Mining writeprints from anonymous e-mails for forensic investigation

  title={Mining writeprints from anonymous e-mails for forensic investigation},
  author={Farkhund Iqbal and Hamad Binsalleeh and Benjamin C. M. Fung and Mourad Debbabi},
  journal={Digital Investigation},
Many criminals exploit the convenience of anonymity in the cyber world to conduct illegal activities. E-mail is the most commonly used medium for such activities. Extracting knowledge and information from e-mail text has become an important step for cybercrime investigation and evidence collection. Yet, it is one of the most challenging and timeconsuming tasks due to special characteristics of e-mail dataset. In this paper, we focus on the problem of mining the writing styles from a collection… CONTINUE READING
Highly Cited
This paper has 104 citations. REVIEW CITATIONS
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS
65 Citations
28 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 65 extracted citations

105 Citations

Citations per Year
Semantic Scholar estimates that this publication has 105 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 28 references

A novel approach of mining write-prints for authorship attribution in e-mail forensics

  • F. Iqbal, R. Hadjidj, B.C.M. Fung, M. Debbabi
  • Digital Investigation, 5:42–51,
  • 2008
Highly Influential
11 Excerpts

Outside the cave of shadows: using syntactic annotation to enhance authorship attribution

  • R. H. Baayen, H. Van Halteren, F. J. Tweedie
  • Literary and Linguistic Computing, 2:110–120,
  • 1996
Highly Influential
6 Excerpts

The federalist revisited: new directions in authorship attribution

  • D. I. Holmes, R. S. Forsyth
  • Literary and Linguistic Computing, 10(2):111–127,
  • 1995
Highly Influential
5 Excerpts

Shakespeare, Fletcher, and the two Noble Kinsmen

  • G. R. Ledger, T.V.N. Merriam
  • Literary and Linguistic Computing, 9:235–248,
  • 1994
Highly Influential
7 Excerpts

Similar Papers

Loading similar papers…