{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:07:55Z","timestamp":1742998075940,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319051482"},{"type":"electronic","value":"9783319051499"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05149-9_6","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T09:36:27Z","timestamp":1394184987000},"page":"81-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Surveillance: A Case Study with Enron Email Data Set"],"prefix":"10.1007","author":[{"given":"Heesung","family":"Do","sequence":"first","affiliation":[]},{"given":"Peter","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"6_CR1","unstructured":"Akoglu, L., McGlohon, M., Faloutsos, C.: Anomaly detection in large graphs. In: CMU-CS-09-173 Technical report (2009)"},{"issue":"5","key":"6_CR2","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1016\/j.comnet.2007.11.011","volume":"52","author":"N Bansod","year":"2008","unstructured":"Bansod, N., Malgi, A., Choi, B.K., Mayo, J.: Muon: epidemic based mutual anonymity in unstructured p2p networks. Comput. Netw. 52(5), 915\u2013934 (2008)","journal-title":"Comput. Netw."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web mixes: a system for anonymous and unobservable internet access. In: Workshop on Design Issues in Anonymity and Unobservability, pp. 115\u2013129 (2000)","DOI":"10.1007\/3-540-44702-4_7"},{"issue":"3","key":"6_CR4","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10588-005-5381-4","volume":"11","author":"A Chapanond","year":"2005","unstructured":"Chapanond, A., Krishnamoorthy, M.S., Yener, B.: Graph theoretic and spectral analysis of enron email data. Comput. Math. Organ. Theor. 11(3), 265\u2013281 (2005)","journal-title":"Comput. Math. Organ. Theor."},{"key":"6_CR5","unstructured":"CMU. Enron email dataset. http:\/\/www.cs.cmu.edu\/enron"},{"key":"6_CR6","unstructured":"F. E. R. Commission. Enron investigation. http:\/\/www.ferc.gov\/industries\/electric\/indus-act\/wec\/enron\/info-release.asp"},{"key":"6_CR7","unstructured":"Danezis, G., Wittneben, B.: The economics of mass surveillance and the questionable value of anonymous communications. In: Anderson, R., (eds.) Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK, June 2006"},{"issue":"3","key":"6_CR8","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10588-005-5377-0","volume":"11","author":"J Diesner","year":"2005","unstructured":"Diesner, J., Frantz, T.L., Carley, K.M.: Communication networks from the enron email corpus \u201cit\u2019s always about the people. Enron is no different\u201d. Comput. Math. Organ. Theor. 11(3), 201\u2013228 (2005)","journal-title":"Comput. Math. Organ. Theor."},{"issue":"2","key":"6_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"DM Goldschlag","year":"1999","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Onion routing. Commun. ACM 42(2), 39\u201341 (1999)","journal-title":"Commun. ACM"},{"key":"6_CR10","unstructured":"ISI. Enron dataset. http:\/\/www.isi.edu\/adibi\/Enron\/Enron.htm"},{"issue":"3","key":"6_CR11","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10588-005-5379-y","volume":"11","author":"PS Keila","year":"2005","unstructured":"Keila, P.S., Skillicorn, D.B.: Structure in the enron email dataset. Comput. Math. Organ. Theor. 11(3), 183\u2013199 (2005)","journal-title":"Comput. Math. Organ. Theor."},{"key":"6_CR12","unstructured":"NarusInsight. Narusinsight solutions for traffic intelligence. http:\/\/www.narus.com\/index.php\/product"},{"issue":"6","key":"6_CR13","doi-asserted-by":"crossref","first-page":"839","DOI":"10.3233\/JCS-2005-13602","volume":"13","author":"R Sherwood","year":"2005","unstructured":"Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P$$^{\\text{5 }}$$: a protocol for scalable anonymous communication. J. Comput. Secur. 13(6), 839\u2013876 (2005)","journal-title":"J. Comput. Secur."},{"key":"6_CR14","unstructured":"Shetty, J., Adibi, J.: The enron email dataset database schema and brief statistical report (2004)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Shetty, J., Adibi, J.: Discovering important nodes through graph entropy the case of enron email database. In: Proceedings of the 3rd International Workshop on Link Discovery, LinkKDD \u201905, pp. 74\u201381, ACM, New York (2005)","DOI":"10.1145\/1134271.1134282"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Shields, C., Levine, B.N.: A protocol for anonymous communication over the internet. In: ACM Conference on Computer and Communications Security, pp. 33\u201342 (2000)","DOI":"10.1145\/352600.352607"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10612-004-6167-6","volume":"13","author":"HE Ventura","year":"2005","unstructured":"Ventura, H.E., Miller, J.M., Deflem, M.: Governmentality and the war on terror: Fbi project carnivore and the diffusion of disciplinary power. Crit. Criminol. 13, 55\u201370 (2005)","journal-title":"Crit. Criminol."}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05149-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T22:15:21Z","timestamp":1675808121000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05149-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319051482","9783319051499"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05149-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}