{"id":"https://openalex.org/W1539829071","doi":"https://doi.org/10.2498/cit.1000984","title":"Suspicious E-mail Detection via Decision Tree: A Data Mining Approach","display_name":"Suspicious E-mail Detection via Decision Tree: A Data Mining Approach","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W1539829071","doi":"https://doi.org/10.2498/cit.1000984","mag":"1539829071"},"language":"en","primary_location":{"id":"doi:10.2498/cit.1000984","is_oa":true,"landing_page_url":"https://doi.org/10.2498/cit.1000984","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/1636/1340","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://cit.fer.hr/index.php/CIT/article/download/1636/1340","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112609494","display_name":"A. Balamurugan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Appavu Balamurugan","raw_affiliation_strings":["Thiagarajar College of Engineering, Madurai, India"],"affiliations":[{"raw_affiliation_string":"Thiagarajar College of Engineering, Madurai, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045157545","display_name":"R. Rajaram","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ramasamy Rajaram","raw_affiliation_strings":["Thiagarajar College of Engineering, Madurai, India"],"affiliations":[{"raw_affiliation_string":"Thiagarajar College of Engineering, Madurai, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112609494"],"corresponding_institution_ids":[],"apc_list":{"value":450,"currency":"EUR","value_usd":485},"apc_paid":{"value":450,"currency":"EUR","value_usd":485},"fwci":1.5824,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.87935226,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"15","issue":"2","first_page":"161","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.878657341003418},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8479335904121399},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.8301528692245483},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.598081111907959},{"id":"https://openalex.org/keywords/id3-algorithm","display_name":"ID3 algorithm","score":0.5960148572921753},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5502177476882935},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.48467734456062317},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48095574975013733},{"id":"https://openalex.org/keywords/id3","display_name":"ID3","score":0.4611611068248749},{"id":"https://openalex.org/keywords/test-set","display_name":"Test set","score":0.43960684537887573},{"id":"https://openalex.org/keywords/decision-tree-learning","display_name":"Decision tree learning","score":0.4293700158596039},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.425258606672287},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4023226499557495},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3564663529396057},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3529055714607239},{"id":"https://openalex.org/keywords/incremental-decision-tree","display_name":"Incremental decision tree","score":0.2351049780845642},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.08557528257369995},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.07052505016326904},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.06803250312805176}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.878657341003418},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8479335904121399},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.8301528692245483},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.598081111907959},{"id":"https://openalex.org/C183931066","wikidata":"https://www.wikidata.org/wiki/Q1653378","display_name":"ID3 algorithm","level":5,"score":0.5960148572921753},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5502177476882935},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.48467734456062317},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48095574975013733},{"id":"https://openalex.org/C174599459","wikidata":"https://www.wikidata.org/wiki/Q1054220","display_name":"ID3","level":4,"score":0.4611611068248749},{"id":"https://openalex.org/C169903167","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Test set","level":2,"score":0.43960684537887573},{"id":"https://openalex.org/C5481197","wikidata":"https://www.wikidata.org/wiki/Q16766476","display_name":"Decision tree learning","level":3,"score":0.4293700158596039},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.425258606672287},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4023226499557495},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3564663529396057},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3529055714607239},{"id":"https://openalex.org/C10229987","wikidata":"https://www.wikidata.org/wiki/Q17083028","display_name":"Incremental decision tree","level":4,"score":0.2351049780845642},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.08557528257369995},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.07052505016326904},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06803250312805176},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2498/cit.1000984","is_oa":true,"landing_page_url":"https://doi.org/10.2498/cit.1000984","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/1636/1340","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},{"id":"pmh:oai:hrcak.srce.hr:44629","is_oa":true,"landing_page_url":"http://hrcak.srce.hr/44629","pdf_url":null,"source":{"id":"https://openalex.org/S4306400677","display_name":"Hr\u010dak Portal of scientific journals of Croatia (University Computing Centre)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210104502","host_organization_name":"United Nations University","host_organization_lineage":["https://openalex.org/I4210104502"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of computing and information technology","raw_type":"text"}],"best_oa_location":{"id":"doi:10.2498/cit.1000984","is_oa":true,"landing_page_url":"https://doi.org/10.2498/cit.1000984","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/1636/1340","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1539829071.pdf","grobid_xml":"https://content.openalex.org/works/W1539829071.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W148103248","https://openalex.org/W176196942","https://openalex.org/W259338706","https://openalex.org/W1484485089","https://openalex.org/W1514800236","https://openalex.org/W1562316073","https://openalex.org/W1566068030","https://openalex.org/W1586301419","https://openalex.org/W1994796397","https://openalex.org/W2109932952","https://openalex.org/W2114535528","https://openalex.org/W2140190241","https://openalex.org/W2435251607","https://openalex.org/W6600135713","https://openalex.org/W6600310816","https://openalex.org/W6631495455","https://openalex.org/W6837215419"],"related_works":["https://openalex.org/W2366021451","https://openalex.org/W3038416748","https://openalex.org/W2592385415","https://openalex.org/W2737010471","https://openalex.org/W2350569555","https://openalex.org/W2188355725","https://openalex.org/W2337897523","https://openalex.org/W3004909479","https://openalex.org/W2169280041","https://openalex.org/W3173213304"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3],"new":[4],"method":[5],"to":[6,49,59,72],"detect":[7],"unusual":[8],"and":[9,30,33,40,88],"deceptive":[10,19,77],"communication":[11],"in":[12,85],"email":[13,75],"data.":[14,94],"Deception":[15],"theory":[16],"suggests":[17],"that":[18,67],"writing":[20],"is":[21,68,70],"characterized":[22],"by":[23],"reduced":[24],"frequency":[25,35],"of":[26,36,47,52],"first":[27],"person":[28],"pronouns":[29],"exclusive":[31],"words":[32,39],"elevated":[34],"negative":[37],"emotion":[38],"action":[41],"verbs.":[42],"We":[43],"apply":[44],"this":[45],"model":[46],"deception":[48],"the":[50,61,74],"set":[51],"Email":[53],"dataset,":[54],"then":[55],"applied":[56],"ID3":[57],"algorithm":[58],"generate":[60],"decision":[62,65],"tree":[63,66],".The":[64],"generated":[69],"used":[71],"test":[73],"as":[76],"or":[78],"not.":[79],"In":[80],"particular":[81],"we":[82],"are":[83],"interested":[84],"detecting":[86],"fraudulent":[87],"possibly":[89],"criminal":[90],"behavior":[91],"from":[92],"such":[93]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
