What demographic attributes do our digital footprints reveal? A systematic review
To what extent does our online activity reveal who we are? Recent research has
demonstrated that the digital traces left by individuals as they browse and interact with …
demonstrated that the digital traces left by individuals as they browse and interact with …
Alphalogger: Detecting motion-based side-channel attack using smartphone keystrokes
Due to the advancement in technologies and excessive usability of smartphones in various
domains (eg, mobile banking), smartphones became more prone to malicious attacks …
domains (eg, mobile banking), smartphones became more prone to malicious attacks …
Authorship verification for short messages using stylometry
Authorship verification can be checked using stylometric techniques through the analysis of
linguistic styles and writing characteristics of the authors. Stylometry is a behavioral feature …
linguistic styles and writing characteristics of the authors. Stylometry is a behavioral feature …
Authorship attribution for twitter in 140 characters or less
Authorship attribution is a growing field, moving from beginnings in linguistics to recent
advances in text mining. Through this change came an increase in the capability of …
advances in text mining. Through this change came an increase in the capability of …
A unified data mining solution for authorship analysis in anonymous textual communications
The cyber world provides an anonymous environment for criminals to conduct malicious
activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often …
activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often …
Digital forensics supported by machine learning for the detection of online sexual predatory chats
Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With
the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful …
the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful …
Authorship verification applied to detection of compromised accounts on online social networks: A continuous approach
Compromising legitimate accounts has been the most used strategy to spread malicious
content on OSN (Online Social Network). To address this problem, we propose a pure text …
content on OSN (Online Social Network). To address this problem, we propose a pure text …
Application of text mining techniques to the analysis of discourse in eWOM communications from a gender perspective
The emergence of online user-generated content has raised numerous questions about
discourse gender differences as compared to face-to-face interactions. The intended gender …
discourse gender differences as compared to face-to-face interactions. The intended gender …
[PDF][PDF] A Two-step Approach for Effective Detection of Misbehaving Users in Chats.
E Villatoro-Tello, A Juárez-González… - … Working Notes/Labs …, 2012 - downloads.webis.de
This paper describes the system jointly developed by the Language Technologies Lab from
INAOE and the Language and Reasoning Group from UAM for the Sexual Predators …
INAOE and the Language and Reasoning Group from UAM for the Sexual Predators …
Wordnet-based criminal networks mining for cybercrime investigation
Cybercriminals exploit the opportunities provided by the information revolution and social
media to communicate and conduct underground illicit activities, such as online fraudulence …
media to communicate and conduct underground illicit activities, such as online fraudulence …