Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where James H. Jones is active.

Publication


Featured researches published by James H. Jones.


Proceedings of the International Conference on Compute and Data Analysis | 2017

Hybrid Text-based Deception Models for Native and Non-Native English Cybercriminal Networks

Alex V. Mbaziira; James H. Jones

Cybercriminals are increasingly using Internet messaging to exploit their victims. We develop and apply a text-based deception detection approach to build hybrid models for detecting cybercrime in the text Internet communications from native and non-native English speaking cybercriminal networks, where our models use both computational linguistics (CL) and psycholinguistic (PL) features. We study four types of deception-based cybercrime: fraud, scam, favorable fake reviews, and unfavorable fake reviews. We build two types of generalized hybrid models for both native and non-native English speaking cybercriminal networks: 2-dataset and 3-dataset hybrid models using Naïve Bayes, Support Vector Machines, and kth Nearest Neighbor algorithms. All 2-dataset models are trained on any two forms of cybercrime in different web genres, which are then used to detect and analyze other types of cybercrime in web genres that were not part of the training set to establish model generalizability. Similarly, the 3-dataset models are trained on any three forms of cybercrime in different web genres, that are also used to detect and analyze cybercrime in a web genre that was not part of the training set. Model performance on the test datasets ranges from 60% to 80% accuracy, with the best performance on detection of unfavorable reviews and fraud, and notable differences emerged between detection in messages from native and non-native English speaking groups. Our work may be applied as provider- or user-based filtering tools to identify cybercriminal actors and block or label undesirable messages before they reach their intended targets.


ieee annual computing and communication workshop and conference | 2017

A method and implementation for the empirical study of deleted file persistence in digital devices and media

James H. Jones; Tahir M. Khan

Digital devices are ubiquitous in modern society. Every action on a digital device, whether initiated by a user, an application, the operating system, or hardware, leaves behind evidence of the activity in the form of digital artifacts such as files, memory content, and network traffic. Such artifacts are used by digital forensics investigators to reconstruct past activity, and by criminals seeking to harvest private or sensitive information. The persistence of an artifact over time directly affects its ability to be recovered at a later date, yet a rigorous, comprehensive theory of digital artifact persistence does not exist. This research proposes and demonstrates a method to facilitate the studies necessary to develop such a theory. We implemented a differential analysis approach in which sequential digital media images are analyzed for deleted file persistence. The contents of files deleted between the first two images are tracked in the remaining images. This data forms a decay curve for each file over time and activity. Since we also have access to system and storage media properties, deleted file properties, and the details of actions taken between images, we can begin to form testable hypotheses about the factors affecting deleted file persistence. We have implemented prototype software to conduct this analysis, and we demonstrate the method on images generated in a controlled environment as well as on a series of realistic system images.


Proceedings of the International Conference on Compute and Data Analysis | 2017

A Statistical Learning Approach to Detect Abusive Twitter Accounts

Ehab A. Abozinadah; James H. Jones

The increased use of social media has motivated spammers to post their malicious activities on social network sites. Some of these spammers use adult content to further the distribution of their malicious activities. Moreover, the extensive number of users posting adult content in social media degrades the experience for other users for whom the adult content is not desired or appropriate. In this paper, we aim to detect abusive accounts that post adult content using Arabic language to target Arab speakers. There is limited natural language processing (NLP) resources for the Arabic language, and to the best of our knowledge no research has been done to detect adult accounts with Arabic language in social media. We used a statistical learning approach to analyze Twitter content to detect abusive accounts that use obscenity, profanity, slang, and swearing words in Arabic text format. Our approach achieved a predictive accuracy of 96% and overcomes imitations of the bag-of-word (BOW) approach.


11th Annual ADFSL Conference on Digital Forensics, Security and Law | 2017

Inferring previously uninstalled applications from digital traces

James H. Jones; Tahir Kahn; Kathryn Blackmond Laskey; Alexander J. Nelson; Mary T. Laamanen; Douglas White


International Journal of Data Mining & Knowledge Management Process | 2016

Improved Micro-Blog Classification for Detecting Abusive Arabic Twitter Accounts

Ehab A. Abozinadah; James H. Jones


arXiv: Social and Information Networks | 2015

Evaluating Classifiers in Detecting 419 Scams in Bilingual Cybercriminal Communities.

Alex V. Mbaziira; Ehab A. Abozinadah; James H. Jones


BMAW'14 Proceedings of the Eleventh UAI Conference on Bayesian Modeling Applications Workshop - Volume 1218 | 2014

Using Bayesian attack detection models to drive cyber deception

James H. Jones; Kathryn Blackmond Laskey


Proceedings of the 2nd International Conference on Compute and Data Analysis | 2018

A Non-Algorithmic Forensic Approach for Hiding Data in Image Files

Maha F. Sabir; James H. Jones; Hang Liu; Alex V. Mbaziira


ieee conference on open systems | 2017

Detecting code injection by cross-validating stack and VAD information in windows physical memory

Anurag Srivastava; James H. Jones


Archive | 2017

Understanding Deleted File Decay on Removable Media using Differential Analysis

James H. Jones; Anurag Srivastava; Josh Mosier; Connor Anderson; Seth Buenafe

Collaboration


Dive into the James H. Jones's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Douglas White

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alex Nelson

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar

Hang Liu

The Catholic University of America

View shared research outputs
Top Co-Authors

Avatar

Maha F. Sabir

The Catholic University of America

View shared research outputs
Researchain Logo
Decentralizing Knowledge