-
2
-
-
84876100930
-
On the feasibility of internet-scale author identification
-
IEEE
-
A. Narayanan, H. Paskov, N. Gong, J. Bethencourt, E. Stefanov, R. Shin, and D. Song, "On the feasibility of internet-scale author identification," in Proceedings of the 33rd conference on IEEE Symposium on Security and Privacy. IEEE, 2012.
-
(2012)
Proceedings of the 33rd Conference on IEEE Symposium on Security and Privacy
-
-
Narayanan, A.1
Paskov, H.2
Gong, N.3
Bethencourt, J.4
Stefanov, E.5
Shin, R.6
Song, D.7
-
3
-
-
80955142180
-
Topic modeling of freelance job postings to monitor web service abuse
-
ACM
-
D. Kim, M. Motoyama, G. Voelker, and L. Saul, "Topic modeling of freelance job postings to monitor web service abuse," in Proceedings of the 4th ACM workshop on Security and artificial intelligence. ACM, 2011, pp. 11-20.
-
(2011)
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence
, pp. 11-20
-
-
Kim, D.1
Motoyama, M.2
Voelker, G.3
Saul, L.4
-
4
-
-
33745700434
-
A prototype for authorship attribution studies
-
P. Juola, J. Sofko, and P. Brennan, "A prototype for authorship attribution studies," Literary and Linguistic Computing, vol. 21, no. 2, pp. 169-178, 2006.
-
(2006)
Literary and Linguistic Computing
, vol.21
, Issue.2
, pp. 169-178
-
-
Juola, P.1
Sofko, J.2
Brennan, P.3
-
5
-
-
58449112832
-
Computational methods in authorship attribution
-
M. Koppel, J. Schler, and S. Argamon, "Computational methods in authorship attribution," Journal of the American Society for Information Science and Technology, vol. 60, no. 1, pp. 9-26, 2009.
-
(2009)
Journal of the American Society for Information Science and Technology
, vol.60
, Issue.1
, pp. 9-26
-
-
Koppel, M.1
Schler, J.2
Argamon, S.3
-
6
-
-
42049084142
-
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
-
A. Abbasi and H. Chen, "Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace," ACM Trans. Inf. Syst., vol. 26, no. 2, pp. 1-29, 2008.
-
(2008)
ACM Trans. Inf. Syst.
, vol.26
, Issue.2
, pp. 1-29
-
-
Abbasi, A.1
Chen, H.2
-
7
-
-
84884750287
-
Privacy-preserving matching of community-contributed content
-
Springer
-
M. Almishari, P. Gasti, G. Tsudik, and E. Oguz, "Privacy-preserving matching of community-contributed content," in Computer Security-ESORICS 2013. Springer, 2013, pp. 443-462.
-
(2013)
Computer Security-ESORICS 2013
, pp. 443-462
-
-
Almishari, M.1
Gasti, P.2
Tsudik, G.3
Oguz, E.4
-
8
-
-
84906928929
-
Identifying multiple userids of the same author
-
T. Qian and B. Liu, "Identifying multiple userids of the same author," in EMNLP 2013, 2013.
-
(2013)
EMNLP 2013
-
-
Qian, T.1
Liu, B.2
-
9
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage, "An inquiry into the nature and causes of the wealth of internet miscreants," in ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
10
-
-
78149334726
-
Data breaches: What the underground world of carding reveals
-
K. Peretti, "Data breaches: what the underground world of carding reveals," Santa Clara Computer & High Tech. LJ, vol. 25, p. 375, 2008.
-
(2008)
Santa Clara Computer & High Tech. LJ
, vol.25
, pp. 375
-
-
Peretti, K.1
-
11
-
-
82955190605
-
An analysis of underground forums
-
ACM
-
M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. Voelker, "An analysis of underground forums," in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011, pp. 71-80.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 71-80
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.5
-
12
-
-
84867391098
-
Structural analysis of online criminal social networks
-
IEEE
-
M. Yip, N. Shadbolt, and C. Webber, "Structural analysis of online criminal social networks," in Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on. IEEE, 2012, pp. 60-65.
-
(2012)
Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on
, pp. 60-65
-
-
Yip, M.1
Shadbolt, N.2
Webber, C.3
-
13
-
-
77954521285
-
Studying malicious websites and the underground economy on the chinese web
-
J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, and W. Zou, "Studying malicious websites and the underground economy on the chinese web," Managing Information Risk and the Economics of Security, pp. 225-244, 2009.
-
(2009)
Managing Information Risk and the Economics of Security
, pp. 225-244
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
-
14
-
-
84900789776
-
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
-
USENIX Association
-
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko, "Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs," in Proceedings of the 21st USENIX conference on Security symposium. USENIX Association, 2012, pp. 1-1.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
, pp. 1-1
-
-
McCoy, D.1
Pitsillidis, A.2
Jordan, G.3
Weaver, N.4
Kreibich, C.5
Krebs, B.6
Voelker, G.M.7
Savage, S.8
Levchenko, K.9
-
15
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
-
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, "Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse," in USENIX Security Symposium, 2013.
-
(2013)
USENIX Security Symposium
-
-
Thomas, K.1
McCoy, D.2
Grier, C.3
Kolcz, A.4
Paxson, V.5
-
16
-
-
84883071917
-
Why forums? An empirical analysis into the facilitating factors of carding forums
-
M. Yip, N. Shadbolt, and C. Webber, "Why forums? an empirical analysis into the facilitating factors of carding forums," in ACM Web Science 2013, 2013.
-
(2013)
ACM Web Science 2013
-
-
Yip, M.1
Shadbolt, N.2
Webber, C.3
-
17
-
-
84900794599
-
Honor among thieves: A commons analysis of underground forums
-
S. Afroz, V. Garg, D. McCoy, and R. Greenstadt, "Honor among thieves: A commons analysis of underground forums," in eCrime Researcher's Summit, 2013.
-
(2013)
ECrime Researcher's Summit
-
-
Afroz, S.1
Garg, V.2
McCoy, D.3
Greenstadt, R.4
-
18
-
-
84856194876
-
Privacy: Gone with the typing! identifying web users by their typing patterns
-
IEEE
-
P. Chairunnanda, N. Pham, and U. Hengartner, "Privacy: Gone with the typing! identifying web users by their typing patterns," in Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). IEEE, 2011, pp. 974-980.
-
(2011)
Privacy, Security, Risk and Trust (Passat), 2011 Ieee Third International Conference on and 2011 Ieee Third International Conference on Social Computing (Socialcom)
, pp. 974-980
-
-
Chairunnanda, P.1
Pham, N.2
Hengartner, U.3
-
19
-
-
77955457549
-
How unique is your web browser?
-
Springer
-
P. Eckersley, "How unique is your web browser?" in Privacy Enhancing Technologies. Springer, 2010, pp. 1-18.
-
(2010)
Privacy Enhancing Technologies
, pp. 1-18
-
-
Eckersley, P.1
-
22
-
-
84887308184
-
Exploiting innocuous activity for correlating users across sites
-
O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, T. Renata et al., "Exploiting innocuous activity for correlating users across sites," in WWW'13 Proceedings of the 22nd international conference on World Wide Web, 2013.
-
(2013)
WWW'13 Proceedings of the 22nd International Conference on World Wide Web
-
-
Goga, O.1
Lei, H.2
Parthasarathi, S.H.K.3
Friedland, G.4
Sommer, R.5
Renata, T.6
-
25
-
-
84870664825
-
Translate once, translate twice, translate thrice and attribute: Identifying authors and machine translation tools in translated text
-
IEEE
-
A. Caliskan and R. Greenstadt, "Translate once, translate twice, translate thrice and attribute: Identifying authors and machine translation tools in translated text," in Semantic Computing (ICSC), 2012 IEEE Sixth International Conference. IEEE, 2012, pp. 121-125.
-
(2012)
Semantic Computing (ICSC), 2012 IEEE Sixth International Conference
, pp. 121-125
-
-
Caliskan, A.1
Greenstadt, R.2
-
27
-
-
79961201365
-
How unique and traceable are usernames?
-
Springer
-
D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manils, "How unique and traceable are usernames?" in Privacy Enhancing Technologies. Springer, 2011, pp. 1-17.
-
(2011)
Privacy Enhancing Technologies
, pp. 1-17
-
-
Perito, D.1
Castelluccia, C.2
Kaafar, M.A.3
Manils, P.4
-
29
-
-
85180633166
-
Sybilinfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal, "Sybilinfer: Detecting sybil nodes using social networks." in NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
30
-
-
84881224537
-
Sok: The evolution of sybil defense via social networks
-
L. Alvisi, A. Clement, A. Epasto, U. Sapienza, S. Lattanzi, and A. Panconesi, "Sok: The evolution of sybil defense via social networks," in IEEE security and privacy, 2013.
-
(2013)
IEEE Security and Privacy
-
-
Alvisi, L.1
Clement, A.2
Epasto, A.3
Sapienza, U.4
Lattanzi, S.5
Panconesi, A.6
-
31
-
-
84983470508
-
Featurerich part-of-speech tagging with a cyclic dependency network
-
Association for Computational Linguistics
-
K. Toutanova, D. Klein, C. D. Manning, and Y. Singer, "Featurerich part-of-speech tagging with a cyclic dependency network," in Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology-Volume 1. Association for Computational Linguistics, 2003, pp. 173-180.
-
(2003)
Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology-Volume 1
, pp. 173-180
-
-
Toutanova, K.1
Klein, D.2
Manning, C.D.3
Singer, Y.4
-
32
-
-
0042096783
-
Improvements in part-of-speech tagging with an application to german
-
Citeseer
-
H. Schmid, "Improvements in part-of-speech tagging with an application to german," in In Proceedings of the ACL SIGDAT-Workshop. Citeseer, 1995.
-
(1995)
Proceedings of the ACL SIGDAT-Workshop
-
-
Schmid, H.1
-
33
-
-
84864225669
-
Use fewer instances of the letter i: Toward writing style anonymization
-
A. W. McDonald, S. Afroz, A. Caliskan, A. Stolerman, and R. Greenstadt, "Use fewer instances of the letter i: Toward writing style anonymization," in Privacy Enhancing Technologies, 2012, pp. 299-318.
-
(2012)
Privacy Enhancing Technologies
, pp. 299-318
-
-
McDonald, A.W.1
Afroz, S.2
Caliskan, A.3
Stolerman, A.4
Greenstadt, R.5
-
34
-
-
0003120218
-
Sequential minimal optimization: A fast algorithm for training support vector machines
-
MSR-TR-98-14
-
J. C. Platt, "Sequential minimal optimization: A fast algorithm for training support vector machines," Advances in Kernel Methods Support Vector Learning, vol. 208, no. MSR-TR-98-14, pp. 1-21, 1998.
-
(1998)
Advances in Kernel Methods Support Vector Learning
, vol.208
, pp. 1-21
-
-
Platt, J.C.1
-
35
-
-
33744584654
-
Induction of decision trees
-
J. Quinlan, "Induction of decision trees," Machine learning, vol. 1, no. 1, pp. 81-106, 1986.
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.1
-
36
-
-
84872026771
-
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity
-
M. Brennan, S. Afroz, and R. Greenstadt, "Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity," ACM Transactions on Information and System Security (TISSEC), vol. 15, no. 3, 2012.
-
(2012)
ACM Transactions on Information and System Security (TISSEC)
, vol.15
, Issue.3
-
-
Brennan, M.1
Afroz, S.2
Greenstadt, R.3
|