The authors build a graph of connections based on the email headers (from the full hacked set), draw the graph and identify hubs/authority scores.
The authors build a graph of connections based on the email headers (from the full hacked set), draw the graph and identify hubs/authority scores.