Abstract :
The following topics are dealt with: cybercrime; trustworthy computing; likelihood ratio; forensic text comparison procedures; multivariate kernel density; word n-grams; character n-grams; public key infrastructure; malicious advertising; music piracy; privacy threats; social networking service aggregators; authorship analysis; Zeus botnet source code; malware mining ; and data mining clustering techniques.
Keywords :
computational linguistics; data mining; data privacy; pattern clustering; security of data; social networking (online); trusted computing; Zeus botnet source code; authorship analysis; character n-grams; clustering techniques; cybercrime; data mining; forensic text comparison procedures; likelihood ratio; malicious advertising; malware mining; multivariate kernel density; music piracy; privacy threats; public key infrastructure; social networking service aggregators; trustworthy computing; word n-grams;
Conference_Titel :
Cybercrime and Trustworthy Computing Conference (CTC), 2014 Fifth
Print_ISBN :
978-1-4799-8824-2