메뉴 건너뛰기




Volumn , Issue , 2014, Pages 212-226

Doppelgänger finder: Taking stylometry to the underground

Author keywords

cybercrime; Stylometry; underground forum

Indexed keywords

SECURITY OF DATA;

EID: 84914140103     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.21     Document Type: Conference Paper
Times cited : (101)

References (36)
  • 4
    • 33745700434 scopus 로고    scopus 로고
    • A prototype for authorship attribution studies
    • P. Juola, J. Sofko, and P. Brennan, "A prototype for authorship attribution studies," Literary and Linguistic Computing, vol. 21, no. 2, pp. 169-178, 2006.
    • (2006) Literary and Linguistic Computing , vol.21 , Issue.2 , pp. 169-178
    • Juola, P.1    Sofko, J.2    Brennan, P.3
  • 6
    • 42049084142 scopus 로고    scopus 로고
    • Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
    • A. Abbasi and H. Chen, "Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace," ACM Trans. Inf. Syst., vol. 26, no. 2, pp. 1-29, 2008.
    • (2008) ACM Trans. Inf. Syst. , vol.26 , Issue.2 , pp. 1-29
    • Abbasi, A.1    Chen, H.2
  • 7
    • 84884750287 scopus 로고    scopus 로고
    • Privacy-preserving matching of community-contributed content
    • Springer
    • M. Almishari, P. Gasti, G. Tsudik, and E. Oguz, "Privacy-preserving matching of community-contributed content," in Computer Security-ESORICS 2013. Springer, 2013, pp. 443-462.
    • (2013) Computer Security-ESORICS 2013 , pp. 443-462
    • Almishari, M.1    Gasti, P.2    Tsudik, G.3    Oguz, E.4
  • 8
    • 84906928929 scopus 로고    scopus 로고
    • Identifying multiple userids of the same author
    • T. Qian and B. Liu, "Identifying multiple userids of the same author," in EMNLP 2013, 2013.
    • (2013) EMNLP 2013
    • Qian, T.1    Liu, B.2
  • 10
    • 78149334726 scopus 로고    scopus 로고
    • Data breaches: What the underground world of carding reveals
    • K. Peretti, "Data breaches: what the underground world of carding reveals," Santa Clara Computer & High Tech. LJ, vol. 25, p. 375, 2008.
    • (2008) Santa Clara Computer & High Tech. LJ , vol.25 , pp. 375
    • Peretti, K.1
  • 15
    • 84890018962 scopus 로고    scopus 로고
    • Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
    • K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, "Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse," in USENIX Security Symposium, 2013.
    • (2013) USENIX Security Symposium
    • Thomas, K.1    McCoy, D.2    Grier, C.3    Kolcz, A.4    Paxson, V.5
  • 16
    • 84883071917 scopus 로고    scopus 로고
    • Why forums? An empirical analysis into the facilitating factors of carding forums
    • M. Yip, N. Shadbolt, and C. Webber, "Why forums? an empirical analysis into the facilitating factors of carding forums," in ACM Web Science 2013, 2013.
    • (2013) ACM Web Science 2013
    • Yip, M.1    Shadbolt, N.2    Webber, C.3
  • 19
    • 77955457549 scopus 로고    scopus 로고
    • How unique is your web browser?
    • Springer
    • P. Eckersley, "How unique is your web browser?" in Privacy Enhancing Technologies. Springer, 2010, pp. 1-18.
    • (2010) Privacy Enhancing Technologies , pp. 1-18
    • Eckersley, P.1
  • 23
  • 25
    • 84870664825 scopus 로고    scopus 로고
    • Translate once, translate twice, translate thrice and attribute: Identifying authors and machine translation tools in translated text
    • IEEE
    • A. Caliskan and R. Greenstadt, "Translate once, translate twice, translate thrice and attribute: Identifying authors and machine translation tools in translated text," in Semantic Computing (ICSC), 2012 IEEE Sixth International Conference. IEEE, 2012, pp. 121-125.
    • (2012) Semantic Computing (ICSC), 2012 IEEE Sixth International Conference , pp. 121-125
    • Caliskan, A.1    Greenstadt, R.2
  • 29
    • 85180633166 scopus 로고    scopus 로고
    • Sybilinfer: Detecting sybil nodes using social networks
    • G. Danezis and P. Mittal, "Sybilinfer: Detecting sybil nodes using social networks." in NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 32
    • 0042096783 scopus 로고
    • Improvements in part-of-speech tagging with an application to german
    • Citeseer
    • H. Schmid, "Improvements in part-of-speech tagging with an application to german," in In Proceedings of the ACL SIGDAT-Workshop. Citeseer, 1995.
    • (1995) Proceedings of the ACL SIGDAT-Workshop
    • Schmid, H.1
  • 34
    • 0003120218 scopus 로고    scopus 로고
    • Sequential minimal optimization: A fast algorithm for training support vector machines
    • MSR-TR-98-14
    • J. C. Platt, "Sequential minimal optimization: A fast algorithm for training support vector machines," Advances in Kernel Methods Support Vector Learning, vol. 208, no. MSR-TR-98-14, pp. 1-21, 1998.
    • (1998) Advances in Kernel Methods Support Vector Learning , vol.208 , pp. 1-21
    • Platt, J.C.1
  • 35
    • 33744584654 scopus 로고
    • Induction of decision trees
    • J. Quinlan, "Induction of decision trees," Machine learning, vol. 1, no. 1, pp. 81-106, 1986.
    • (1986) Machine Learning , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.