Graph-based technologies for intelligence analysis
Communications of the ACM - Homeland security
Discovery of implicit and explicit connections between people using email utterance
ECSCW'03 Proceedings of the eighth conference on European Conference on Computer Supported Cooperative Work
Detecting unusual email communication
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
Structure in the Enron Email Dataset
Computational & Mathematical Organization Theory
Detecting word substitutions: PMI vs. HMM
SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
A comprehensive survey of numeric and symbolic outlier mining techniques
Intelligent Data Analysis
Measures to detect word substitution in intercepted communication
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
Keyword filtering is a commonly used way to select, from a set of intercepted messages, those that need further scrutiny. An obvious countermeasure is to replace words that might be on a keyword list by others. We show that this strategy itself creates a signature in the altered messages that makes them readily detectable using several forms of matrix decomposition. Not only can unusual messages be detected, but sets of related messages can be detected as conversations, even when their endpoints have been obscured (by using transient email addresses, stolen cell phones and so on).