[go: up one dir, main page]

Yang et al., 2017 - Google Patents

How to learn klingon without a dictionary: Detection and measurement of black keywords used by the underground economy

Yang et al., 2017

View PDF
Document ID
16949654516001586241
Author
Yang H
Ma X
Du K
Li Z
Duan H
Su X
Liu G
Geng Z
Wu J
Publication year
Publication venue
2017 IEEE Symposium on Security and Privacy (SP)

External Links

Snippet

Online underground economy is an important channel that connects the merchants of illegal products and their buyers, which is also constantly monitored by legal authorities. As one common way for evasion, the merchants and buyers together create a vocabulary of jargons …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • G06F17/30657Query processing
    • G06F17/3066Query translation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/3087Spatially dependent indexing and retrieval, e.g. location dependent results to queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Similar Documents

Publication Publication Date Title
Yang et al. How to learn klingon without a dictionary: Detection and measurement of black keywords used by the underground economy
US10880330B2 (en) Systems and methods for detection of infected websites
Gupta et al. A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
Liao et al. Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
US7873635B2 (en) Search ranger system and double-funnel model for search spam analyses and browser protection
US9430577B2 (en) Search ranger system and double-funnel model for search spam analyses and browser protection
Yang et al. Casino royale: a deep exploration of illegal online gambling
US8667117B2 (en) Search ranger system and double-funnel model for search spam analyses and browser protection
Du et al. The {Ever-Changing} labyrinth: A {Large-Scale} analysis of wildcard {DNS} powered blackhat {SEO}
Liao et al. Characterizing long-tail SEO spam on cloud web hosting services
Wardman et al. High-performance content-based phishing attack detection
Marchal et al. PhishScore: Hacking phishers' minds
Koide et al. Chatphishdetector: Detecting phishing sites using large language models
Wang et al. Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
Sadeghpour et al. Click fraud in digital advertising: A comprehensive survey
Wu et al. Price tag: towards semi-automatically discovery tactics, techniques and procedures of e-commerce cyber threat intelligence
Badawi et al. The “game hack” scam
Muzammil et al. The poorest man in babylon: A longitudinal study of cryptocurrency investment scams
Acharya et al. The imitation game: Exploring brand impersonation attacks on social media platforms
Yang et al. Mingling of clear and muddy water: Understanding and detecting semantic confusion in blackhat seo
Badawi et al. Automatic detection and analysis of the “Game Hack” Scam
Boyapati et al. Anti-phishing approaches in the era of the internet of things
Han et al. Measurement of Illegal Android Gambling App Ecosystem From Joint Promotion Perspective
Wang et al. Detecting and Understanding the Promotion of Illicit Goods and Services on Twitter
Wang Mitigating phishing threats