A survey of information security incident handling in the cloud

NH Ab Rahman, KKR Choo - computers & security, 2015 - Elsevier
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …

A systematic survey of online data mining technology intended for law enforcement

M Edwards, A Rashid, P Rayson - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
As an increasing amount of crime takes on a digital aspect, law enforcement bodies must
tackle an online environment generating huge volumes of data. With manual inspections …

Authorship verification for short messages using stylometry

ML Brocardo, I Traore, S Saad… - 2013 International …, 2013 - ieeexplore.ieee.org
Authorship verification can be checked using stylometric techniques through the analysis of
linguistic styles and writing characteristics of the authors. Stylometry is a behavioral feature …

Document clustering for forensic analysis: An approach for improving computer inspection

LF da Cruz Nassif, ER Hruschka - IEEE transactions on …, 2012 - ieeexplore.ieee.org
In computer forensic analysis, hundreds of thousands of files are usually examined. Much of
the data in those files consists of unstructured text, whose analysis by computer examiners is …

[HTML][HTML] Authorship verification of e-mail and tweet messages applied for continuous authentication

ML Brocardo, I Traore, I Woungang - Journal of Computer and System …, 2015 - Elsevier
Authorship verification using stylometry consists of identifying a user based on his writing
style. In this paper, authorship verification is applied for continuous authentication using …

Authorship verification applied to detection of compromised accounts on online social networks: A continuous approach

S Barbon, RA Igawa, B Bogaz Zarpelão - Multimedia Tools and …, 2017 - Springer
Compromising legitimate accounts has been the most used strategy to spread malicious
content on OSN (Online Social Network). To address this problem, we propose a pure text …

Promoting ethical awareness in communication analysis: investigating potentials and limits of visual analytics for intelligence applications

MT Fischer, SD Hirsbrunner, W Jentner… - Proceedings of the …, 2022 - dl.acm.org
Digital systems for analyzing human communication data have become prevalent in recent
years. This may be related to the increasing abundance of data that can be harnessed but …

Toward a framework for continuous authentication using stylometry

ML Brocardo, I Traore… - 2014 IEEE 28th …, 2014 - ieeexplore.ieee.org
Continuous Authentication (CA) consists of monitoring and checking repeatedly and
unobtrusively user behavior during a computing session in order to discriminate between …

[PDF][PDF] Verifying online user identity using stylometric analysis for short messages

ML Brocardo, I Traore, S Saad, I Woungang - Journal of networks, 2014 - Citeseer
Stylometry consists of the analysis of linguistic styles and writing characteristics of the
authors for identification, characterization, or verification purposes. In this paper, we …

CommAID: Visual analytics for communication analysis through interactive dynamics modeling

MT Fischer, D Seebacher… - Computer Graphics …, 2021 - Wiley Online Library
Communication consists of both meta‐information as well as content. Currently, the
automated analysis of such data often focuses either on the network aspects via social …