Skip to main content

Showing 1–7 of 7 results for author: Peersman, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.15784  [pdf, other

    cs.CR

    A Survey of Relevant Text Mining Technology

    Authors: Claudia Peersman, Matthew Edwards, Emma Williams, Awais Rashid

    Abstract: Recent advances in text mining and natural language processing technology have enabled researchers to detect an authors identity or demographic characteristics, such as age and gender, in several text genres by automatically analysing the variation of linguistic characteristics. However, applying such techniques in the wild, i.e., in both cybercriminal and regular online social media, differs from… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

  2. arXiv:2203.13179  [pdf, other

    cs.CR cs.CY

    Automatic User Profiling in Darknet Markets: a Scalability Study

    Authors: Claudia Peersman, Matthew Edwards, Emma Williams, Awais Rashid

    Abstract: In this study, we investigate the scalability of state-of-the-art user profiling technologies across different online domains. More specifically, this work aims to understand the reliability and limitations of current computational stylometry approaches when these are applied to underground fora in which user populations potentially differ from other online platforms (predominantly male, younger a… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

  3. arXiv:2203.08642  [pdf, other

    cs.CR

    Understanding motivations and characteristics of financially-motivated cybercriminals

    Authors: Claudia Peersman, Emma Williams, Matthew Edwards, Awais Rashid

    Abstract: Background: Cyber offences, such as hacking, malware creation and distribution, and online fraud, present a substantial threat to organizations attempting to safeguard their data and information. By understanding the evolving characteristics and motivations of individuals involved in these activities, and the threats that they may pose, cyber security practitioners will be better placed to underst… ▽ More

    Submitted 28 March, 2022; v1 submitted 16 March, 2022; originally announced March 2022.

  4. arXiv:2203.08557  [pdf, ps, other

    cs.CR

    How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces

    Authors: Andrew C. Dwyer, Joseph Hallett, Claudia Peersman, Matthew Edwards, Brittany I. Davidson, Awais Rashid

    Abstract: Darknet marketplaces, accessible through, Tor are where users can buy illicit goods, and learn to hide from law enforcement. We surveyed the advice on these markets and found valid security advice mixed up with paranoid threat models and a reliance on privacy tools dismissed as unusable by the mainstream.

    Submitted 16 March, 2022; originally announced March 2022.

  5. arXiv:2202.07419  [pdf, other

    cs.CY cs.CR

    Characterising Cybercriminals: A Review

    Authors: Matthew Edwards, Emma Williams, Claudia Peersman, Awais Rashid

    Abstract: This review provides an overview of current research on the known characteristics and motivations of offenders engaging in cyber-dependent crimes. Due to the shifting dynamics of cybercriminal behaviour, and the availability of prior reviews in 2013, this review focuses on original research conducted from 2012 onwards, although some older studies that were not included in prior reviews are also co… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  6. arXiv:1905.12593  [pdf, other

    cs.CR cs.CY cs.SI

    Automatically Dismantling Online Dating Fraud

    Authors: Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica Whitty

    Abstract: Online romance scams are a prevalent form of mass-marketing fraud in the West, and yet few studies have addressed the technical or data-driven responses to this problem. In this type of scam, fraudsters craft fake profiles and manually interact with their victims. Because of the characteristics of this type of fraud and of how dating sites operate, traditional detection methods (e.g., those used i… ▽ More

    Submitted 30 May, 2019; v1 submitted 29 May, 2019; originally announced May 2019.

  7. arXiv:1601.02431  [pdf

    cs.CL

    The Effects of Age, Gender and Region on Non-standard Linguistic Variation in Online Social Networks

    Authors: Claudia Peersman, Walter Daelemans, Reinhild Vandekerckhove, Bram Vandekerckhove, Leona Van Vaerenbergh

    Abstract: We present a corpus-based analysis of the effects of age, gender and region of origin on the production of both "netspeak" or "chatspeak" features and regional speech features in Flemish Dutch posts that were collected from a Belgian online social network platform. The present study shows that combining quantitative and qualitative approaches is essential for understanding non-standard linguistic… ▽ More

    Submitted 11 January, 2016; originally announced January 2016.