People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to distinct groups or classes have potential applications in targeted services, online fraud detection, extensive social sorting, and cyber-security. This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. More specifically, in this paper we discuss the design and implementation of two tools of the framework. The Twitter Geographic Profiler tool builds a map of the ethno-cultural communities of a person's friends on Twitter social media service. The E-mail Address Profiler tool identifies the probable identities of individuals from ...
Social media users often hold several accounts in their effort to multiply the spread of their thoug...
Under both benign and malign circumstances, people now manage a spectrum of identities across both r...
This paper presents an approach to disambiguate extracted identity information relating to different...
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to...
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to...
Online cybercrime activities often involve criminals hiding behind multiple identities (so-called di...
Identity resolution capability for social networking profiles is important for a range of purposes, ...
Whenever they interact on big data platforms such as social media, humans run the risk of being tar...
The explosion in popularity of online social networks has led to increased interest in identity reso...
PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception...
Twitter user profiles contain rich information that allows researchers to infer particular attribute...
The term “Digital Identity” is used here to describe the persona a person projects across the intern...
Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in ...
The rapid growth in the number of online services has lead to an increasing number of different iden...
When we meet a new person, we start by introducing ourselves. We share our names, and other informat...
Social media users often hold several accounts in their effort to multiply the spread of their thoug...
Under both benign and malign circumstances, people now manage a spectrum of identities across both r...
This paper presents an approach to disambiguate extracted identity information relating to different...
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to...
People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to...
Online cybercrime activities often involve criminals hiding behind multiple identities (so-called di...
Identity resolution capability for social networking profiles is important for a range of purposes, ...
Whenever they interact on big data platforms such as social media, humans run the risk of being tar...
The explosion in popularity of online social networks has led to increased interest in identity reso...
PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception...
Twitter user profiles contain rich information that allows researchers to infer particular attribute...
The term “Digital Identity” is used here to describe the persona a person projects across the intern...
Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in ...
The rapid growth in the number of online services has lead to an increasing number of different iden...
When we meet a new person, we start by introducing ourselves. We share our names, and other informat...
Social media users often hold several accounts in their effort to multiply the spread of their thoug...
Under both benign and malign circumstances, people now manage a spectrum of identities across both r...
This paper presents an approach to disambiguate extracted identity information relating to different...