Using clustering to discover the preferences of computer criminals | IEEE Journals & Magazine | IEEE Xplore