Benjamin, 2016 - Google Patents
Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectivesBenjamin, 2016
View PDF- Document ID
- 6380610433081703014
- Author
- Benjamin V
- Publication year
External Links
Snippet
Cybersecurity has become one of the most pressing issues facing society today. In particular, cybercriminals often congregate within online communities to exchange knowledge and assets. As a result, there has been a strong interest in recent years in …
- 238000005065 mining 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/101—Collaborative creation of products or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Benjamin et al. | DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics. | |
Can et al. | A new direction in social network analysis: Online social network analysis problems and applications | |
Kharraz et al. | Surveylance: Automatically detecting online survey scams | |
Benjamin et al. | Examining hacker participation length in cybercriminal internet-relay-chat communities | |
Alani | Big data in cybersecurity: a survey of applications and future trends | |
Appel | Cybervetting: Internet searches for vetting, investigations, and open-source intelligence | |
Vacca | Online terrorist propaganda, recruitment, and radicalization | |
Layton et al. | Automating open source intelligence: algorithms for OSINT | |
Kumar et al. | Online social network security: a comparative review using machine learning and deep learning | |
Rahman et al. | Detecting malicious facebook applications | |
Huete Trujillo et al. | Tor hidden services: A systematic literature review | |
Das | A risk-reduction-based incentivization model for human-centered multi-factor authentication | |
Chang et al. | Cybersecurity for children: an investigation into the application of social media | |
Hughes et al. | The art of cybercrime community research | |
Akhtar et al. | SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations | |
Sabillon | Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM | |
Benjamin | Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectives | |
De Fusco | Advanced C2 Fingerprinting | |
Senecal | The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet | |
Wilhoit et al. | Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs | |
Li et al. | Understanding and analyzing appraisal systems in the underground marketplaces | |
Wang | Mitigating phishing threats | |
Farrell | Phishing in the financial sector | |
Acar | Online Tracking Technologies and Web Privacy | |
Durey | Leveraging browser fingerprinting to strengthen web authentication |