Email in personal information management, Communications of the ACM, vol.49, issue.1, pp.68-73, 2006. ,
DOI : 10.1145/1107458.1107494
COMPUTER CRIME AND DIGITAL EVIDENCE, 2014. ,
DOI : 10.1016/B0-12-369399-3/00062-8
A Study on Evolution of Email Spam Over Fifteen Years, Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.1-10, 2013. ,
DOI : 10.4108/icst.collaboratecom.2013.254082
Mining criminal networks from unstructured text documents, Digital Investigation, pp.147-160, 2012. ,
DOI : 10.1016/j.diin.2011.12.001
E-mail authorship attribution using customized associative classification, Digital Investigation, pp.116-126, 2015. ,
DOI : 10.1016/j.diin.2015.05.012
Covert communication by means of email spam: A challenge for digital investigation, Digital Investigation, pp.72-79, 2015. ,
DOI : 10.1016/j.diin.2015.04.003
Email mining: tasks, common techniques, and tools, Knowledge and Information Systems, vol.36, issue.3, pp.1-31, 2014. ,
DOI : 10.1016/j.is.2011.09.008
Introduction to modern information retrieval, 1986. ,
A STATISTICAL INTERPRETATION OF TERM SPECIFICITY AND ITS APPLICATION IN RETRIEVAL, Journal of Documentation, vol.28, issue.1, pp.11-21, 1972. ,
DOI : 10.1002/asi.5090180209
Understanding inverse document frequency: on theoretical arguments for IDF, Journal of Documentation, vol.60, issue.5, pp.503-520, 2004. ,
DOI : 10.1016/S0306-4573(00)00015-7
Latent dirichlet allocation, the Journal of machine Learning research, vol.3, pp.993-1022, 2003. ,
Latent semantic analysis: a road to meaning, chapter probabilistic topic models, Laurence Erlbaum, 2007. ,
The kwic index concept: A retrospective view American Documentation, pp.57-70, 1966. ,
The word tree, an interactive visual concordance Visualization and Computer Graphics, IEEE Transactions on, vol.14, issue.6, pp.1221-1228, 2008. ,