2016
DOI: 10.1371/journal.pone.0166930
|View full text |Cite
|
Sign up to set email alerts
|

Observing Consistency in Online Communication Patterns for User Re-Identification

Abstract: Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role in online user identification, online profile development, and recommender systems. However, building a characteristic model of human dynamics on the Internet involves a complete analysis of the variations in human activity patterns, which is a complex process. This complexity is inherent in human dynamics and has not been extensively studied to reveal the structural composition of hum… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 14 publications
0
15
0
Order By: Relevance
“…Both information criteria favor the choice of a cross-sectional ARMA(1,1) model with one autoregressive and one moving-average term. 2 Notably, this model outperforms models with higher-order lag structures. This is advantageous in our case as it yields a parsimonious model specification and thus ensures interpretability.…”
Section: Model Selectionmentioning
confidence: 88%
See 2 more Smart Citations
“…Both information criteria favor the choice of a cross-sectional ARMA(1,1) model with one autoregressive and one moving-average term. 2 Notably, this model outperforms models with higher-order lag structures. This is advantageous in our case as it yields a parsimonious model specification and thus ensures interpretability.…”
Section: Model Selectionmentioning
confidence: 88%
“…Panel B reports the baseline variables that are used as part of the cohort-specific sensitivity analyses. 2 We perform a series of model checks. The model residuals are still subject to a remaining but slight serial correlation.…”
Section: Tablementioning
confidence: 99%
See 1 more Smart Citation
“…Research on user identification in areas of behavioral inference (Fan et al 2014;Yang 2010;Adeyemi et al 2014), biometric dynamics (Ernsberger et al 2017;Ikuesan and Venter 2018;Ikuesan et al 2019), and network traffic analysis (Li et al 2013a;Melnikov and Schönwälder 2010a;Adeyemi et al 2016) are methods adapted for user identification through pattern extraction. The process employed for network traffic pattern extraction includes logs and media scavenging, mining of audit trails, client-side caching, and extraction of flow records from captured network traffic.…”
Section: Introductionmentioning
confidence: 99%
“…A knowledge-based behavioral identifier system combines the uniqueness of user identifiers, user's unique pattern of usage, and other probable predefined characteristic behavior of users, to ascertain, to a degree of nearer certainty, the identity of a user. User profiling methods (Yang 2010;Adeyemi et al 2016) attempt to establish facts based on the assumed/ predefined salient features of the subject/object under observation. Similarly, such behavior-knowledge-based identifiers are applicable to network traffic profiling (Li et al 2013a;Hlavacs et al 1999).…”
Section: Introductionmentioning
confidence: 99%