eCite Digital Repository

Email communications analysis: how to use computational intelligence methods and tools?

Citation

Negnevitsky, M and Lim, MJ and Hartnett, JS and Reznik, L, Email communications analysis: how to use computational intelligence methods and tools?, Proceedings of the 2005 IEEE International Conference in Computational Intelligence for Homeland Security and Personal Safety (CIHSPS 2005), 31 March - 1 April 2005, Orlando, FL, USA, pp. 16-23. ISBN 0-7803-9176-4 (2005) [Refereed Conference Paper]

Copyright Statement

Copyright 2005 IEEE

DOI: doi:10.1109/CIHSPS.2005.1500603

Abstract

The paper aims at investigating computational intelligence methodologies for detecting a change in communication behavioral patterns between e-mail subscribers. This change may indicate a change of social status and behavior, which could be used for early discovery of some preparation to antisocial activity, including but not limiting to terrorist attacks. The patterns in the social interactions or contacts between people by e-mail can be analyzed using social network analysis and user behavior analysis. In this paper we provide a review of the work related to the areas of dynamic modeling and link prediction of social networks, and anomaly detection for detecting changes in the behavior of e-mail usage. The feasibility of neural networks and fuzzy logic methodologies applications for a change detection system design is discussed, as well as a discussion about an e-mail simulation model currently being developed.

Item Details

Item Type:Refereed Conference Paper
Keywords:intelligence methodologies, communication behavioral patterns, social networks, e-mail subscribers
Research Division:Information and Computing Sciences
Research Group:Computation Theory and Mathematics
Research Field:Analysis of Algorithms and Complexity
Objective Division:Information and Communication Services
Objective Group:Other Information and Communication Services
Objective Field:Information and Communication Services not elsewhere classified
Author:Negnevitsky, M (Professor Michael Negnevitsky)
Author:Lim, MJ (Mr Mark Lim)
Author:Hartnett, JS (Mrs Jacky Hartnett)
ID Code:37806
Year Published:2005
Deposited By:Engineering
Deposited On:2005-08-01
Last Modified:2012-12-12
Downloads:0

Repository Staff Only: item control page