Time Profiles for Identifying Users in Online Environments

作者: Fredrik Johansson , Lisa Kaati , Amendra Shrestha

DOI: 10.1109/JISIC.2014.22

关键词:

摘要: Many people who discuss sensitive or private issues on web forums and other social media services are using pseudonyms aliases in order to not reveal their true identity, while usual accounts when posting messages nonsensitive issues. Previous research has shown that if those individuals post large amounts of messages, stylometric techniques can be used identify the author based characteristics textual content. In this paper we show how an author's identity unmasked a similar way various time features, such as period day week user's posts have been published. This is demonstrated supervised machine learning (i.e., identification) experiments, well unsupervised alias matching (similarity detection) experiments.

参考文章(19)
Bumsuk Lee, A Temporal Analysis of Posting Behavior in Social Media Streams international conference on weblogs and social media. ,(2012)
J. Dahlin, F. Johansson, L. Kaati, C. Martenson, P. Svenson, Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards advances in social networks analysis and mining. pp. 850- 857 ,(2012) , 10.1109/ASONAM.2012.154
Fredrik Johansson, Lisa Kaati, Amendra Shrestha, Detecting multiple aliases in social media advances in social networks analysis and mining. pp. 1004- 1011 ,(2013) , 10.1145/2492517.2500261
Arvind Narayanan, Hristo Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, Dawn Song, On the Feasibility of Internet-Scale Author Identification ieee symposium on security and privacy. pp. 300- 314 ,(2012) , 10.1109/SP.2012.46
Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Martenson, Pontus Svenson, Analysis of Weak Signals for Detecting Lone Wolf Terrorists european intelligence and security informatics conference. pp. 197- 204 ,(2012) , 10.1109/EISIC.2012.20
Ahmed Abbasi, Hsinchun Chen, Writeprints ACM Transactions on Information Systems. ,vol. 26, pp. 1- 29 ,(2008) , 10.1145/1344411.1344413
Ahmed Abbasi, Hsinchun Chen, Affect Intensity Analysis of Dark Web Forums intelligence and security informatics. pp. 282- 288 ,(2007) , 10.1109/ISI.2007.379486
Michael Brennan, Sadia Afroz, Rachel Greenstadt, Adversarial stylometry ACM Transactions on Information and System Security. ,vol. 15, pp. 1- 22 ,(2012) , 10.1145/2382448.2382450
Ana Adan, Simon N. Archer, Maria Paz Hidalgo, Lee Di Milia, Vincenzo Natale, Christoph Randler, Circadian Typology: A Comprehensive Review Chronobiology International. ,vol. 29, pp. 1153- 1175 ,(2012) , 10.3109/07420528.2012.719971
Efstathios Stamatatos, A survey of modern authorship attribution methods Journal of the Association for Information Science and Technology. ,vol. 60, pp. 538- 556 ,(2009) , 10.1002/ASI.V60:3