Using authorship analysis techniques in forensic analysis of electronic mails
暂无分享,去创建一个
[1] Donn B. Parker. Computer Crime: Criminal Justice Resource Manual (Second Edition). , 1989 .
[2] F. Mosteller,et al. Inference and Disputed Authorship: The Federalist , 1966 .
[3] Fang Wang,et al. Sequential Pattern Mining for Chinese E-mail Authorship Identification , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.
[4] Hsinchun Chen,et al. Applying authorship analysis to extremist-group Web forum messages , 2005, IEEE Intelligent Systems.
[5] Ethem Gelir,et al. Yapay Sinir Ağları , 1994 .
[6] Olivier de Vel,et al. Mining E-mail Authorship , 2000 .
[7] Vinton G. Cerf,et al. The past and future history of the Internet , 1997, CACM.
[8] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[9] Moshe Koppel,et al. Exploiting Stylistic Idiosyncrasies for Authorship Attribution , 2003 .
[10] Dan Hu. Exploratory Study on Computer Forensics Technology , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[11] Rong Zheng,et al. A framework for authorship identification of online messages: Writing-style features and classification techniques , 2006, J. Assoc. Inf. Sci. Technol..
[12] George M. Mohay,et al. Multi-Topic E-mail Authorship Attribution Forensics , 2001 .
[13] Benjamin C. M. Fung,et al. A novel approach of mining write-prints for authorship attribution in e-mail forensics , 2008, Digit. Investig..
[14] Shlomo Argamon,et al. Computational methods in authorship attribution , 2009, J. Assoc. Inf. Sci. Technol..
[15] H. T. Eddy. The characteristic curves of composition. , 1887, Science.
[16] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[17] George M. Mohay,et al. Identifying the authors of suspect email , 2001 .
[18] Vinton G. Cerf,et al. A brief history of the internet , 1999, CCRV.
[19] R. H. Baayen,et al. An experiment in authorship attribution , 2002 .