People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to distinct groups or classes have potential applications in targeted services, online fraud detection, extensive social sorting, and cyber-security. This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. More specifically, in this paper we discuss the design and implementation of two tools of the framework. The Twitter Geographic Profiler tool builds a map of the ethno-cultural communities of a person's friends on Twitter social media service. The E-mail Address Profiler tool identifies the probable identities of individuals ...
When we meet a new person, we start by introducing ourselves. We share our names, and other informat...
Under both benign and malign circumstances, people now manage a spectrum of identities across both r...
This paper provides algorithms for learning the identities of individuals from the trails of seeming...
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to...
Personally expressed identity is who or what an individual themselves says they are, and it should b...
Twitter user profiles contain rich information that allows researchers to infer particular attribute...
Social media users often hold several accounts in their effort to multiply the spread of their thoug...
PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception...
Identity resolution capability for social networking profiles is important for a range of purposes, ...
Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in ...
Whenever they interact on big data platforms such as social media, humans run the risk of being tar...
A key issue facing cybercrime investigations is connecting online identities to real-world identitie...
On-line Social Networks (OSNs) have dramatically changed how users connect, communicate, share conte...
Online cybercrime activities often involve criminals hiding behind multiple identities (so-called di...
The term “Digital Identity” is used here to describe the persona a person projects across the intern...
When we meet a new person, we start by introducing ourselves. We share our names, and other informat...
Under both benign and malign circumstances, people now manage a spectrum of identities across both r...
This paper provides algorithms for learning the identities of individuals from the trails of seeming...
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to...
Personally expressed identity is who or what an individual themselves says they are, and it should b...
Twitter user profiles contain rich information that allows researchers to infer particular attribute...
Social media users often hold several accounts in their effort to multiply the spread of their thoug...
PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception...
Identity resolution capability for social networking profiles is important for a range of purposes, ...
Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in ...
Whenever they interact on big data platforms such as social media, humans run the risk of being tar...
A key issue facing cybercrime investigations is connecting online identities to real-world identitie...
On-line Social Networks (OSNs) have dramatically changed how users connect, communicate, share conte...
Online cybercrime activities often involve criminals hiding behind multiple identities (so-called di...
The term “Digital Identity” is used here to describe the persona a person projects across the intern...
When we meet a new person, we start by introducing ourselves. We share our names, and other informat...
Under both benign and malign circumstances, people now manage a spectrum of identities across both r...
This paper provides algorithms for learning the identities of individuals from the trails of seeming...