Yang et al., 2017 - Google Patents
How to learn klingon without a dictionary: Detection and measurement of black keywords used by the underground economyYang et al., 2017
View PDF- Document ID
- 16949654516001586241
- Author
- Yang H
- Ma X
- Du K
- Li Z
- Duan H
- Su X
- Liu G
- Geng Z
- Wu J
- Publication year
- Publication venue
- 2017 IEEE Symposium on Security and Privacy (SP)
External Links
Snippet
Online underground economy is an important channel that connects the merchants of illegal products and their buyers, which is also constantly monitored by legal authorities. As one common way for evasion, the merchants and buyers together create a vocabulary of jargons …
- 238000001514 detection method 0 title abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
- G06F17/30657—Query processing
- G06F17/3066—Query translation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/3087—Spatially dependent indexing and retrieval, e.g. location dependent results to queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | How to learn klingon without a dictionary: Detection and measurement of black keywords used by the underground economy | |
US10880330B2 (en) | Systems and methods for detection of infected websites | |
Gupta et al. | A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment | |
Liao et al. | Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search | |
US7873635B2 (en) | Search ranger system and double-funnel model for search spam analyses and browser protection | |
US9430577B2 (en) | Search ranger system and double-funnel model for search spam analyses and browser protection | |
Yang et al. | Casino royale: a deep exploration of illegal online gambling | |
US8667117B2 (en) | Search ranger system and double-funnel model for search spam analyses and browser protection | |
Du et al. | The {Ever-Changing} labyrinth: A {Large-Scale} analysis of wildcard {DNS} powered blackhat {SEO} | |
Liao et al. | Characterizing long-tail SEO spam on cloud web hosting services | |
Wardman et al. | High-performance content-based phishing attack detection | |
Marchal et al. | PhishScore: Hacking phishers' minds | |
Koide et al. | Chatphishdetector: Detecting phishing sites using large language models | |
Wang et al. | Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. | |
Sadeghpour et al. | Click fraud in digital advertising: A comprehensive survey | |
Wu et al. | Price tag: towards semi-automatically discovery tactics, techniques and procedures of e-commerce cyber threat intelligence | |
Badawi et al. | The “game hack” scam | |
Muzammil et al. | The poorest man in babylon: A longitudinal study of cryptocurrency investment scams | |
Acharya et al. | The imitation game: Exploring brand impersonation attacks on social media platforms | |
Yang et al. | Mingling of clear and muddy water: Understanding and detecting semantic confusion in blackhat seo | |
Badawi et al. | Automatic detection and analysis of the “Game Hack” Scam | |
Boyapati et al. | Anti-phishing approaches in the era of the internet of things | |
Han et al. | Measurement of Illegal Android Gambling App Ecosystem From Joint Promotion Perspective | |
Wang et al. | Detecting and Understanding the Promotion of Illicit Goods and Services on Twitter | |
Wang | Mitigating phishing threats |