What demographic attributes do our digital footprints reveal? A systematic review

J Hinds, AN Joinson - PloS one, 2018 - journals.plos.org
To what extent does our online activity reveal who we are? Recent research has
demonstrated that the digital traces left by individuals as they browse and interact with …

Alphalogger: Detecting motion-based side-channel attack using smartphone keystrokes

AR Javed, MO Beg, M Asim, T Baker… - Journal of Ambient …, 2023 - Springer
Due to the advancement in technologies and excessive usability of smartphones in various
domains (eg, mobile banking), smartphones became more prone to malicious attacks …

Authorship verification for short messages using stylometry

ML Brocardo, I Traore, S Saad… - 2013 International …, 2013 - ieeexplore.ieee.org
Authorship verification can be checked using stylometric techniques through the analysis of
linguistic styles and writing characteristics of the authors. Stylometry is a behavioral feature …

Authorship attribution for twitter in 140 characters or less

R Layton, P Watters, R Dazeley - 2010 Second Cybercrime and …, 2010 - ieeexplore.ieee.org
Authorship attribution is a growing field, moving from beginnings in linguistics to recent
advances in text mining. Through this change came an increase in the capability of …

A unified data mining solution for authorship analysis in anonymous textual communications

F Iqbal, H Binsalleeh, BCM Fung, M Debbabi - Information Sciences, 2013 - Elsevier
The cyber world provides an anonymous environment for criminals to conduct malicious
activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often …

Digital forensics supported by machine learning for the detection of online sexual predatory chats

CH Ngejane, JHP Eloff, TJ Sefara… - Forensic science …, 2021 - Elsevier
Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With
the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful …

Authorship verification applied to detection of compromised accounts on online social networks: A continuous approach

S Barbon, RA Igawa, B Bogaz Zarpelão - Multimedia Tools and …, 2017 - Springer
Compromising legitimate accounts has been the most used strategy to spread malicious
content on OSN (Online Social Network). To address this problem, we propose a pure text …

Application of text mining techniques to the analysis of discourse in eWOM communications from a gender perspective

E Teso, M Olmedilla, MR Martínez-Torres… - … Forecasting and Social …, 2018 - Elsevier
The emergence of online user-generated content has raised numerous questions about
discourse gender differences as compared to face-to-face interactions. The intended gender …

[PDF][PDF] A Two-step Approach for Effective Detection of Misbehaving Users in Chats.

E Villatoro-Tello, A Juárez-González… - … Working Notes/Labs …, 2012 - downloads.webis.de
This paper describes the system jointly developed by the Language Technologies Lab from
INAOE and the Language and Reasoning Group from UAM for the Sexual Predators …

Wordnet-based criminal networks mining for cybercrime investigation

F Iqbal, BCM Fung, M Debbabi, R Batool… - Ieee …, 2019 - ieeexplore.ieee.org
Cybercriminals exploit the opportunities provided by the information revolution and social
media to communicate and conduct underground illicit activities, such as online fraudulence …