1 |
H. Kox, B. Straathof, and G. Zwart, "Targeted advertising, platform competition, and privacy," Journal of Economics & Management Strategy, vol. 26, no. 3, pp. 557-570, 2017.
DOI
|
2 |
J. R. C. Nurse and O. Buckley, "Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem," Human-centric Computing and Information Sciences, vol. 7, article no. 40, 2017. https://doi.org/10.1186/s13673-017-0121-6
DOI
|
3 |
J. Hirschberg and C. D. Manning, "Advances in natural language processing," Science, vol. 349, no. 6245, pp. 261-266, 2015.
DOI
|
4 |
E. B. Karbab and M. Debbabi, "MalDy: portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports," Digital Investigation, vol. 28, pp. S77-S87, 2019. https://doi.org/10.1016/j.diin.2019.01.017
DOI
|
5 |
S. Dhelim, N. Aung, and H. Ning, "Mining user interest based on personality-aware hybrid filtering in social networks," Knowledge-Based Systems, vol. 206, article no. 106227, 2020. https://doi.org/10.1016/j.knosys.2020.106227
DOI
|
6 |
J. Kang and H. Lee, "Modeling user interest in social media using news media and Wikipedia," Information Systems, vol. 65, pp. 52-64, 2017.
DOI
|
7 |
X. Luo, J. Wang, Q. Shen, J. Wang, and Q. Qi, "User behavior analysis based on user interest by web log mining," in Proceedings of 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia, 2017, pp. 1-5.
|
8 |
N. N. Diep, N. Van Tien, N. H. Anh, and T. M. Phuong, "An unsupervised method for web user interest analysis," in Proceedings of 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam, 2019, pp. 27-32.
|
9 |
P. Siriaraya, Y. Yamaguchi, M. Morishita, Y. Inagaki, R. Nakamoto, J. Zhang, J. Aoi, and S. Nakajima, "Using categorized web browsing history to estimate the user's latent interests for web advertisement recommendation," in Proceedings of 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, 2017, pp. 4429-4434.
|
10 |
D. H. Lee, Y. R. Kim, H. J. Kim, S. M. Park, and Y. J. Yang, "Fake news detection using deep learning," Journal of Information Processing Systems, vol. 15, no. 5, pp. 1119-1130, 2019.
DOI
|
11 |
J. Salminen, M. Hopf, S. A. Chowdhury, S. G. Jung, H. Almerekhi, and B. J. Jansen, "Developing an online hate classifier for multiple social media platforms," Human-centric Computing and Information Sciences, vol. 10, article no. 1, 2020. https://doi.org/10.1186/s13673-019-0205-6
DOI
|
12 |
E. Akbal, F. Gunes, and A. Akbal, "Digital forensic analyses of web browser records," Journal of Software, vol. 11, no. 7, pp. 631-637, 2016.
DOI
|
13 |
C. Flowers, A. Mansour, and H. M. Al-Khateeb, "Web browser artefacts in private and portable modes: a forensic investigation," International Journal of Electronic Security and Digital Forensics, vol. 8, no. 2, pp. 99-117, 2016.
DOI
|
14 |
D. Erhan, C. Szegedy, A. Toshev, and D. Anguelov, "Scalable object detection using deep neural networks," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, 2014, pp. 2155-2162.
|
15 |
Facebook Research, "fastText," 2017 [Online]. Available: https://github.com/facebookresearch/fastText/
|
16 |
Keras team, "Keras," 2021 [Online]. Available: https://github.com/keras-team/keras
|
17 |
A. Krizhevsky, I. Sutskever, and G. E. Hinton, "ImageNet classification with deep convolutional neural networks," Advances in Neural Information Processing Systems, vol. 25, pp. 1097-1105, 2012.
|
18 |
M. Conti, V. Cozza, M. Petrocchi, and A. Spognardi, "TRAP: using targeted ads to unveil google personal profiles," in Proceedings of 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, 2015, pp. 1-6.
|
19 |
Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, M. Gao, H. Hou, and C. Wang, "Machine learning and deep learning methods for cybersecurity," IEEE Access, vol. 6, pp. 35365-35381, 2018.
DOI
|
20 |
A. Nieto and R. Rios, "Cybersecurity profiles based on human-centric IoT devices," Human-centric Computing and Information Sciences, vol. 9, article no. 39, 2019. https://doi.org/10.1186/s13673-019-0200-y
DOI
|
21 |
A. Dehghantanha and K. Franke, "Privacy-respecting digital investigation," in Proceedings of 2014 12th Annual International Conference on Privacy, Security and Trust, Toronto, Canada, 2014, pp. 129-138.
|
22 |
K. Chowdhary, "Natural language processing," in Fundamentals of Artificial Intelligence. New Delhi, India: Springer, 2020, pp. 603-649.
|
23 |
S. Q. Liu and A. S. Mattila, "Airbnb: online targeted advertising, sense of power, and consumer decisions," International Journal of Hospitality Management, vol. 60, pp. 33-41, 2017.
DOI
|
24 |
L. Caviglione, S. Wendzel, and W. Mazurczyk, "The future of digital forensics: challenges and the road ahead," IEEE Security & Privacy, vol. 15, no. 6, pp. 12-17, 2017.
DOI
|
25 |
G. Palmer, "A road map for digital forensic research: report from the first digital forensic research workshop (DFRWS)," 2001 [Online]. Available: https://dfrws.org/wp-content/uploads/2019/06/2001_USA_a_road_map_for_digital_forensic_research.pdf
|
26 |
J. Hou, Y. Li, J. Yu, and W. Shi, "A survey on digital forensics in Internet of Things," IEEE Internet of Things Journal, vol. 7, no. 1, pp. 1-15, 2019.
DOI
|
27 |
H. Arshad, A. B. Jantan, and O. I. Abiodun, "Digital forensics: review of issues in scientific validation of digital evidence," Journal of Information Processing Systems, vol. 14, no. 2, pp. 346-376, 2018.
DOI
|
28 |
J. I. James and P. Gladyshev, "A survey of mutual legal assistance involving digital evidence," Digital Investigation, vol. 18, pp. 23-32, 2016.
DOI
|
29 |
N. M. Karie and H. S. Venter, "Taxonomy of challenges for digital forensics," Journal of Forensic Sciences, vol. 60, no. 4, pp. 885-893, 2015.
DOI
|
30 |
Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, no. 7553, pp. 436-444, 2015.
DOI
|
31 |
D. Jeong and S. Lee, "High-speed searching target data traces based on statistical sampling for digital forensics," IEEE Access, vol. 7, pp. 172264-172276, 2019.
DOI
|