[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Benjamin, 2016 - Google Patents

Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectives

Benjamin, 2016

View PDF
Document ID
6380610433081703014
Author
Benjamin V
Publication year

External Links

Snippet

Cybersecurity has become one of the most pressing issues facing society today. In particular, cybercriminals often congregate within online communities to exchange knowledge and assets. As a result, there has been a strong interest in recent years in …
Continue reading at repository.arizona.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/101Collaborative creation of products or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data

Similar Documents

Publication Publication Date Title
Benjamin et al. DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics.
Can et al. A new direction in social network analysis: Online social network analysis problems and applications
Kharraz et al. Surveylance: Automatically detecting online survey scams
Benjamin et al. Examining hacker participation length in cybercriminal internet-relay-chat communities
Alani Big data in cybersecurity: a survey of applications and future trends
Appel Cybervetting: Internet searches for vetting, investigations, and open-source intelligence
Vacca Online terrorist propaganda, recruitment, and radicalization
Layton et al. Automating open source intelligence: algorithms for OSINT
Kumar et al. Online social network security: a comparative review using machine learning and deep learning
Rahman et al. Detecting malicious facebook applications
Huete Trujillo et al. Tor hidden services: A systematic literature review
Das A risk-reduction-based incentivization model for human-centered multi-factor authentication
Chang et al. Cybersecurity for children: an investigation into the application of social media
Hughes et al. The art of cybercrime community research
Akhtar et al. SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Benjamin Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectives
De Fusco Advanced C2 Fingerprinting
Senecal The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet
Wilhoit et al. Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
Li et al. Understanding and analyzing appraisal systems in the underground marketplaces
Wang Mitigating phishing threats
Farrell Phishing in the financial sector
Acar Online Tracking Technologies and Web Privacy
Durey Leveraging browser fingerprinting to strengthen web authentication