DocumentCode :
3586237
Title :
[Title page i]
fYear :
2014
Abstract :
The following topics are dealt with: cybercrime; trustworthy computing; likelihood ratio; forensic text comparison procedures; multivariate kernel density; word n-grams; character n-grams; public key infrastructure; malicious advertising; music piracy; privacy threats; social networking service aggregators; authorship analysis; Zeus botnet source code; malware mining ; and data mining clustering techniques.
Keywords :
computational linguistics; data mining; data privacy; pattern clustering; security of data; social networking (online); trusted computing; Zeus botnet source code; authorship analysis; character n-grams; clustering techniques; cybercrime; data mining; forensic text comparison procedures; likelihood ratio; malicious advertising; malware mining; multivariate kernel density; music piracy; privacy threats; public key infrastructure; social networking service aggregators; trustworthy computing; word n-grams;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cybercrime and Trustworthy Computing Conference (CTC), 2014 Fifth
Print_ISBN :
978-1-4799-8824-2
Type :
conf
DOI :
10.1109/CTC.2014.1
Filename :
7087315
Link To Document :
بازگشت