Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts.
Adam J. O'DonnellWalter C. MankowskiJeff AbrahamsonPublished in: CEAS (2006)
Keyphrases
- social network analysis
- social networks
- network analysis
- web mining
- complex networks
- homeland security
- communication patterns
- graph theory
- fraud detection
- technology enhanced learning
- link prediction
- law enforcement
- interaction patterns
- centrality measures
- mining and social network analysis
- community detection
- social structure
- link discovery
- community mining