@inproceedings{bd9c970113114c7788e0d336b0ff6dee,
title = "Dynamic surveillance: A case study with Enron email data set",
abstract = "Surveillance is a critical measure to break anonymity. While surveillance with unlimited resources is often assumed as a means, against which, to design stronger anonymity algorithms, this paper addresses the general impact of limited resource on surveillance efficiency. The general impact of limited resource on identifying a hidden group is experimentally studied; the task of identification is only done by following communications between suspects, i.e., the information of whos talking to whom. The surveillance uses simple but intuitive algorithms to return more intelligence with limited resource. The surveillance subject used in this work is the publicly available Enron email data set, an actual trace of human interaction. The initial expectation was that, even with limited resource, intuitive surveillance algorithms would return the higher intelligence than a random approach by exploiting the general properties of power law-style communication map. To the contrary, the impact of limited resource was found large to the extent that intuitive algorithms do not return significantly higher intelligence than a random approach.",
keywords = "Anonymity, Budget, Email data set, Surveillanc",
author = "Heesung Do and Peter Choi and Heejo Lee",
year = "2014",
doi = "10.1007/978-3-319-05149-9_6",
language = "English",
isbn = "9783319051482",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "81--99",
booktitle = "Information Security Applications - 14th International Workshop, WISA 2013, Revised Selected Papers",
note = "14th International Workshop on Information Security Applications, WISA 2013 ; Conference date: 19-08-2013 Through 21-08-2013",
}