Publication | Closed Access
Modeling and analysis of identity threat behaviors through text mining of identity theft stories
65
Citations
25
References
2016
Year
CybercrimeAbuse DetectionSocial MediaEngineeringThreat DetectionIdentity Threat BehaviorsIdentity Theft StoriesInformation ForensicsSocial Engineering (Security)CommunicationArtsContent AnalysisPhishingText Mining
| Year | Citations | |
|---|---|---|
Page 1
Page 1