{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:12:03Z","timestamp":1748751123870,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319273990"},{"type":"electronic","value":"9783319274003"}],"license":[{"start":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T00:00:00Z","timestamp":1447804800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-27400-3_38","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T17:08:38Z","timestamp":1448989718000},"page":"429-439","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Criminally Convicted Email Users by Behavioral Dissimilarity"],"prefix":"10.1007","author":[{"given":"Maqsood","family":"Mahmud","sequence":"first","affiliation":[]},{"given":"Pranavkumar","family":"Pathak","sequence":"additional","affiliation":[]},{"given":"Vaishalibahen","family":"Pathak","sequence":"additional","affiliation":[]},{"given":"Zahra","family":"Afridi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,18]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Qureshi, P.A.R., Memon. N., Wiil, U.K.: EWaS: novel approach for generating early warnings to prevent terrorist attacks 2010. In: Second International Conference on Computer Engineering and Applications, pp. 410\u2013414 (2010)","DOI":"10.1109\/ICCEA.2010.230"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Gupta, N., Dey, L.: Detection and characterization of anomalous entities in social communication networks. In: 20th International Conference on Pattern Recognition, pp. 738\u2013741, Aug 2010","DOI":"10.1109\/ICPR.2010.186"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Texas, United States (2000)","DOI":"10.1145\/342009.335437"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Nithi, Dey, L.: Anomaly detection from call data records. Soc. Netw. 237\u2013242 (2009)","DOI":"10.1007\/978-3-642-11164-8_38"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Tarapata, Z., Kasprzyk, R.: An application of multicriteria weighted graph similarity method to social networks analyzing. In: International Conference on Advances in Social Network Analysis and Mining, vol. 1, pp. 366\u2013368, Jul 2009","DOI":"10.1109\/ASONAM.2009.33"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Weinstein, C., Campbell, W., Delaney, B., Leary, G.O., Street, W.: Modeling and Detection Techniques for Counter-Terror Social Network Analysis and Intent Recognition (2009)","DOI":"10.1109\/AERO.2009.4839642"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Lu, W., Tavallaee, M., Ghorbani, A.A.: Detecting network anomalies using different wavelet basis functions. In: 6th Annual Communication Networks and Services Research Conference (cnsr 2008), pp. 149\u2013156, May 2008","DOI":"10.1109\/CNSR.2008.75"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Kurkovsky, S., Strimple, D., Nuzzi, E., Verdecchia, K.: Mobile voice access in social networking systems. In: Fifth International Conference on Information Technology: New Generations (itng 2008), pp. 982\u2013987, Apr 2008","DOI":"10.1109\/ITNG.2008.72"},{"key":"38_CR9","unstructured":"Larsen, H.L., Vejin, N.B.: Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks (2006)"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Negnevitsky, M., huey Lim, M.J., Hartnett, J., Reznik, L.: Email communications analysis: how to use computational intelligence methods and tools? System 16\u201323 (2005)","DOI":"10.1109\/CIHSPS.2005.1500603"},{"key":"38_CR11","unstructured":"Mining, U.W.E.B., S. Network, A. To, S. The, E. Of, C. Communities, and I.N. Blogs.: Using web mining and social network analysis to study the emergence of cyber communities in blogs. Computer"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TKDE.2007.190691","volume":"20","author":"S Lin de","year":"2008","unstructured":"de Lin, S., Chalupsky, H.: Discovering and explaining abnormal nodes in semantic graphs. IEEE Trans. Knowl. Data Eng. 20, 1039\u20131052 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Bhatia, M.P.S, Gaur, P.: Statistical approach for community mining in social networks. In: IEEE International Conference on Service Operations and Logitics, and Informatics, pp. 207\u2013211, Oct 2008","DOI":"10.1109\/SOLI.2008.4686392"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Hui-Yi, H., Hung-Yuan, P.: Use behaviors and website experiences of Facebook community. Statistics 1, 379\u2013383, 2010","DOI":"10.1109\/ICEIE.2010.5559855"},{"key":"38_CR15","first-page":"1","volume":"2","author":"B Carrier","year":"2003","unstructured":"Carrier, B., Spafford, E.H.: Getting physical with the digital investigation process. Int. J. 2, 1\u201320 (2003)","journal-title":"Int. J."},{"key":"38_CR16","unstructured":"Saferstein, R.: Criminalistics: An Introduction to Forensic Science, 7th edn. Pearson, London (2000)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Nature and Biologically Inspired Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27400-3_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T16:40:27Z","timestamp":1748709627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27400-3_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,18]]},"ISBN":["9783319273990","9783319274003"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27400-3_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,11,18]]}}}