{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:50:30Z","timestamp":1759146630218},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T00:00:00Z","timestamp":1128124800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Comput Math Organiz Theor"],"published-print":{"date-parts":[[2005,10]]},"DOI":"10.1007\/s10588-005-5381-4","type":"journal-article","created":{"date-parts":[[2006,1,14]],"date-time":"2006-01-14T00:22:56Z","timestamp":1137198176000},"page":"265-281","source":"Crossref","is-referenced-by-count":59,"title":["Graph Theoretic and Spectral Analysis of Enron Email Data"],"prefix":"10.1007","volume":"11","author":[{"given":"Anurat","family":"Chapanond","sequence":"first","affiliation":[]},{"given":"Mukkai S.","family":"Krishnamoorthy","sequence":"additional","affiliation":[]},{"given":"B\u00fclent","family":"Yener","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,1,14]]},"reference":[{"key":"5381_CR1","unstructured":"Adibi, J. and J. Shetty, The Enron Email Dataset Database Schema and Brief Statistical Report, http:\/\/www.isi.edu\/adibi\/Enron\/Enron_Dataset_Report.pdf."},{"key":"5381_CR2","unstructured":"Browne, M. and M.W. Berry (2005), \u201cEmail Surveillance Using Nonnegative Matrix Factorization,\u201d in Proceeding of SIAMInternational Conference on Data Mining, SIAM Workshop on Link Analysis, Counterterrorism and Security."},{"key":"5381_CR3","unstructured":"Chapanond, A. and M.S. Krishnamoorthy (2004), \u201cUser Classification for P2P Network,\u201d Unpublished Manuscript,Rensselaer Polytechnic Institute, Troy, NY."},{"key":"5381_CR4","unstructured":"Corrada-Emmanuel, A., A. McCallum, and X. Wang (2004), Language Use in a Social Network: The Enron Email Dataset, CNLP Seminars."},{"key":"5381_CR5","unstructured":"Diesner, J. and K. Carley (2005), \u201cExploration of Communication Networks from the Enron Email Corpus,\u201d in Proceeding of SIAMInternational Conference on Data Mining, SIAM Workshop on Link Analysis, Counterterrorism and Security."},{"key":"5381_CR6","doi-asserted-by":"crossref","unstructured":"Drineas, P., M.S. Krishnamoorthy, M.D. Sofka and B. Yener(2004), \u201cStudying E-mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information,\u201d in IEEEInternational Conference on Intelligence and Security Informatics.","DOI":"10.1007\/978-3-540-25952-7_22"},{"key":"5381_CR7","unstructured":"Enron Email Dataset, http:\/\/www-2.cs.cmu.edu\/enron\/."},{"key":"5381_CR8","unstructured":"Golub, G. and F. Van Loan (1984), Matrix Computations, Johns Hopkins University Press."},{"key":"5381_CR9","unstructured":"Han, J. and M. Kamber (2001), Data Mining: Concepts and Techniques, Morgan Kaufmann Publishers."},{"key":"5381_CR10","unstructured":"Houston Chronicles, http:\/\/www.chron.com\/content\/chronicle\/special\/01\/enron\/index.html."},{"key":"5381_CR11","unstructured":"Kalman, Y. and S. Rafacli (2005), Email Chronemics:Unobtrusive Profiling of Response Times, HICSS-38, Hawaii."},{"key":"5381_CR12","first-page":"45","volume-title":"Proceedings of the 8th Symposium Spatial Data Handling","author":"G. Karypis","year":"1998","unstructured":"Karypis, G., E.H. Han and V. Kumar (1998), \u201cCHAMELEON: AHierarchical Clustering Algorithm of Spatial Data,\u201d in Proceedings of the 8th Symposium Spatial Data Handling,Vancouver, Canada, pp. 45\u201355."},{"key":"5381_CR13","doi-asserted-by":"crossref","unstructured":"Keila, P.S. and D.B. Skillicorn (2005), \u201cStructure in the Enron Email Dataset,\u201d in Proceeding of SIAM International Conference on Data Mining, SIAM Workshop on Link Analysis, Counterterrorism and Security.","DOI":"10.1007\/s10588-005-5379-y"},{"key":"5381_CR14","doi-asserted-by":"crossref","unstructured":"Klimt, B. and Y. Yang (2004), \u201cThe Enron Corpus: A New Dataset for Email Classification Research,\u201d To be published in Proceedings ofthe European Conference on Machine Learning (ECML).","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"5381_CR15","unstructured":"Loch, C.H., J.R. Tyler, and R. Lukose (submitted), \u201cConversational Structure in Email and Face to Face Communication,\u201d Draft, submitted to Organization Science."},{"key":"5381_CR16","unstructured":"McCallum, A., A. Corrada-Emmanuel, and X. Wang (2005), \u201cThe Author-Recipient-Topic Model for Topic and Role Discovery in Social Networks, with Application to Enron and Academic Email\u201d, inProceeding of SIAM International Conference on Data Mining, SIAMWorkshop on Link Analysis, Counterterrorism and Security."},{"key":"5381_CR17","doi-asserted-by":"crossref","unstructured":"Newman, M.E.J. (2003), \u201cThe Structure and Function of Complex Networks,\u201d In SIAM Review, June 2003.","DOI":"10.1137\/S003614450342480"},{"key":"5381_CR18","unstructured":"Preston, N. and M. Krishnamoorthy (2004), \u201cGraph Draw: A Graph Drawing System to study Social Networks,\u201d Unpublished Manuscript, Rensselaer Polytechnic Institute, Troy, NY."},{"key":"5381_CR19","doi-asserted-by":"crossref","unstructured":"Priebe, C.E., J.M. Conroy, D.J. Marchette, and Y. Park (2005), \u201cScan Statistics on Enron Graphs,\u201d in Proceeding of SIAMInternational Conference on Data Mining, SIAM Workshop on Link Analysis, Counterterrorism and Security.","DOI":"10.1007\/s10588-005-5378-z"},{"key":"5381_CR20","volume-title":"Proceeding of the International Conference on Communities and Technologies","author":"J.R. Tyler","year":"2003","unstructured":"Tyler, J.R., M.D. Wilkinson and B.A. Huberman (2003), \u201cEmail as Spectroscopy: Automated Discovery of Community Structure within Organizations,\u201d in Proceeding of the International Conference on Communities and Technologies, Netherlands, kluwer Academic Publishers."}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-005-5381-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-005-5381-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-005-5381-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:36:20Z","timestamp":1559302580000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-005-5381-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,10]]}},"alternative-id":["5381"],"URL":"https:\/\/doi.org\/10.1007\/s10588-005-5381-4","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,10]]}}}