-
1
-
-
84990886393
-
-
Abou-Assaleh, Tony, Cercone, Nick, Keselj, Vlado, Sweidan, Ray, 2004a. Detection of new malicious code using n-grams signatures. In: Proceedings of Second Annual Conference on Privacy, Security and Trust, pp. 193–196.
-
Abou-Assaleh, Tony, Cercone, Nick, Keselj, Vlado, Sweidan, Ray, 2004a. Detection of new malicious code using n-grams signatures. In: Proceedings of Second Annual Conference on Privacy, Security and Trust
-
-
-
3
-
-
33746864380
-
-
Abou-Assaleh, T., Cercone, N., Keselj, V., Sweidan, R., 2004c. Detection of New Malicious Code Using n-Grams Signatures.
-
(2004)
Detection of New Malicious Code Using n-Grams Signatures.
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
4
-
-
80052326576
-
Survey of plagiarism detection methods
-
In: (AMS'05), pp.
-
Ali, A.M.E.T., Abdulla, H.M.D., Snasel, V., 2011. Survey of plagiarism detection methods. In: Proceedings of the 5th Asia Modelling Symposium (AMS'05), pp. 39–42.
-
(2011)
Proceedings of the 5th Asia Modelling Symposiu
, pp. 39-42
-
-
Ali, A.M.E.T.1
Abdulla, H.M.D.2
Snasel, V.3
-
5
-
-
84872013214
-
Detecting hoaxes, frauds, and deception in writing style online
-
In: (Sp), pp.
-
Afroz, S., Brennan, M., Greenstadt, R., 2012. Detecting hoaxes, frauds, and deception in writing style online. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy (Sp), pp. 461–475.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privac
, pp. 461-475
-
-
Afroz, S.1
Brennan, M.2
Greenstadt, R.3
-
7
-
-
78650465720
-
Word length n-grams for text re-use detection
-
Barrón-Cedeño, A., Basile, C., Degli Esposti, M., Rosso, P., Word length n-grams for text re-use detection. Comput. Linguist. Intell. Text Process., 2010, 687–699.
-
(2010)
Comput. Linguist. Intell. Text Process.
, pp. 687-699
-
-
Barrón-Cedeño, A.1
Basile, C.2
Degli Esposti, M.3
Rosso, P.4
-
8
-
-
84898070087
-
User identification and authentication using multi-modal behavioral biometrics
-
Bailey, K.O., Okolica, J.S., Peterson, G.L., User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43 (2014), 77–89.
-
(2014)
Comput. Secur.
, vol.43
, pp. 77-89
-
-
Bailey, K.O.1
Okolica, J.S.2
Peterson, G.L.3
-
9
-
-
84990959221
-
Stylometric Analysis of Scientific Articles
-
Bergsma, S., Post, M., Yarowsky, D., 2012. Stylometric Analysis of Scientific Articles.
-
(2012)
-
-
Bergsma, S.1
Post, M.2
Yarowsky, D.3
-
10
-
-
0002636321
-
n-Gram-based text categorization
-
In: Retrieval, pp.
-
Cavnar, W.B., Trenkle, J.M., 1994. n-Gram-based text categorization. In: Proceedings of SDAIR-94, 3rd Annual Symposium on Document Analysis and Information Retrieval, pp. 161–175.
-
(1994)
Proceedings of SDAIR-94, 3rd Annual Symposium on Document Analysis and Informatio
, pp. 161-175
-
-
Cavnar, W.B.1
Trenkle, J.M.2
-
11
-
-
84904618097
-
Control flow-based malware variant detection
-
Cesare, S., Xiang, Y., Zhou, W., Control flow-based malware variant detection. IEEE Trans. Dependable Secur. Comput. 11:4 (2014), 307–317.
-
(2014)
IEEE Trans. Dependable Secur. Comput.
, vol.11
, Issue.4
, pp. 307-317
-
-
Cesare, S.1
Xiang, Y.2
Zhou, W.3
-
13
-
-
84865637764
-
Network profiling-Content analysis of users behavior in digital communication channel
-
Colombini, C.M., Colella, A.,Mattiucci, M., Castiglione, A., 2012. Network profiling-Content analysis of users behavior in digital communication channel. CD-ARES 2012, pp. 416–429.
-
(2012)
CD-ARES 2012
-
-
Colombini, C.M.1
Colella, A.2
Mattiucci, M.3
Castiglione, A.4
-
15
-
-
84888866054
-
A framework for continuous, transparent mobile device authentication
-
Crawford, H., Renaud, K., Storer, T., A framework for continuous, transparent mobile device authentication. Comput. Secur. 39 (2013), 127–136.
-
(2013)
Comput. Secur.
, vol.39
, pp. 127-136
-
-
Crawford, H.1
Renaud, K.2
Storer, T.3
-
16
-
-
82555176922
-
Local histograms of character n-grams for authorship attribution
-
Escalante, H.J., Solorio, T., 2011. Local histograms of character n-grams for authorship attribution. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics, Portland, Oregon, pp. 288–298.
-
(2011)
Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics, Portland, Oregon
-
-
Escalante, H.J.1
Solorio, T.2
-
18
-
-
84990943322
-
-
, 〈https://en.wikipedia.org/wiki/Forensic_linguistics〉.
-
-
-
-
19
-
-
84990985569
-
-
〈https://en.wikipedia.org/wiki/Sensitivity_and_specificity〉.
-
-
-
-
20
-
-
35648941630
-
Bigrams of syntactic labels for authorship discrimination of short texts
-
Hirst, G., Feiguina, O., Bigrams of syntactic labels for authorship discrimination of short texts. Lit. Linguist. Comput. 22:4 (2007), 405–417.
-
(2007)
Lit. Linguist. Comput.
, vol.22
, Issue.4
, pp. 405-417
-
-
Hirst, G.1
Feiguina, O.2
-
21
-
-
84859079244
-
Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis
-
Harpalani, M., Hart, M., Singh, S., Johnson, R., Choi, Y., 2011. Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis.
-
(2011)
-
-
Harpalani, M.1
Hart, M.2
Singh, S.3
Johnson, R.4
Choi, Y.5
-
22
-
-
0002190909
-
Authorship attribution
-
Holmes, D.I., Authorship attribution. Comput. Humanit. 28:2 (1994), 87–106.
-
(1994)
Comput. Humanit.
, vol.28
, Issue.2
, pp. 87-106
-
-
Holmes, D.I.1
-
25
-
-
80955142792
-
Masquerade detection using profile hidden Markov models
-
Huang, L., Stamp, M., Masquerade detection using profile hidden Markov models. Comput. Secur. 30:8 (2011), 732–747.
-
(2011)
Comput. Secur.
, vol.30
, Issue.8
, pp. 732-747
-
-
Huang, L.1
Stamp, M.2
-
26
-
-
84910634929
-
Robust multi-factor authentication for fragile communications
-
Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secur. Comput. 11:6 (2014), 568–581.
-
(2014)
IEEE Trans. Dependable Secur. Comput.
, vol.11
, Issue.6
, pp. 568-581
-
-
Huang, X.1
Xiang, Y.2
Bertino, E.3
Zhou, J.4
Xu, L.5
-
27
-
-
84868587077
-
A novel approach of mining write-prints for authorship attribution in e-mail forensics
-
Iqbal, F., et al. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit. Investig. 5 (2008), S42–S51.
-
(2008)
Digit. Investig.
, vol.5
, pp. S42-S51
-
-
Iqbal, F.1
-
28
-
-
78449239926
-
Mining writeprints from anonymous e-mails for forensic investigation
-
Iqbal, F., et al. Mining writeprints from anonymous e-mails for forensic investigation. Digit. Investig. 7:1–2 (2010), 56–64.
-
(2010)
Digit. Investig.
, vol.7
, Issue.1-2
, pp. 56-64
-
-
Iqbal, F.1
-
30
-
-
58449112832
-
Computational methods in authorship attribution
-
Koppel, M., Schler, J., Argamon, S., Computational methods in authorship attribution. J. Am. Soc. Inf. Sci. Technol. 60:1 (2009), 9–26.
-
(2009)
J. Am. Soc. Inf. Sci. Technol.
, vol.60
, Issue.1
, pp. 9-26
-
-
Koppel, M.1
Schler, J.2
Argamon, S.3
-
31
-
-
4744343736
-
Enhancing fraud prevention and detection by profiling fraud offenders
-
Kapardis, A., Krambia-Kpardis, M., Enhancing fraud prevention and detection by profiling fraud offenders. Crim. Behav. Ment. Health, 2004, 189–201.
-
(2004)
Crim. Behav. Ment. Health
, pp. 189-201
-
-
Kapardis, A.1
Krambia-Kpardis, M.2
-
32
-
-
33745456200
-
Fileprints: identifying file types by n-gram analysis
-
In: Security, pp.
-
Li, W.-J., Wang, K., Stolfo, S.J., Herzog, B., 2015. Fileprints: identifying file types by n-gram analysis. In: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pp. 64–71.
-
(2015)
Proceedings of the 2005 IEEE Workshop on Information Assurance an
, pp. 64-71
-
-
Li, W.-J.1
Wang, K.2
Stolfo, S.J.3
Herzog, B.4
-
34
-
-
70450140870
-
Analyzing behaviorial features for email classification
-
Martin, S., Sewani, A., Nelson, B., Chen, K., Joseph, A.D., 2005. Analyzing behaviorial features for email classification. In: Prodeedings of the IEEE Second Conference on Email and Anti-Spam (CEAS 2005).
-
(2005)
In: Prodeedings of the IEEE Second Conference on Email and Anti-Spam (CEAS 2005).
-
-
Martin, S.1
Sewani, A.2
Nelson, B.3
Chen, K.4
Joseph, A.D.5
-
36
-
-
33748759334
-
Plagiarism – a survey
-
Maurer, H., Kappe, F., Zaka, B., Plagiarism – a survey. J. Univers. Comput. Sci. 12:8 (2006), 1050–1084.
-
(2006)
J. Univers. Comput. Sci.
, vol.12
, Issue.8
, pp. 1050-1084
-
-
Maurer, H.1
Kappe, F.2
Zaka, B.3
-
37
-
-
84990912408
-
A Hybrid Model to Detect Malicious Executables
-
Masud, M.M., Khan, L., Thuraisingham, B., 2007. A Hybrid Model to Detect Malicious Executables.
-
(2007)
-
-
Masud, M.M.1
Khan, L.2
Thuraisingham, B.3
-
38
-
-
33847644600
-
A framework for behavior-based detection of user substitution in a mobile context
-
Mazhelis, O., Puuronen, S., A framework for behavior-based detection of user substitution in a mobile context. Comput. Secur. 26:2 (2007), 154–176.
-
(2007)
Comput. Secur.
, vol.26
, Issue.2
, pp. 154-176
-
-
Mazhelis, O.1
Puuronen, S.2
-
39
-
-
79151473959
-
Biometric keypads: Improving accuracy through optimal PIN selection
-
Ngugi, B., Tremaine, M., Tarasewich, P., Biometric keypads: Improving accuracy through optimal PIN selection. Decis. Support Syst. 50:4 (2011), 769–776.
-
(2011)
Decis. Support Syst.
, vol.50
, Issue.4
, pp. 769-776
-
-
Ngugi, B.1
Tremaine, M.2
Tarasewich, P.3
-
40
-
-
84883293567
-
Keyboard behavior based authentication for security
-
Juola, P., Noecker Jr., J.I., Stolerman, Ariel, Ryan, Michael V., Brennan, Patrick, Greenstadt, Rachel, Keyboard behavior based authentication for security. IT Prof. 15:4 (2013), 8–11.
-
(2013)
IT Prof.
, vol.15
, Issue.4
, pp. 8-11
-
-
Juola, P.1
Noecker Jr., J.I.2
Stolerman, A.3
Ryan, M.V.4
Brennan, P.5
Greenstadt, R.6
-
41
-
-
84861101642
-
Leveraging behavioral science to mitigate cyber security risk
-
Pfleeger, S.L., Caputo, D.D., Leveraging behavioral science to mitigate cyber security risk. Comput. Secur. 31:4 (2012), 597–611.
-
(2012)
Comput. Secur.
, vol.31
, Issue.4
, pp. 597-611
-
-
Pfleeger, S.L.1
Caputo, D.D.2
-
44
-
-
0016060153
-
A contextual postprocessing system for error correction using binary n-grams
-
Riseman, E.M., Hanson, A.R., A contextual postprocessing system for error correction using binary n-grams. IEEE Trans. Comput. 23:5 (1974), 480–493.
-
(1974)
IEEE Trans. Comput.
, vol.23
, Issue.5
, pp. 480-493
-
-
Riseman, E.M.1
Hanson, A.R.2
-
45
-
-
84922160391
-
Using a variety of n-grams for the detection of different kinds of plagiarism
-
Shrestha, P., Solorio, T., 2013. Using a variety of n-grams for the detection of different kinds of plagiarism. In: Notebook for PAN at CLEF 2013, Valencia, España.
-
(2013)
Notebook for PAN at CLEF 2013, Valencia, España.
-
-
Shrestha, P.1
Solorio, T.2
-
47
-
-
84887467907
-
Intrinsic plagiarism detection using character n-gram profiles
-
In: 2009), pp.
-
Stamatatos, E., 2009. Intrinsic plagiarism detection using character n-gram profiles. In: SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (Pan 2009), pp. 38–46.
-
(2009)
SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (Pa
, pp. 38-46
-
-
Stamatatos, E.1
-
48
-
-
79952311058
-
Intrinsic plagiarism analysis
-
Stein, B., Lipka, N., Prettenhofer, P., Intrinsic plagiarism analysis. Lang. Resour. Eval. 45:1 (2010), 63–82.
-
(2010)
Lang. Resour. Eval.
, vol.45
, Issue.1
, pp. 63-82
-
-
Stein, B.1
Lipka, N.2
Prettenhofer, P.3
-
49
-
-
0010111194
-
A binary n-gram technique for automatic correction of substitution, deletion, insertion, and reversal errors in words
-
Ullmann, J.R., A binary n-gram technique for automatic correction of substitution, deletion, insertion, and reversal errors in words. Comput. J. 20:2 (1977), 141–147.
-
(1977)
Comput. J.
, vol.20
, Issue.2
, pp. 141-147
-
-
Ullmann, J.R.1
-
50
-
-
84990951995
-
I.T.C., Understanding Statistics
-
Oxford University Press
-
Upton, G., I.T.C., Understanding Statistics. 1996, Oxford University Press.
-
(1996)
-
-
Upton, G.1
-
51
-
-
84910602883
-
To shut them up or to clarify: restraining the spread of rumors in online social networks
-
Wen, S., Jiang, J., Xiang, Y., Yu, S., Zhou, W., Jia, W., To shut them up or to clarify: restraining the spread of rumors in online social networks. IEEE Trans. Parallel Distrib. Syst. 25:12 (2014), 3306–3316.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.12
, pp. 3306-3316
-
-
Wen, S.1
Jiang, J.2
Xiang, Y.3
Yu, S.4
Zhou, W.5
Jia, W.6
-
52
-
-
84923197121
-
A sword with two edges: propagation studies on both positive and negative information in online social networks
-
Wen, S., Haghighi, M., Chen, C., Xiang, Y., Zhou, W., Jia, W., A sword with two edges: propagation studies on both positive and negative information in online social networks. IEEE Trans. Comput. 64:3 (2015), 640–653.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.3
, pp. 640-653
-
-
Wen, S.1
Haghighi, M.2
Chen, C.3
Xiang, Y.4
Zhou, W.5
Jia, W.6
-
54
-
-
84880571602
-
How to achieve non-repudiation of origin with privacy protection in cloud computing
-
Wu, W., et al. How to achieve non-repudiation of origin with privacy protection in cloud computing. J. Comput. Syst. Sci. 79:8 (2013), 1200–1213.
-
(2013)
J. Comput. Syst. Sci.
, vol.79
, Issue.8
, pp. 1200-1213
-
-
Wu, W.1
-
55
-
-
77955712298
-
Web user behavioral profiling for user identification
-
Yang, Y.H., Web user behavioral profiling for user identification. Decis. Support Syst. 49:3 (2010), 261–271.
-
(2010)
Decis. Support Syst.
, vol.49
, Issue.3
, pp. 261-271
-
-
Yang, Y.H.1
-
56
-
-
84886384870
-
Opinion-based User Profile Modeling for Contextual Suggestions, pp
-
Yang, P., Fang, H., 2013. Opinion-based User Profile Modeling for Contextual Suggestions, pp. 80–83.
-
(2013)
-
-
Yang, P.1
Fang, H.2
|