2017
DOI: 10.1007/s13042-017-0748-7
|View full text |Cite
|
Sign up to set email alerts
|

Polychronicity tendency-based online behavioral signature

Abstract: The proliferation of ubiquitous and pervasive computing devices has led to the emergence of research areas like Internet of things, and the Big-Data, which has seen a rise in obfuscation of online identity thus fueling an increase in online anonymity. Online anonymity constitutes a major platform for the exploitation of the potentials of cyber-crime; at the same time, it also inhibits the potential economic power that can be harnessed from the surging Internet population. Methods of online identification, such… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 27 publications
(37 reference statements)
0
2
0
Order By: Relevance
“…Different dimensions of cyberbullying acts have been identified in the literature (Langos, 2012). Cyber personality has also been defined in existing studies (Adeyemi et al, 2016;Adeyemi, Abd Razak, et al, 2017;Adeyemi, Razak and Salleh, 2017;Ikuesan et al, 2019) with contradictory cyber:physical personalities (Gardini, Cloninger and Venneri, 2009;Mohammadi and Vinciarelli, 2015;Ikuesan, Abd Razak and Salleh, 2016). The next section explores the different dimensions of cyberbullying with a view to highlighting the underlying commonalities.…”
Section: Introductionmentioning
confidence: 99%
“…Different dimensions of cyberbullying acts have been identified in the literature (Langos, 2012). Cyber personality has also been defined in existing studies (Adeyemi et al, 2016;Adeyemi, Abd Razak, et al, 2017;Adeyemi, Razak and Salleh, 2017;Ikuesan et al, 2019) with contradictory cyber:physical personalities (Gardini, Cloninger and Venneri, 2009;Mohammadi and Vinciarelli, 2015;Ikuesan, Abd Razak and Salleh, 2016). The next section explores the different dimensions of cyberbullying with a view to highlighting the underlying commonalities.…”
Section: Introductionmentioning
confidence: 99%
“…Research on user identification in areas of behavioral inference (Fan et al 2014;Yang 2010;Adeyemi et al 2014), biometric dynamics (Ernsberger et al 2017;Ikuesan and Venter 2018;Ikuesan et al 2019), and network traffic analysis (Li et al 2013a;Melnikov and Schönwälder 2010a;Adeyemi et al 2016) are methods adapted for user identification through pattern extraction. The process employed for network traffic pattern extraction includes logs and media scavenging, mining of audit trails, client-side caching, and extraction of flow records from captured network traffic.…”
Section: Introductionmentioning
confidence: 99%