DocumentCode
3586237
Title
[Title page i]
fYear
2014
Abstract
The following topics are dealt with: cybercrime; trustworthy computing; likelihood ratio; forensic text comparison procedures; multivariate kernel density; word n-grams; character n-grams; public key infrastructure; malicious advertising; music piracy; privacy threats; social networking service aggregators; authorship analysis; Zeus botnet source code; malware mining ; and data mining clustering techniques.
Keywords
computational linguistics; data mining; data privacy; pattern clustering; security of data; social networking (online); trusted computing; Zeus botnet source code; authorship analysis; character n-grams; clustering techniques; cybercrime; data mining; forensic text comparison procedures; likelihood ratio; malicious advertising; malware mining; multivariate kernel density; music piracy; privacy threats; public key infrastructure; social networking service aggregators; trustworthy computing; word n-grams;
fLanguage
English
Publisher
ieee
Conference_Titel
Cybercrime and Trustworthy Computing Conference (CTC), 2014 Fifth
Print_ISBN
978-1-4799-8824-2
Type
conf
DOI
10.1109/CTC.2014.1
Filename
7087315
Link To Document