Social network analysis applied to criminal networks: recent developments in Dutch law enforcement

PAC Duijn, PPHM Klerks - Networks and network analysis for defence and …, 2014 - Springer
This article examines the application of social network theory in Dutch law enforcement.
Increasing amounts of information about habitual lawbreakers and criminal networks are …

[PDF][PDF] Comparative study on email spam classifier using data mining techniques

RK Kumar, G Poonkuzhali, P Sudhakar - Proceedings of the …, 2012 - academia.edu
In this e-world, most of the transactions and business is taking place through e-mails.
Nowadays, email becomes a powerful tool for communication as it saves a lot of time and …

Dating phish: An analysis of the life cycles of phishing attacks and campaigns

V Drury, L Lux, U Meyer - … of the 17th International Conference on …, 2022 - dl.acm.org
Phishing attacks are still a general and world-wide threat to users of the Internet. In the past,
several approaches to detect phishing websites earlier and shorten the time frame between …

An approach for profiling phishing activities

IRA Hamid, JH Abawajy - Computers & Security, 2014 - Elsevier
Phishing attacks continue unabated to plague Internet users and trick them into providing
personal and confidential information to phishers. In this paper, an approach for email-born …

[HTML][HTML] Survey on spam filtering techniques

N Saadat - Communications and Network, 2011 - scirp.org
In the recent years spam became as a big problem of Internet and electronic communication.
There developed a lot of techniques to fight them. In this paper the overview of existing e …

Classification of Textual E‐Mail Spam Using Data Mining Techniques

RM Alguliev, RM Aliguliyev… - … Intelligence and Soft …, 2011 - Wiley Online Library
A new method for clustering of spam messages collected in bases of antispam system is
offered. The genetic algorithm is developed for solving clustering problems. The objective …

Profiling phishing email based on clustering approach

IRA Hamid, JH Abawajy - … on Trust, Security and Privacy in …, 2013 - ieeexplore.ieee.org
In this paper, an approach for profiling email-born phishing activities is proposed. Profiling
phishing activities are useful in determining the activity of an individual or a particular group …

A risk-scoring feedback model for webpages and web users based on browsing behavior

MB Neria, NS Yacovzada, I Ben-Gal - ACM Transactions on Intelligent …, 2017 - dl.acm.org
It has been claimed that many security breaches are often caused by vulnerable (naïve)
employees within the organization [Ponemon Institute LLC 2015a]. Thus, the weakest link in …

Foundational principles for large-scale inference: Illustrations through correlation mining

AO Hero, B Rajaratnam - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
When can reliable inference be drawn in the “Big Data” context? This paper presents a
framework for answering this fundamental question in the context of correlation mining, with …

Profiling phishing activity based on hyperlinks extracted from phishing emails

J Yearwood, M Mammadov, D Webb - Social network analysis and mining, 2012 - Springer
Phishing activity has recently been focused on social networking sites as a more effective
way of exploiting not only the technology but also the trust that may exist between members …