نتایج جستجو برای: writeprint

تعداد نتایج: 12  

2014
STEVEN H. H. DING Steven H. H. Ding Benjamin C. M. Fung

Authorship Identification and Writeprint Visualization

Journal: :LLC 2012
Lisa Pearl Mark Steyvers

We describe a new supervised machine learning approach for detecting authorship deception, a specific type of authorship attribution task particularly relevant for cybercrime forensic investigations, and demonstrate its validity on two case studies drawn from realistic online data sets. The core of our approach involves identifying uncharacteristic behavior for an author, based on a writeprint ...

Journal: :DSH 2017
Lisa Pearl Kristine Lu Anousheh Haghighi

Deliberate differences in how authors represent characters has been a core area of literary investigation since the dawn of literary theory. Here, we focus on epistolary literature, where authors consciously attempt to create different character styles through series of documents like letters. Previous studies suggest that the linguistic gestalt of an author’s style – the author’s writeprint – ...

Journal: :Inf. Sci. 2013
Farkhund Iqbal Hamad Binsalleeh Benjamin C. M. Fung Mourad Debbabi

The cyber world provides an anonymous environment for criminals to conduct malicious activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often, these activities involve textual communication between a criminal and a victim, or between criminals themselves. The forensic analysis of online textual documents for addressing the anonymity problem called authorship anal...

Journal: :JNW 2012
Jianwen Sun Zongkai Yang Sanya Liu Pei Wang

Due to the ubiquitous nature and anonymity abuses in cyberspace, it’s difficult to make criminal identity tracing in cybercrime investigation. Writeprint identification offers a valuable tool to counter anonymity by applying stylometric analysis technique to help identify individuals based on textual traces. In this study, a framework for online writeprint identification is proposed. Variable l...

ژورنال: :محاسبات نرم 0
زینب فرهمندپور zeinab farahmandpoor هومن نیک مهر hooman nikmehr محرم منصوری زاده moharram mansoorizade امید طیب زاده قمصری omid tabibzadeh ghamsary

پیشرفت سریع ارتباطات اینترنتی و استفاده ی نادرست از ناشناس بودن متون آنلاین، باعث به وجود آمدن مسائل امنیتی شده است. هویت ناشناس ابزارهای اینترنتی مانند ایمیل ها، وبلاگ ها و وب سایت ها به روش های ارتباط مورد علاقه ای برای کاربردهای جنایی تبدیل شده است. روابط سیاسی و اجتماعی جهان باعث توجه زیادی به زبان فارسی شده است. که این موضوع خود موجب فراوانی متون فارسی در اینترنت گردیده است. در این مقاله ی...

Journal: :JCP 2012
Zhi Liu Zongkai Yang Sanya Liu Wenting Meng

With the widespread application of computer network technology, diverse anonymous cyber crimes begin to appear in the online community. The anonymous nature of online-information distribution makes writeprint identification a critical forensic problem. But the difficulty of the task is the huge number of features in even a moderate-sized available text corpus, which causes the problem of over-t...

2011
Sanya Liu Zhi Liu Jianwen Sun Lin Liu

Abstract Synergetic neural network (SNN) associates synergetics with artificial neural network, it can rigorously deal with the behavior of network in the mathematical theory, and have the advantage of fast learning, short pattern recalling time and so on. In this paper, a pattern recognition method based on the self-adaptive attention parameters presented on the basis of analyzing the key tech...

2010
Yi-Da Chen Ahmed Abbasi Hsinchun Chen

Framing a collective identity is an essential process in a social movement. The identity defines the orientation of public actions to take and establishes an informal interaction network for circulating important information and material resources. While domestic social movements emphasize the coherence of identity in alliance, global or cyber-activism is now flexible in its collective identity...

Journal: :Digital Investigation 2010
Farkhund Iqbal Hamad Binsalleeh Benjamin C. M. Fung Mourad Debbabi

Many criminals exploit the convenience of anonymity in the cyber world to conduct illegal activities. E-mail is the most commonly used medium for such activities. Extracting knowledge and information from e-mail text has become an important step for cybercrime investigation and evidence collection. Yet, it is one of the most challenging and timeconsuming tasks due to special characteristics of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید