Authorship attribution for social media forensics

A Rocha, WJ Scheirer, CW Forstall… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi
hotspots, and distributed networks like Tor has drastically complicated the task of identifying …

Social behavioral biometrics: An emerging trend

M Sultana, PP Paul, M Gavrilova - International Journal of Pattern …, 2015 - World Scientific
In todays world, identity of human beings has expanded beyond the real world to the cyber
world. Virtual identity of millions of users is present at various web-based Social Networking …

Social behavioral information fusion in multimodal biometrics

M Sultana, PP Paul… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
The goal of a biometric recognition system is to make a human-like decisions on individual's
identity by recognizing their physiological and/or behavioral traits. Nevertheless, the …

A concept of social behavioral biometrics: motivation, current developments, and future trends

M Sultana, PP Paul, M Gavrilova - … international conference on …, 2014 - ieeexplore.ieee.org
A person can be identified from his physiological traits as well as from behavioral patterns.
However, a person's behavior is not only confined to individual actions such as walking or …

User recognition from social behavior in computer-mediated social context

M Sultana, PP Paul… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Social interactions are integral part of human behavior. Although social interactions are
likely to possess unique behavioral patterns, their significance for automated user …

A blockchain-based forensic model for financial crime investigation: the embezzlement scenario

L Zarpala, F Casino - Digital Finance, 2021 - Springer
The financial crime landscape is evolving along with the digitisation of financial services.
Laws, regulations and forensic methodologies cannot efficiently cope with the growth pace …

A comparison of classifiers and features for authorship authentication of social networking messages

JS Li, LC Chen, JV Monaco, P Singh… - Concurrency and …, 2017 - Wiley Online Library
This paper develops algorithms and investigates various classifiers to determine the
authenticity of short social network postings, an average of 20.6 words, from Facebook. This …

Word embeddings for user profiling in online social networks

A Alekseev, S Nikolenko - Computación y Sistemas, 2017 - scielo.org.mx
User profiling in social networks can be significantly augmented by using available full-text
items such as posts or statuses and ratings (in the form of likes) that users give them. In this …

TB-CoAuth: Text based continuous authentication for detecting compromised accounts in social networks

R Kaur, S Singh, H Kumar - Applied Soft Computing, 2020 - Elsevier
Commencement of research towards compromised account detection in email and web
services foreshadows the growth of the same in social network scenario. In this paper …

An integrated framework of learning and evidential reasoning for user profiling using short texts

DV Vo, J Karnjana, VN Huynh - Information Fusion, 2021 - Elsevier
Inferring user profiles based on texts created by users on social networks has a variety of
applications in recommender systems such as job offering, item recommendation, and …