File(s) under permanent embargo
Email communications analysis: how to use computational intelligence methods and tools?
conference contribution
posted on 2023-05-23, 03:27 authored by Michael NegnevitskyMichael Negnevitsky, Lim, MJ, Hartnett, JS, Reznik, LThe paper aims at investigating computational intelligence methodologies for detecting a change in communication behavioral patterns between e-mail subscribers. This change may indicate a change of social status and behavior, which could be used for early discovery of some preparation to antisocial activity, including but not limiting to terrorist attacks. The patterns in the social interactions or contacts between people by e-mail can be analyzed using social network analysis and user behavior analysis. In this paper we provide a review of the work related to the areas of dynamic modeling and link prediction of social networks, and anomaly detection for detecting changes in the behavior of e-mail usage. The feasibility of neural networks and fuzzy logic methodologies applications for a change detection system design is discussed, as well as a discussion about an e-mail simulation model currently being developed.
History
Publication title
Proceedings of the 2005 IEEE International Conference in Computational Intelligence for Homeland Security and Personal Safety (CIHSPS 2005)Editors
D. Fogel and V. PiuriPagination
16-23ISBN
0-7803-9176-4Department/School
School of EngineeringPublisher
IEEEPlace of publication
Orlando, FL, USAEvent title
CIHSPS: Computational Intelligence for Homeland Security and Personal SafetyEvent Venue
Orlando, FL, USADate of Event (Start Date)
2005-03-31Date of Event (End Date)
2005-04-01Rights statement
Copyright 2005 IEEERepository Status
- Restricted