Cybercriminals have been using the Internet to accomplish illegitimate activities and to execute catastrophic attacks. Computer Mediated Communication, such as online chat, provides an anonymous channel for predators to exploit victims. In order to prosecute criminals in a court of law, an investigator often needs to extract evidence from a large volume of chat messages. Most of the existing search tools are keyword-based, and the search terms are provided by an investigator. The quality of the retrieved results depends on the search terms provided. Due to the large volume of chat messages and the large number of participants in public chat rooms, the process is usually time-consuming and error-prone. This thesis presents a topic search mod...
With the advancement of Internet technology and the changes in the mode of communications, it is fo...
Cyber criminals exploit opportunities for anonymity and masquerade in web-based communication to con...
Many online chat applications live in a grey area between the legitimate web and the dark net. The T...
Cybercriminals have been using the Internet to accomplish illegitimate activities and to execute cat...
© 2019 IEEE. Cybercriminals exploit the opportunities provided by the information revolution and soc...
Online predators, botmasters, and terrorists abuse the Internet and associated web technologies by c...
Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the ri...
In this dissertation, we investigate the applications of data mining algorithms on online criminal i...
This paper presents a unified social graph based text mining framework to identify digital evidences...
The cyber world provides an anonymous environment for criminals to conduct malicious activities such...
The amount of available data in our world has been exploding lately. Effectively managing large and ...
Successful Cybersecurity depends on the processing of vast quantities of data from a diverse range o...
The book first explores the cybersecurity’s landscape and the inherent susceptibility of online comm...
Constant technological growth has resulted in the danger and seriousness of cyber-attacks, which has...
This series vol. entitled: ICT Systems Security and Privacy Protection: 29th IFIP TC 11 Internationa...
With the advancement of Internet technology and the changes in the mode of communications, it is fo...
Cyber criminals exploit opportunities for anonymity and masquerade in web-based communication to con...
Many online chat applications live in a grey area between the legitimate web and the dark net. The T...
Cybercriminals have been using the Internet to accomplish illegitimate activities and to execute cat...
© 2019 IEEE. Cybercriminals exploit the opportunities provided by the information revolution and soc...
Online predators, botmasters, and terrorists abuse the Internet and associated web technologies by c...
Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the ri...
In this dissertation, we investigate the applications of data mining algorithms on online criminal i...
This paper presents a unified social graph based text mining framework to identify digital evidences...
The cyber world provides an anonymous environment for criminals to conduct malicious activities such...
The amount of available data in our world has been exploding lately. Effectively managing large and ...
Successful Cybersecurity depends on the processing of vast quantities of data from a diverse range o...
The book first explores the cybersecurity’s landscape and the inherent susceptibility of online comm...
Constant technological growth has resulted in the danger and seriousness of cyber-attacks, which has...
This series vol. entitled: ICT Systems Security and Privacy Protection: 29th IFIP TC 11 Internationa...
With the advancement of Internet technology and the changes in the mode of communications, it is fo...
Cyber criminals exploit opportunities for anonymity and masquerade in web-based communication to con...
Many online chat applications live in a grey area between the legitimate web and the dark net. The T...