메뉴 건너뛰기




Volumn 9, Issue 1, 2014, Pages 31-43

A probabilistic generative model for mining cybercriminal networks from online social media

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; LOSSES; MINING; STATISTICS; SUPPORT VECTOR MACHINES;

EID: 84988269615     PISSN: 1556603X     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCI.2013.2291689     Document Type: Article
Times cited : (83)

References (37)
  • 2
    • 50649124885 scopus 로고    scopus 로고
    • Competitor mining with the web
    • S. Bao, R. Li, Y. Yu, and Y. Cao, "Competitor mining with the web," IEEE Trans. Knowl. Data Eng., vol. 20, no. 10, pp. 1297-1310, 2008.
    • (2008) IEEE Trans. Knowl. Data Eng. , vol.20 , Issue.10 , pp. 1297-1310
    • Bao, S.1    Li, R.2    Yu, Y.3    Cao, Y.4
  • 3
  • 4
    • 84880219830 scopus 로고    scopus 로고
    • New avenues in opinion mining and sentiment analysis
    • E. Cambria, B. Schuller, Y. Xia, and C. Havasi, "New avenues in opinion mining and sentiment analysis," IEEE Intell. Syst., vol. 28, no. 2, pp. 15-21, 2013.
    • (2013) IEEE Intell. Syst. , vol.28 , Issue.2 , pp. 15-21
    • Cambria, E.1    Schuller, B.2    Xia, Y.3    Havasi, C.4
  • 5
    • 84876940246 scopus 로고    scopus 로고
    • Application of multi-dimensional scaling and artificial neural networks for biologically inspired opinion mining
    • Apr.
    • E. Cambria, T. Mazzocco, and A. Hussain, "Application of multi-dimensional scaling and artificial neural networks for biologically inspired opinion mining," Biol. Insp. Cogn. Arch., vol. 4, pp. 41-53, Apr. 2013.
    • (2013) Biol. Insp. Cogn. Arch. , vol.4 , pp. 41-53
    • Cambria, E.1    Mazzocco, T.2    Hussain, A.3
  • 7
    • 84983569734 scopus 로고    scopus 로고
    • Common sense reasoning for detection, prevention, and mitigation of cyberbullying,"
    • ACM
    • K. Dinakar, B. Jones, C. Havasi, H. Lieberman, and R. Picard, "Common sense reasoning for detection, prevention, and mitigation of cyberbullying," ACM Trans. Interact. Intell. Syst., vol. 2, no. 3, pp. 29-31, 2012.
    • (2012) Trans. Interact. Intell. Syst. , vol.2 , Issue.3 , pp. 29-31
    • Dinakar, K.1    Jones, B.2    Havasi, C.3    Lieberman, H.4    Picard, R.5
  • 8
    • 77956297467 scopus 로고    scopus 로고
    • The profession of IT: Discussing cyber attack
    • P. J. Denning and D. E. Denning, "The profession of IT: Discussing cyber attack," Commun. ACM, vol. 53, no. 9, pp. 29-31, 2010.
    • (2010) Commun. ACM , vol.53 , Issue.9 , pp. 29-31
    • Denning, P.J.1    Denning, D.E.2
  • 11
    • 77952415099 scopus 로고    scopus 로고
    • An inquiry into the nature and causes of the wealth of internet miscreants
    • Alexandria, VA Oct. 28-31
    • J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An inquiry into the nature and causes of the wealth of internet miscreants," in Proc. ACM Conf. Computer Communications Security, Alexandria, VA, Oct. 28-31, 2007, pp. 375-388.
    • (2007) Proc. ACM Conf. Computer Communications Security , pp. 375-388
    • Franklin, J.1    Perrig, A.2    Paxson, V.3    Savage, S.4
  • 13
    • 79961075052 scopus 로고    scopus 로고
    • Cyberwarfare: Connecting the dots in cyber intelligence
    • S. Goel, "Cyberwarfare: Connecting the dots in cyber intelligence," Commun. ACM, vol. 54, no. 8, pp. 132-140, 2011.
    • (2011) Commun. ACM , vol.54 , Issue.8 , pp. 132-140
    • Goel, S.1
  • 15
    • 0003562954 scopus 로고    scopus 로고
    • A simple generalisation of the area under the roc curve for multiple class classification problems
    • DOI 10.1023/A:1010920819831
    • D. J. Hand and R. J. Till, "A simple generalisation of the area under the ROC curve for multiple class classification problems," Mach. Learn., vol. 45, no. 2, pp. 171-186, 2001. (Pubitemid 33635984)
    • (2001) Machine Learning , vol.45 , Issue.2 , pp. 171-186
    • Hand, D.J.1    Till, R.J.2
  • 16
    • 63849171232 scopus 로고    scopus 로고
    • Identifying significant facilitators of dark network evolution
    • D. Hu, S. Kaza, and H. Chen, "Identifying significant facilitators of dark network evolution," J. Amer. Soc. Inform. Sci. Technol., vol. 60, no. 4, pp. 655-665, 2009.
    • (2009) J. Amer. Soc. Inform. Sci. Technol. , vol.60 , Issue.4 , pp. 655-665
    • Hu, D.1    Kaza, S.2    Chen, H.3
  • 17
    • 42049092041 scopus 로고    scopus 로고
    • Towards a belief revision based adaptive and context-sensitive information retrieval system
    • R. Y. K. Lau, P. Bruza, and D. Song, "Towards a belief revision based adaptive and context-sensitive information retrieval system," ACM Trans. Inform. Syst., vol. 26, no. 2, 2008.
    • (2008) ACM Trans. Inform. Syst. , vol.26 , Issue.2
    • Lau, R.Y.K.1    Bruza, P.2    Song, D.3
  • 18
    • 66149180701 scopus 로고    scopus 로고
    • Towards a fuzzy domain ontology extraction method for adaptive e-learning
    • R. Y. K. Lau, D. Song, Y. Li, C. H. Cheung, and J. X. Hao, "Towards a fuzzy domain ontology extraction method for adaptive e-learning," IEEE Trans. Knowl. Data Eng., vol. 21, no. 6, pp. 800-813, 2009.
    • (2009) IEEE Trans. Knowl. Data Eng. , vol.21 , Issue.6 , pp. 800-813
    • Lau, R.Y.K.1    Song, D.2    Li, Y.3    Cheung, C.H.4    Hao, J.X.5
  • 19
    • 33645313824 scopus 로고    scopus 로고
    • An evolutionary learning approach for adaptive negotiation agents
    • R. Y. K. Lau, M. Tang, O. Wong, S. Milliner, and Y. Chen, "An evolutionary learning approach for adaptive negotiation agents," Int. J. Intell. Syst., vol. 21, no. 1, pp. 41-72, 2006.
    • (2006) Int. J. Intell. Syst. , vol.21 , Issue.1 , pp. 41-72
    • Lau, R.Y.K.1    Tang, M.2    Wong, O.3    Milliner, S.4    Chen, Y.5
  • 20
    • 84878059044 scopus 로고    scopus 로고
    • Cominer: An effective algorithm for mining competitors from the Web data mining
    • R. Li, S. Bao, J. Wang, Y. Yu, and Y. Cao, "Cominer: An effective algorithm for mining competitors from the Web," Data Mining, in Proc. Int. Conf. Data Mining, 2006, pp. 948-952.
    • (2006) Proc. Int. Conf. Data Mining , pp. 948-952
    • Li, R.1    Bao, S.2    Wang, J.3    Yu, Y.4    Cao, Y.5
  • 25
    • 84948481845 scopus 로고
    • An algorithm for suffix stripping
    • M. Porter, "An algorithm for suffix stripping," Program, vol. 14, no. 3, pp. 130-137, 1980.
    • (1980) Program , vol.14 , Issue.3 , pp. 130-137
    • Porter, M.1
  • 29
    • 84858038774 scopus 로고    scopus 로고
    • An aspect query language model based on query decomposition and high-order contextual term association
    • D. Song, Q. Huang, P. D. Bruza, and R. Y. K. Lau, "An aspect query language model based on query decomposition and high-order contextual term association," Comput. Intell., vol. 28, no. 1, pp. 1-23, 2012.
    • (2012) Comput. Intell. , vol.28 , Issue.1 , pp. 1-23
    • Song, D.1    Huang, Q.2    Bruza, P.D.3    Lau, R.Y.K.4
  • 32
    • 76349105090 scopus 로고    scopus 로고
    • Linkage discovery through data mining [research frontier]
    • C.-K. Ting, W.-M. Zeng, and T.-C. Lin, "Linkage discovery through data mining [research frontier]," IEEE Comput. Intell. Mag., vol. 5, no. 1, pp. 10-13, 2010.
    • (2010) IEEE Comput. Intell. Mag. , vol.5 , Issue.1 , pp. 10-13
    • Ting, C.-K.1    Zeng, W.-M.2    Lin, T.-C.3
  • 33
    • 84867345977 scopus 로고    scopus 로고
    • Detecting cyber security threats in weblogs using probabilistic models
    • Proc. Pacific Asia Workshop Intelligence Security Informatics
    • F. S. Tsai and K. L. Chan, "Detecting cyber security threats in weblogs using probabilistic models," in Proc. Pacific Asia Workshop Intelligence Security Informatics (Lecture Notes in Computer Science), 2007, vol. 4430, pp. 46-57.
    • (2007) Lecture Notes in Computer Science , vol.4430 , pp. 46-57
    • Tsai, F.S.1    Chan, K.L.2
  • 34
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S. X. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Appl. Soft Comput., vol. 10, no. 1, pp. 1-35, 2010.
    • (2010) Appl. Soft Comput. , vol.10 , Issue.1 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 35
    • 84882590488 scopus 로고    scopus 로고
    • Discovering latent commercial networks from online financial news articles
    • Y. Xia, W. Su, R. Y. K. Lau, and Y. Liu, "Discovering latent commercial networks from online financial news articles," Enterprise Inform. Syst., vol. 7, no. 3, pp. 303-331, 2013.
    • (2013) Enterprise Inform. Syst. , vol.7 , Issue.3 , pp. 303-331
    • Xia, Y.1    Su, W.2    Lau, R.Y.K.3    Liu, Y.4
  • 36
    • 84884134119 scopus 로고    scopus 로고
    • Feature ensemble plus sample selection: A comprehensive approach to domain adaptation for sentiment classification
    • R. Xia, C. Zong, X. Hu, and E. Cambria, "Feature ensemble plus sample selection: A comprehensive approach to domain adaptation for sentiment classification," IEEE Intell. Syst., vol. 28, no. 3, pp. 10-18, 2013.
    • (2013) IEEE Intell. Syst. , vol.28 , Issue.3 , pp. 10-18
    • Xia, R.1    Zong, C.2    Hu, X.3    Cambria, E.4
  • 37
    • 3042824043 scopus 로고    scopus 로고
    • A study of smoothing methods for language models applied to information retrieval
    • ACM
    • C. Zhai and J. Lafferty, "A study of smoothing methods for language models applied to information retrieval," ACM Trans. Inform. Syst., vol. 22, no. 2, pp. 179-214, 2004.
    • (2004) Trans. Inform. Syst. , vol.22 , Issue.2 , pp. 179-214
    • Zhai, C.1    Lafferty, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.