[20],"set":[21],"possible":[23],"authors":[24],"and":[25,48],"focus":[26],"traditional":[27],"investigative":[28],"techniques":[29],"on":[30],"most":[32],"probable":[33],"culprits.":[34],"A":[35,59],"recent":[36],"promising":[37],"technique":[38],"to":[40,51],"construct":[41],"write-print":[43,53,60,83],"for":[44,80,92],"each":[45],"known":[46],"author,":[47],"compare":[49],"it":[50,88],"extracted":[54],"from":[55,71],"message(s).":[58],"unique":[63],"fingerprint":[65],"created":[66],"by":[67],"mining":[68],"frequent":[69],"patterns":[70],"particular":[73],"author's":[74],"writing":[75],"style.":[76],"However,":[77],"process":[79],"generating":[81],"very":[85],"slow,":[86],"making":[87],"poor":[90],"choice":[91],"author":[93],"situations":[95],"time-sensitive":[98],"nature":[99],"such":[100],"as":[101],"threats":[103],"attack,":[105],"exposure,":[106],"or":[107],"ongoing":[108],"harassment.":[109]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
