http://researchonline.federation.edu.au/vital/access/manager/Index ${session.getAttribute("locale")} 5 The role of love stories in Romance Scams : A qualitative analysis of fraudulent profiles http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:12621 Wed 07 Apr 2021 14:00:51 AEST ]]> Automating Open Source Intelligence: Algorithms for OSINT http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:12597 Wed 07 Apr 2021 14:00:50 AEST ]]> Relative cyberattack Attribution http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:12607 Wed 07 Apr 2021 14:00:50 AEST ]]> Be careful who you trust: Issues with the public key infrastructure http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:12516 Wed 07 Apr 2021 14:00:46 AEST ]]> Optimization based clustering algorithms for authorship analysis of phishing emails http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:12192 Wed 07 Apr 2021 14:00:29 AEST ]]> Improving authorship attribution in twitter through topic-based sampling http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:11932 Wed 07 Apr 2021 13:57:13 AEST ]]> Ethical considerations when using online datasets for research purposes http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:11904 Wed 07 Apr 2021 13:57:11 AEST ]]> REPLOT : REtrieving Profile Links on Twitter for malicious campaign discovery http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:10460 Wed 07 Apr 2021 13:55:50 AEST ]]> Authorship analysis of the zeus botnet source code http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:10306 Wed 07 Apr 2021 13:55:39 AEST ]]> Mining malware to detect variants http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:9275 Wed 07 Apr 2021 13:54:29 AEST ]]> Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:7582 Wed 07 Apr 2021 13:47:02 AEST ]]> Authorship analysis of aliases: Does topic influence accuracy? http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:7112 Wed 07 Apr 2021 13:46:37 AEST ]]> API design for machine learning software: experiences from the scikit-learn project http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:6888 Wed 07 Apr 2021 13:46:26 AEST ]]> ICANN or ICANT: Is WHOIS an Enabler of Cybercrime? http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5894 Wed 07 Apr 2021 13:45:28 AEST ]]> Identifying Faked Hotel Reviews Using Authorship Analysis http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5875 Wed 07 Apr 2021 13:45:27 AEST ]]> Malicious Spam Emails Developments and Authorship Attribution http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5843 Wed 07 Apr 2021 13:45:25 AEST ]]> Skype Traffic Classification Using Cost Sensitive Algorithms http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5847 Wed 07 Apr 2021 13:45:25 AEST ]]> Indirect information linkage for OSINT through authorship analysis of aliases http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5749 Wed 07 Apr 2021 13:45:19 AEST ]]> REPLOT: REtrieving profile links on Twitter for suspicious networks detection http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5754 Wed 07 Apr 2021 13:45:19 AEST ]]> Crime toolkits: The productisation of cybercrime http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5731 Wed 07 Apr 2021 13:45:18 AEST ]]> Evaluating authorship distance methods using the positive Silhouette coefficient http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5156 Wed 07 Apr 2021 13:44:47 AEST ]]> Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP) http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5094 Wed 07 Apr 2021 13:44:42 AEST ]]> Towards an implementation of information flow security using semantic web technologies http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4974 Wed 07 Apr 2021 13:44:34 AEST ]]> Authorship attribution of IRC messages using inverse author frequency http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4965 Wed 07 Apr 2021 13:44:33 AEST ]]> Identifying cyber predators through forensic authorship analysis of chat logs http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4949 Wed 07 Apr 2021 13:44:32 AEST ]]> Automated unsupervised authorship analysis using evidence accumulation clustering http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4856 Wed 07 Apr 2021 13:44:24 AEST ]]> Recentred local profiles for authorship attribution http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4855 Wed 07 Apr 2021 13:44:24 AEST ]]> Unsupervised authorship analysis of phishing webpages http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4854 Wed 07 Apr 2021 13:44:24 AEST ]]> Fake file detection in P2P networks by consensus and reputation http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4589 Wed 07 Apr 2021 13:44:04 AEST ]]> Application of SVM in citation information extraction http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4556 Wed 07 Apr 2021 13:44:01 AEST ]]> Malware detection based on structural and behavioural features of API calls http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4336 Wed 07 Apr 2021 13:43:47 AEST ]]> How much material on BitTorrent is infringing content? A case study http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4300 Wed 07 Apr 2021 13:43:45 AEST ]]> Automatically determining phishing campaigns using the USCAP methodology http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3923 Wed 07 Apr 2021 13:34:58 AEST ]]> The seven scam types: Mapping the terrain of cybercrime http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3844 Wed 07 Apr 2021 13:34:54 AEST ]]> Authorship attribution for Twitter in 140 characters or less http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3833 th century considered it difficult to determine the authorship of a document of fewer than 1000 words. By the 1990s this values had decreased to less than 500 words and in the early 21 st century it was considered possible to determine the authorship of a document in 250 words. The need for this ever decreasing limit is exemplified by the trend towards many shorter communications rather than fewer longer communications, such as the move from traditional multi-page handwritten letters to shorter, more focused emails. This trend has also been shown in online crime, where many attacks such as phishing or bullying are performed using very concise language. Cybercrime messages have long been hosted on Internet Relay Chats (IRCs) which have allowed members to hide behind screen names and connect anonymously. More recently, Twitter and other short message based web services have been used as a hosting ground for online crimes. This paper presents some evaluations of current techniques and identifies some new preprocessing methods that can be used to enable authorship to be determined at rates significantly better than chance for documents of 140 characters or less, a format popularised by the micro-blogging website Twitter1. We show that the SCAP methodology performs extremely well on twitter messages and even with restrictions on the types of information allowed, such as the recipient of directed messages, still perform significantly higher than chance. Further to this, we show that 120 tweets per user is an important threshold, at which point adding more tweets per user gives a small but non-significant increase in accuracy. © 2010 IEEE.]]> Wed 07 Apr 2021 13:34:53 AEST ]]> Determining provenance in phishing websites using automated conceptual analysis http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2304 Wed 07 Apr 2021 13:33:22 AEST ]]> Using differencing to increase distinctiveness for phishing website clustering http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2303 Wed 07 Apr 2021 13:33:22 AEST ]]> Using stereotypes to improve early-match poker play http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:1708 Wed 07 Apr 2021 13:32:48 AEST ]]> Online romance scam: Expensive e-living for romantic happiness http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:15883 Mon 28 Mar 2022 14:55:02 AEDT ]]> Characterising network traffic for Skype forensics http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4950 Fri 30 Apr 2021 15:54:47 AEST ]]>