The Internet provides an ideal anonymous channel for concealing computer-mediated malicious activities, as the network-based origins of critical electronic textual evidence (e.g., emails, blogs, forum posts, chat logs, etc.) can be easily repudiated. Authorship attribution is the study of identifying the actual author of the given anonymous documents based on the text itself, and for decades, many linguistic stylometry and computational techniques have been extensively studied for this purpose. However, most of the previous research emphasizes promoting the authorship attribution accuracy, and few works have been done for the purpose of constructing and visualizing the evidential traits. In addition, these sophisticated techniques are diffi...
Online Grooming is a growing phenomenon within online environments. One of the major problems encoun...
Abstract. As a result of growing misuse of online anonymity, researchers have begun to create visual...
We describe an investigation into e-mail content mining for author identification, or authorship att...
The Internet provides an ideal anonymous channel for concealing computer-mediated malicious activiti...
E-mail has become the most popular Internet application and with its rise in use has come an inevita...
In this chapter, we briefly overview the relatively new discipline of computer forensics and describ...
There is an alarming increase in the number of cyber-crime incidents through anonymous e-mails. The ...
In this chapter, we briefly overview the relatively new discipline of computer forensics and describ...
This series vol. entitled: ICT Systems Security and Privacy Protection: 29th IFIP TC 11 Internationa...
Authorship attribution is the study of determining the author of a document by analyzing its content...
Part 8: Identifiability and Decision MakingInternational audienceWith the popularity of computer and...
In some investigations of digital crime, the question of who was at the keyboard when incriminating ...
E-mail communication is often abused for conducting social engineering attacks including spamming, p...
Online Grooming is a growing phenomenon within online environments. One of the major problems encoun...
Abstract—Authorship Identification techniques are used to identify the most appropriate author from ...
Online Grooming is a growing phenomenon within online environments. One of the major problems encoun...
Abstract. As a result of growing misuse of online anonymity, researchers have begun to create visual...
We describe an investigation into e-mail content mining for author identification, or authorship att...
The Internet provides an ideal anonymous channel for concealing computer-mediated malicious activiti...
E-mail has become the most popular Internet application and with its rise in use has come an inevita...
In this chapter, we briefly overview the relatively new discipline of computer forensics and describ...
There is an alarming increase in the number of cyber-crime incidents through anonymous e-mails. The ...
In this chapter, we briefly overview the relatively new discipline of computer forensics and describ...
This series vol. entitled: ICT Systems Security and Privacy Protection: 29th IFIP TC 11 Internationa...
Authorship attribution is the study of determining the author of a document by analyzing its content...
Part 8: Identifiability and Decision MakingInternational audienceWith the popularity of computer and...
In some investigations of digital crime, the question of who was at the keyboard when incriminating ...
E-mail communication is often abused for conducting social engineering attacks including spamming, p...
Online Grooming is a growing phenomenon within online environments. One of the major problems encoun...
Abstract—Authorship Identification techniques are used to identify the most appropriate author from ...
Online Grooming is a growing phenomenon within online environments. One of the major problems encoun...
Abstract. As a result of growing misuse of online anonymity, researchers have begun to create visual...
We describe an investigation into e-mail content mining for author identification, or authorship att...