메뉴 건너뛰기




Volumn 31 LNICST, Issue , 2010, Pages 99-110

Data mining instant messaging communications to perform author identification for cybercrime investigations

Author keywords

Authorship analysis; Cyber forensics; Cybercrime investigations; Forensic data mining

Indexed keywords

AUTHOR IDENTIFICATION; AUTHORSHIP ANALYSIS; AUTHORSHIP IDENTIFICATION; COMPUTER-MEDIATED COMMUNICATION; CYBER CRIMINALS; CYBER FORENSICS; CYBER-CRIMES; CYBERCRIME; FEATURE SETS; FORENSIC DATA; INSTANT MESSAGING; TRUE IDENTITY;

EID: 84873639333     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-11534-9_10     Document Type: Conference Paper
Times cited : (9)

References (25)
  • 1
    • 27344450109 scopus 로고    scopus 로고
    • Applying authorship analysis to extremist-group Web forum messages
    • Abbasi, A., Chen, H.: Applying Authorship Analysis to Extremist-Group Web Forum Messages. IEEE Intelligent Systems 20(5), 67-75 (2005) (Pubitemid 41527272)
    • (2005) IEEE Intelligent Systems , vol.20 , Issue.5 , pp. 67-75
    • Abbasi, A.1    Chen, H.2
  • 3
    • 42049084142 scopus 로고    scopus 로고
    • Writeprints: A stylometric approach to identify-level identification and similarity detection in cyberspace
    • Abbasi, A., Chen, H.: Writeprints: A Stylometric Approach to Identify-Level Identification and Similarity Detection in Cyberspace. ACM Transactions on Information Systems 26(2) (2008)
    • (2008) ACM Transactions on Information Systems , vol.26 , Issue.2
    • Abbasi, A.1    Chen, H.2
  • 6
    • 85040385892 scopus 로고    scopus 로고
    • Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution
    • Baayen, R.H., van Halteren, H., Tweedie, F.: Outside the Cave of Shadows: Using Syntactic Annotation to Enhance Authorship Attribution. Literary and Linguistic Computing 11(3) (1996)
    • (1996) Literary and Linguistic Computing , vol.11 , Issue.3
    • Baayen, R.H.1    Van Halteren, H.2    Tweedie, F.3
  • 7
    • 34047230751 scopus 로고    scopus 로고
    • Who's at the keyboard? Authorship attribution in digital evidence investigations
    • Chaski, C.E.: Who's At The Keyboard? Authorship Attribution in Digital Evidence Investigations. International Journal of Digital Evidence 4(1) (2005)
    • (2005) International Journal of Digital Evidence , vol.4 , Issue.1
    • Chaski, C.E.1
  • 10
    • 15944427580 scopus 로고    scopus 로고
    • Mining E-mail authorship
    • Boston, Massachusetts, USA
    • de Vel, O.: Mining E-mail Authorship. In: KDD 2000 Workshop on Text Mining, Boston, Massachusetts, USA, pp. 21-27 (2000)
    • (2000) KDD 2000 Workshop on Text Mining , pp. 21-27
    • De Vel, O.1
  • 11
    • 28344449091 scopus 로고    scopus 로고
    • Segmenting documents by stylistic character
    • DOI 10.1017/S1351324905003694, PII S1351324905003694
    • Graham, N., Hirst, G., Marthi, B.: Segmenting documents by stylistic character. Natural Language Engineering 11(4), 397-415 (2005) (Pubitemid 41716064)
    • (2005) Natural Language Engineering , vol.11 , Issue.4 , pp. 397-415
    • Graham, N.1    Hirst, G.2    Marthi, B.3
  • 14
    • 44649163258 scopus 로고    scopus 로고
    • Chat mining: Predicting user and message attributes in computer-mediated communication
    • Kucukyilmaz, T., Cambazoglu, B.B., Aykanat, C., Can, F.: Chat mining: predicting user and message attributes in computer-mediated communication. Information Processing & Management 44(4), 1448-1466 (2008)
    • (2008) Information Processing & Management , vol.44 , Issue.4 , pp. 1448-1466
    • Kucukyilmaz, T.1    Cambazoglu, B.B.2    Aykanat, C.3    Can, F.4
  • 16
    • 33745213523 scopus 로고    scopus 로고
    • From fingerprint to writeprint
    • Li, J., Zheng, R., Chen, H.: From fingerprint to writeprint. Commun. ACM 49(4), 76-82 (2006)
    • (2006) Commun. ACM , vol.49 , Issue.4 , pp. 76-82
    • Li, J.1    Zheng, R.2    Chen, H.3
  • 18
    • 0042223455 scopus 로고    scopus 로고
    • Software piracy: A view from Hong Kong
    • Moores, T., Dhillon, G.: Software Piracy: A View from Hong Kong. Communications of the ACM 43(12), 88-93 (2000)
    • (2000) Communications of the ACM , vol.43 , Issue.12 , pp. 88-93
    • Moores, T.1    Dhillon, G.2
  • 19
    • 0038468599 scopus 로고
    • The characteristic curves of composition
    • Mendenhall, T.C.: The Characteristic Curves of Composition. Science 11(11), 237-249 (1887)
    • (1887) Science , vol.11 , Issue.11 , pp. 237-249
    • Mendenhall, T.C.1
  • 22
    • 0001318320 scopus 로고    scopus 로고
    • The state of authorship attribution studies: Some problems and solutions
    • Rudman, J.: The state of authorship attribution studies: some problems and solutions. Computers and the Humanities 31(4) (1998)
    • (1998) Computers and the Humanities , vol.31 , Issue.4
    • Rudman, J.1
  • 24
    • 33644552803 scopus 로고    scopus 로고
    • A framework for authorship identification of online messages: Writing-style features and classification techniques
    • Zheng, R., Li, J., Chen, H., Huang, Z.: A Framework for Authorship Identification of Online Messages: Writing-Style Features and Classification Techniques. Journal of the American Society for Information Science and Technology 57(3), 378-393 (2006)
    • (2006) Journal of the American Society for Information Science and Technology , vol.57 , Issue.3 , pp. 378-393
    • Zheng, R.1    Li, J.2    Chen, H.3    Huang, Z.4
  • 25
    • 35048871882 scopus 로고    scopus 로고
    • Authorship analysis in cybercrime investigation
    • Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) Springer, Heidelberg
    • Zheng, R., Qin, Y., Huang, Z., Chen, H.: Authorship Analysis in Cybercrime Investigation. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 59-73. Springer, Heidelberg (2003)
    • (2003) ISI 2003. LNCS , vol.2665 , pp. 59-73
    • Zheng, R.1    Qin, Y.2    Huang, Z.3    Chen, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.