메뉴 건너뛰기




Volumn 70, Issue , 2016, Pages 171-182

Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles

Author keywords

Authorship; n Gram; Profiling; Social media

Indexed keywords

CLASSIFICATION (OF INFORMATION); SOCIAL NETWORKING (ONLINE);

EID: 84964331105     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2016.04.001     Document Type: Article
Times cited : (70)

References (56)
  • 8
    • 84898070087 scopus 로고    scopus 로고
    • User identification and authentication using multi-modal behavioral biometrics
    • Bailey, K.O., Okolica, J.S., Peterson, G.L., User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43 (2014), 77–89.
    • (2014) Comput. Secur. , vol.43 , pp. 77-89
    • Bailey, K.O.1    Okolica, J.S.2    Peterson, G.L.3
  • 9
    • 84990959221 scopus 로고    scopus 로고
    • Stylometric Analysis of Scientific Articles
    • Bergsma, S., Post, M., Yarowsky, D., 2012. Stylometric Analysis of Scientific Articles.
    • (2012)
    • Bergsma, S.1    Post, M.2    Yarowsky, D.3
  • 13
    • 84865637764 scopus 로고    scopus 로고
    • Network profiling-Content analysis of users behavior in digital communication channel
    • Colombini, C.M., Colella, A.,Mattiucci, M., Castiglione, A., 2012. Network profiling-Content analysis of users behavior in digital communication channel. CD-ARES 2012, pp. 416–429.
    • (2012) CD-ARES 2012
    • Colombini, C.M.1    Colella, A.2    Mattiucci, M.3    Castiglione, A.4
  • 15
    • 84888866054 scopus 로고    scopus 로고
    • A framework for continuous, transparent mobile device authentication
    • Crawford, H., Renaud, K., Storer, T., A framework for continuous, transparent mobile device authentication. Comput. Secur. 39 (2013), 127–136.
    • (2013) Comput. Secur. , vol.39 , pp. 127-136
    • Crawford, H.1    Renaud, K.2    Storer, T.3
  • 18
    • 84990943322 scopus 로고    scopus 로고
    • , 〈https://en.wikipedia.org/wiki/Forensic_linguistics〉.
  • 19
    • 84990985569 scopus 로고    scopus 로고
    • 〈https://en.wikipedia.org/wiki/Sensitivity_and_specificity〉.
  • 20
    • 35648941630 scopus 로고    scopus 로고
    • Bigrams of syntactic labels for authorship discrimination of short texts
    • Hirst, G., Feiguina, O., Bigrams of syntactic labels for authorship discrimination of short texts. Lit. Linguist. Comput. 22:4 (2007), 405–417.
    • (2007) Lit. Linguist. Comput. , vol.22 , Issue.4 , pp. 405-417
    • Hirst, G.1    Feiguina, O.2
  • 21
    • 84859079244 scopus 로고    scopus 로고
    • Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis
    • Harpalani, M., Hart, M., Singh, S., Johnson, R., Choi, Y., 2011. Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis.
    • (2011)
    • Harpalani, M.1    Hart, M.2    Singh, S.3    Johnson, R.4    Choi, Y.5
  • 22
    • 0002190909 scopus 로고
    • Authorship attribution
    • Holmes, D.I., Authorship attribution. Comput. Humanit. 28:2 (1994), 87–106.
    • (1994) Comput. Humanit. , vol.28 , Issue.2 , pp. 87-106
    • Holmes, D.I.1
  • 25
    • 80955142792 scopus 로고    scopus 로고
    • Masquerade detection using profile hidden Markov models
    • Huang, L., Stamp, M., Masquerade detection using profile hidden Markov models. Comput. Secur. 30:8 (2011), 732–747.
    • (2011) Comput. Secur. , vol.30 , Issue.8 , pp. 732-747
    • Huang, L.1    Stamp, M.2
  • 27
    • 84868587077 scopus 로고    scopus 로고
    • A novel approach of mining write-prints for authorship attribution in e-mail forensics
    • Iqbal, F., et al. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit. Investig. 5 (2008), S42–S51.
    • (2008) Digit. Investig. , vol.5 , pp. S42-S51
    • Iqbal, F.1
  • 28
    • 78449239926 scopus 로고    scopus 로고
    • Mining writeprints from anonymous e-mails for forensic investigation
    • Iqbal, F., et al. Mining writeprints from anonymous e-mails for forensic investigation. Digit. Investig. 7:1–2 (2010), 56–64.
    • (2010) Digit. Investig. , vol.7 , Issue.1-2 , pp. 56-64
    • Iqbal, F.1
  • 31
    • 4744343736 scopus 로고    scopus 로고
    • Enhancing fraud prevention and detection by profiling fraud offenders
    • Kapardis, A., Krambia-Kpardis, M., Enhancing fraud prevention and detection by profiling fraud offenders. Crim. Behav. Ment. Health, 2004, 189–201.
    • (2004) Crim. Behav. Ment. Health , pp. 189-201
    • Kapardis, A.1    Krambia-Kpardis, M.2
  • 37
    • 84990912408 scopus 로고    scopus 로고
    • A Hybrid Model to Detect Malicious Executables
    • Masud, M.M., Khan, L., Thuraisingham, B., 2007. A Hybrid Model to Detect Malicious Executables.
    • (2007)
    • Masud, M.M.1    Khan, L.2    Thuraisingham, B.3
  • 38
    • 33847644600 scopus 로고    scopus 로고
    • A framework for behavior-based detection of user substitution in a mobile context
    • Mazhelis, O., Puuronen, S., A framework for behavior-based detection of user substitution in a mobile context. Comput. Secur. 26:2 (2007), 154–176.
    • (2007) Comput. Secur. , vol.26 , Issue.2 , pp. 154-176
    • Mazhelis, O.1    Puuronen, S.2
  • 39
    • 79151473959 scopus 로고    scopus 로고
    • Biometric keypads: Improving accuracy through optimal PIN selection
    • Ngugi, B., Tremaine, M., Tarasewich, P., Biometric keypads: Improving accuracy through optimal PIN selection. Decis. Support Syst. 50:4 (2011), 769–776.
    • (2011) Decis. Support Syst. , vol.50 , Issue.4 , pp. 769-776
    • Ngugi, B.1    Tremaine, M.2    Tarasewich, P.3
  • 41
    • 84861101642 scopus 로고    scopus 로고
    • Leveraging behavioral science to mitigate cyber security risk
    • Pfleeger, S.L., Caputo, D.D., Leveraging behavioral science to mitigate cyber security risk. Comput. Secur. 31:4 (2012), 597–611.
    • (2012) Comput. Secur. , vol.31 , Issue.4 , pp. 597-611
    • Pfleeger, S.L.1    Caputo, D.D.2
  • 44
    • 0016060153 scopus 로고
    • A contextual postprocessing system for error correction using binary n-grams
    • Riseman, E.M., Hanson, A.R., A contextual postprocessing system for error correction using binary n-grams. IEEE Trans. Comput. 23:5 (1974), 480–493.
    • (1974) IEEE Trans. Comput. , vol.23 , Issue.5 , pp. 480-493
    • Riseman, E.M.1    Hanson, A.R.2
  • 49
    • 0010111194 scopus 로고
    • A binary n-gram technique for automatic correction of substitution, deletion, insertion, and reversal errors in words
    • Ullmann, J.R., A binary n-gram technique for automatic correction of substitution, deletion, insertion, and reversal errors in words. Comput. J. 20:2 (1977), 141–147.
    • (1977) Comput. J. , vol.20 , Issue.2 , pp. 141-147
    • Ullmann, J.R.1
  • 50
    • 84990951995 scopus 로고    scopus 로고
    • I.T.C., Understanding Statistics
    • Oxford University Press
    • Upton, G., I.T.C., Understanding Statistics. 1996, Oxford University Press.
    • (1996)
    • Upton, G.1
  • 51
    • 84910602883 scopus 로고    scopus 로고
    • To shut them up or to clarify: restraining the spread of rumors in online social networks
    • Wen, S., Jiang, J., Xiang, Y., Yu, S., Zhou, W., Jia, W., To shut them up or to clarify: restraining the spread of rumors in online social networks. IEEE Trans. Parallel Distrib. Syst. 25:12 (2014), 3306–3316.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.12 , pp. 3306-3316
    • Wen, S.1    Jiang, J.2    Xiang, Y.3    Yu, S.4    Zhou, W.5    Jia, W.6
  • 52
    • 84923197121 scopus 로고    scopus 로고
    • A sword with two edges: propagation studies on both positive and negative information in online social networks
    • Wen, S., Haghighi, M., Chen, C., Xiang, Y., Zhou, W., Jia, W., A sword with two edges: propagation studies on both positive and negative information in online social networks. IEEE Trans. Comput. 64:3 (2015), 640–653.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.3 , pp. 640-653
    • Wen, S.1    Haghighi, M.2    Chen, C.3    Xiang, Y.4    Zhou, W.5    Jia, W.6
  • 54
    • 84880571602 scopus 로고    scopus 로고
    • How to achieve non-repudiation of origin with privacy protection in cloud computing
    • Wu, W., et al. How to achieve non-repudiation of origin with privacy protection in cloud computing. J. Comput. Syst. Sci. 79:8 (2013), 1200–1213.
    • (2013) J. Comput. Syst. Sci. , vol.79 , Issue.8 , pp. 1200-1213
    • Wu, W.1
  • 55
    • 77955712298 scopus 로고    scopus 로고
    • Web user behavioral profiling for user identification
    • Yang, Y.H., Web user behavioral profiling for user identification. Decis. Support Syst. 49:3 (2010), 261–271.
    • (2010) Decis. Support Syst. , vol.49 , Issue.3 , pp. 261-271
    • Yang, Y.H.1
  • 56
    • 84886384870 scopus 로고    scopus 로고
    • Opinion-based User Profile Modeling for Contextual Suggestions, pp
    • Yang, P., Fang, H., 2013. Opinion-based User Profile Modeling for Contextual Suggestions, pp. 80–83.
    • (2013)
    • Yang, P.1    Fang, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.