Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base
暂无分享,去创建一个
Paul K. Davis | Walter L. Perry | Douglas Yeung | Parisa Roshan | Ryan Andrew Brown | Phoenix Voorhies | P. Davis | Douglas Yeung | P. Roshan | Ryan A. Brown | W. Perry | P. Voorhies
[1] Robert W Poole. THE CASE FOR RISK-BASED AVIATION SECURITY POLICY , 2009 .
[2] J Diller,et al. The psychological autopsy in equivocal deaths. , 1979, Perspectives in psychiatric care.
[3] F. Lewis. Optimal Estimation: With an Introduction to Stochastic Control Theory , 1986 .
[4] Claude E. Shannon,et al. A Mathematical Theory of Communications , 1948 .
[5] J. Cacioppo,et al. Individual differences in the autonomic origins of heart rate reactivity: the psychometrics of respiratory sinus arrhythmia and preejection period. , 1994, Psychophysiology.
[6] Mario Ferrero,et al. Martyrdom Contracts , 2006 .
[7] S. Porter,et al. The truth about lies: What works in detecting high‐stakes deception? , 2010 .
[8] Daniel A. Martell,et al. Threatening and Otherwise Inappropriate Letters to Hollywood Celebrities , 1991 .
[9] P. Ekman,et al. What the face reveals : basic and applied studies of spontaneous expression using the facial action coding system (FACS) , 2005 .
[10] J. Russell. Facial expressions of emotion: what lies beyond minimal universality? , 1995, Psychological bulletin.
[11] David B. Skillicorn,et al. Detecting unusual email communication , 2005, CASCON.
[12] J. Pennebaker,et al. The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .
[13] Max Coltheart,et al. Remediation of facial emotion perception in schizophrenia: Concomitant changes in visual attention , 2008, Schizophrenia Research.
[14] Howard Raiffa,et al. Decision analysis: introductory lectures on choices under uncertainty. 1968. , 1969, M.D.Computing.
[15] Avshalom Caspi,et al. Males on the life-course-persistent and adolescence-limited antisocial pathways: Follow-up at age 26 years , 2002, Development and Psychopathology.
[16] Ralph L. Keeney,et al. Value-Focused Thinking: A Path to Creative Decisionmaking , 1992 .
[17] Zhongfei Zhang. Mining surveillance video for independent motion detection , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[18] Elizabeth A. Olson,et al. Eyewitness identification: information gain from incriminating and exonerating behaviors. , 2002, Journal of experimental psychology. Applied.
[19] L. Hogben. Introduction to the Theory of Statistics , 1951 .
[20] Ami Pedahzur,et al. altruism and fatalism: the characteristics of palestinian suicide terrorists , 2003 .
[21] Jason Franks. The Root Causes of Terrorism: Orthodox Terrorism Theory , 2006 .
[22] Loïc Kessous,et al. Emotion Recognition through Multiple Modalities: Face, Body Gesture, Speech , 2008, Affect and Emotion in Human-Computer Interaction.
[23] W J McCorkell,et al. An overview of the scientific examinations performed after an explosion on the Shankill Road. , 1998, Science & justice : journal of the Forensic Science Society.
[24] Richard Silberglitt,et al. A Delicate Balance: Portfolio Analysis and Management for Intelligence Information Dissemination Programs , 2009 .
[25] Aldert Vrij,et al. Lying about flying: the first experiment to detect false intent , 2011 .
[26] Bruce Lincoln,et al. Holy Terrors, Second Edition: Thinking About Religion After September 11 , 2010 .
[27] Arthur P. Dempster,et al. Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[28] A. Raine,et al. Psychophysiology of anger and violent behavior. , 1997, The Psychiatric clinics of North America.
[29] Yuichi Ohta,et al. Facial micro-expressions recognition using high speed camera and 3D-gradient descriptor , 2009, ICDP.
[30] Mati Tombak,et al. On Logical Method for Counting Dedekind Numbers , 2001, FCT.
[31] Amber Jaycocks,et al. Predicting Suicide Attacks: Integrating Spatial, Temporal, and Social Features of Terrorist Attack Targets , 2013 .
[32] Yihong Yuan,et al. Analyzing and geo-visualizing individual human mobility patterns using mobile call records , 2010, 2010 18th International Conference on Geoinformatics.
[33] James J. Lindsay,et al. Cues to deception. , 2003, Psychological bulletin.
[34] J. Nunamaker,et al. Vocal Analysis Software for Security Screening: Validity and Deception Detection Potential , 2012 .
[35] Francisco Lacerda,et al. Charlatanry in forensic speech science: A problem to be taken seriously , 2007 .
[36] Brent L. Smith,et al. Pre-Incident Indicators of Terrorist Incidents: The Identification of Behavioral, Geographic, and Temporal Patterns of Preparatory Conduct , 2006 .
[37] Christopher J Patrick,et al. Psychophysiological correlates of aggression and violence: an integrative review , 2008, Philosophical Transactions of the Royal Society B: Biological Sciences.
[38] Michelle Karg,et al. Recognition of Affect Based on Gait Patterns , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[39] Matthew L. Jensen,et al. Automatic Extraction of Deceptive Behavioral Cues from Video , 2005, ISI.
[40] Angela Scarpa,et al. Being hot-tempered: Autonomic, emotional, and behavioral distinctions between childhood reactive and proactive aggression , 2010, Biological Psychology.
[41] David S. Lyle,et al. National Security Challenges: Insights from Social, Neurobiological, and Complexity Sciences , 2012 .
[42] Simon Reeve,et al. The New Jackals: Ramzi Yousef, Osama bin Laden, and the Future of Terrorism , 1998 .
[43] Terrie E. Moffitt,et al. Life‐Course‐Persistent versus Adolescence‐Limited Antisocial Behavior , 2015 .
[44] Walter L. Perry,et al. Information Sharing Among Military Headquarters: The Effects on Decisionmaking , 1995 .
[45] Andrew Moskowitz,et al. Dissociation and Violence , 2004, Trauma, violence & abuse.
[46] Christopher Paul,et al. Social Science for Counterterrorism: Putting the Pieces Together , 2009 .
[47] Didier Dubois,et al. Possibility Theory - An Approach to Computerized Processing of Uncertainty , 1988 .
[48] Judea Pearl,et al. Bayesian and belief-functions formalisms for evidential reasoning: a conceptual analysis , 1990 .
[49] John Mueller,et al. Terrorism Risks and Cost‐Benefit Analysis of Aviation Security , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[50] Paul T. Costa,et al. Personality Disorders and the Five-Factor Model of Personality , 1994 .
[51] Kenneth N. McKay,et al. Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior , 2005 .
[52] M. Sharpe,et al. Psychological autopsy studies of suicide: a systematic review , 2003, Psychological Medicine.
[53] Daniel M. T. Fessler,et al. Weapons Make the Man (Larger): Formidability Is Represented as Size and Strength in Humans , 2012, PloS one.
[54] C A Morgan,et al. Decreased respiratory sinus arrhythmia in individuals with deceptive intent. , 2010, Psychophysiology.
[55] Burton H Singer,et al. Combinations of biomarkers predictive of later life mortality , 2006, Proceedings of the National Academy of Sciences.
[56] Richard A Leo,et al. Police-Induced Confessions: Risk Factors and Recommendations , 2010, Law and human behavior.
[57] Charles A. McMellon. Book Review: The Daily you: How the New Advertising Industry is Defining your Identity and your Worth , 2013 .
[58] Daniel Gatica-Perez,et al. Discovering places of interest in everyday life from smartphone data , 2011, Multimedia Tools and Applications.
[59] David V. James,et al. The fixated and the pursuit of public figures , 2009 .
[60] Daniel Gatica-Perez,et al. Mining large-scale smartphone data for personality studies , 2013, Personal and Ubiquitous Computing.
[61] B. Depaulo,et al. Accuracy of Deception Judgments , 2006, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[62] Vincent V. Vigluicci. Calculating Credibility: State v. Sharma and the Future of Polygraph Admissibility in Ohio and Beyond , 2009 .
[63] Anthony P. Atkinson,et al. The Perception of Bodily Expressions of Emotion and the Implications for Computing , 2008 .
[64] J. Pennebaker,et al. Trauma in Real Time: Talking and Avoiding Online Conversations About the Death of Princess Diana , 2002 .
[65] Lou Michel,et al. American Terrorist: Timothy McVeigh & the Oklahoma City Bombing , 2001 .
[66] Thomas L. Martin,et al. Predicting future locations using prediction-by-partial-match , 2008, MELT '08.
[67] Michelle Karg,et al. A Two-fold PCA-Approach for Inter-Individual Recognition of Emotions in Natural Walking , 2009, MLDM Posters.
[68] S. Knardahl. Cardiovascular psychophysiology , 2000, Annals of medicine.
[69] J R Meloy,et al. Stalkers and harassers of royalty: the role of mental illness and motivation , 2009, Psychological Medicine.
[70] Richard L Kugler,et al. Policy Analysis in National Security Affairs: New Methods for a New Era , 2006 .
[71] F. Ascione,et al. Animal Abuse and Youth Violence , 2001 .
[72] M. Hafez. Martyrdom Mythology in Iraq: How Jihadists Frame Suicide Terrorism in Videos and Biographies , 2007 .
[73] Andrew M Freeman,et al. Dismount Threat Recognition through Automatic Pose Identification , 2012 .
[74] J. Pennebaker,et al. Linguistic Markers of Psychological Change Surrounding September 11, 2001 , 2004, Psychological science.
[75] Don Grubin,et al. The polygraph and forensic psychiatry. , 2010, The journal of the American Academy of Psychiatry and the Law.
[76] K. Fiedler. The dependence of the conjunction fallacy on subtle linguistic factors , 1988 .
[77] Cliff Lampe,et al. Changes in use and perception of facebook , 2008, CSCW.
[78] J Peter Rosenfeld,et al. A mock terrorism application of the P300-based concealed information test. , 2011, Psychophysiology.
[79] Paul K. Davis,et al. Portfolio-Analysis Methods for Assessing Capability Options , 2008 .
[80] Ronald P. S. Mahler,et al. The modified Dempster-Shafer approach to classification , 1997, IEEE Trans. Syst. Man Cybern. Part A.
[81] Martha E. Francis,et al. Journal of Personality and Social Psychology Linguistic Predictors of Adaptive Bereavement , 2022 .
[82] Charles R. Honts,et al. Information Gain of Psychophysiological Detection of Deception in Forensic and Screening Settings , 2009, Applied psychophysiology and biofeedback.
[83] S. Runeson,et al. Kinematic specification of dynamics as an informational basis for person and action perception: Expe , 1983 .
[84] David R. Frelinger,et al. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions , 2012 .
[85] Adam Meirowitz,et al. Design, Inference, and the Strategic Logic of Suicide Terrorism , 2008, American Political Science Review.
[86] Paul K. Davis,et al. Analytic Architecture for Capabilities-Based Planning, Mission-System Analysis, and Transformation , 2002 .
[87] Oliver G. B. Garrod,et al. Facial expressions of emotion are not culturally universal , 2012, Proceedings of the National Academy of Sciences.
[88] J. Nunamaker,et al. Automatic, Multimodal Evaluation of Human Interaction , 2010 .
[89] Takeo Kanade,et al. Comprehensive database for facial expression analysis , 2000, Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580).
[90] R. Dawes. Judgment under uncertainty: The robust beauty of improper linear models in decision making , 1979 .
[91] Thomas R. Kirchner,et al. Alcohol and Group Formation , 2012, Psychological science.
[92] Paul K. Davis,et al. Rand's Portfolio Analysis Tool (Pat): Theory, Methods, and Reference Manual , 2009 .
[93] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[94] Ariel Merari,et al. Driven to Death: Psychological and Social Aspects of Suicide Terrorism , 2010 .
[95] J. Llinas,et al. Studies and Analyses of Aided Adversarial Decision Making. Phase 2: Research on Human Trust in Automation , 1998 .
[96] Florentin Smarandache,et al. Advances and Applications of DSmT for Information Fusion , 2004 .
[97] Diego Gambetta,et al. Why are there so many Engineers among Islamic Radicals? , 2009, European Journal of Sociology.
[98] Brooks Brown,et al. No Easy Answers: The Truth Behind Death at Columbine , 2002 .
[99] Don Grubin,et al. Lie detection and the polygraph: A historical review , 2005 .
[100] William H Press,et al. Strong profiling is not mathematically optimal for discovering rare malfeasors , 2009, Proceedings of the National Academy of Sciences.
[101] P. Lang,et al. Relationship between facial expressiveness and sympathetic activation in emotion: a critical review, with emphasis on modeling underlying mechanisms and individual differences. , 1992, Journal of personality and social psychology.
[102] James W. Pennebaker,et al. THE ARCHIVAL ANATOMY OF A DISASTER: MEDIA COVERAGE AND COMMUNITY-WIDE HEALTH EFFECTS OF THE TEXAS A&M BONFIRE TRAGEDY , 2003 .
[103] Alexander Kalloniatis,et al. Formalization and Agility in Military Headquarters Planning , 2010 .
[104] Guo-Hui Li,et al. A Probabilistic Model for Surveillance Video Mining , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[105] Kari Sentz,et al. Combination of Evidence in Dempster-Shafer Theory , 2002 .
[106] C. Honts,et al. Mental and physical countermeasures reduce the accuracy of polygraph tests. , 1994, The Journal of applied psychology.
[107] Lifeng Sun,et al. A Matrix-Based Approach to Unsupervised Human Action Categorization , 2012, IEEE Transactions on Multimedia.
[108] D. Matsumoto. Cultural similarities and differences in display rules , 1990 .
[109] John Gordon,et al. Measures of Effectiveness for the Information-Age Army , 2001 .
[110] M. Phillips,et al. A pilot study to investigate the effectiveness of emotion recognition remediation in schizophrenia using the micro-expression training tool. , 2006, The British journal of clinical psychology.
[111] C.J. Cohen,et al. A Surveillance System for the Recognition of Intent within Individuals and Crowds , 2008, 2008 IEEE Conference on Technologies for Homeland Security.
[112] Jan Larsen,et al. Estimating human predictability from mobile sensor data , 2010, 2010 IEEE International Workshop on Machine Learning for Signal Processing.
[113] J. Pennebaker,et al. Language use of depressed and depression-vulnerable college students , 2004 .
[114] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[115] B. R. Gaines,et al. POSSIBLE AUTOMATA , 2012 .
[116] A. Raine. Autonomic nervous system activity and violence. , 1996 .
[117] J. Cacioppo,et al. The psychophysiology of emotion. , 1993 .
[118] C. Barr Taylor,et al. Evaluation of computerized text analysis in an Internet breast cancer support group , 2005, Comput. Hum. Behav..
[119] S. Porges. Orienting in a defensive world: mammalian modifications of our evolutionary heritage. A Polyvagal Theory. , 1995, Psychophysiology.
[120] M. Felson,et al. Routine activity and rational choice , 2004 .
[121] Paul K. Davis,et al. Finding Candidate Options for Investment , 2008 .
[122] Loïc Kessous,et al. Multimodal emotion recognition from expressive faces, body gestures and speech , 2007, AIAI.
[123] Matthew L. Jensen,et al. Deception detection through automatic, unobtrusive analysis of nonverbal behavior , 2005, IEEE Intelligent Systems.
[124] Christopher Paul,et al. Enlisting Madison Avenue: The Marketing Approach to Earning Popular Support in Theaters of Operation , 2007 .
[125] Claire L. Roether,et al. Critical features for the perception of emotion from gait. , 2009, Journal of vision.
[126] Jerrold M. Post,et al. When Hatred is Bred in the Bone: Psycho-cultural Foundations of Contemporary Terrorism. , 2005 .
[127] Richard de Neufville,et al. APPLIED SYSTEMS ANALYSIS: ENGINEERING PLANNING AND TECHNOLOGY MANAGEMENT , 1990 .
[128] John J. Grieco,et al. Evaluation of Voice Stress Analysis Technology , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[129] Didier Dubois,et al. Possibility theory and statistical reasoning , 2006, Comput. Stat. Data Anal..
[130] Dean A. Wilkening,et al. A simple model for calculating ballistic missile defense effectiveness , 2000 .
[131] M. Bradley,et al. Emotion in the criminal psychopath: startle reflex modulation. , 1993, Journal of abnormal psychology.
[132] Jay F. Nunamaker,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..
[133] Anne Speckhard,et al. Taking on the Persona of a Suicide Bomber: a Thought Experiment , 2012 .
[134] Nadia Bianchi-Berthouze,et al. Automatic Recognition of Affective Body Movement in a Video Game Scenario , 2011, INTETAIN.
[135] K. Scherer,et al. Emotion expression in body action and posture. , 2012, Emotion.
[136] S. Swinnen,et al. Action and Emotion Recognition from Point Light Displays: An Investigation of Gender Differences , 2011, PloS one.
[137] Marcus J. Huber,et al. Behavior recognition architecture for surveillance applications , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.
[138] Frank E. Pollick,et al. He throws like a girl (but only when he’s sad): Emotion affects sex-decoding of biological motion displays , 2011, Cognition.
[139] Anne Speckhard,et al. The Emergence of Female Suicide Terrorists , 2008 .
[140] R. Clarke,et al. The Reasoning Criminal , 2014 .
[141] Sharon M. Walter,et al. Investigation and Evaluation of Voice Stress Analysis Technology , 2001 .
[142] C. Dominik Güss,et al. A Cultural‐Psychological Theory of Contemporary Islamic Martyrdom , 2007 .
[143] Richard Silberglitt,et al. Toward Affordable Systems III: Portfolio Management for Army Engineering and Manufacturing Development Programs , 2012 .
[144] Maureen O’Sullivan,et al. Home runs and humbugs: Comment on Bond and DePaulo (2008). , 2008, Psychological bulletin.
[145] Lawrence A. Kuznar,et al. Protecting the Homeland form International and Domestic Terrorism Threats Current Multi-Disciplinary Perspectives on Root Causes, the Role of Ideaology, and Programs for Counter-Radicalization and Disengagement , 2010 .
[146] Kelly R. Damphousse. Voice Stress Analysis: Only 15 Percent of Lies About Drug Use Detected in Field Test [NIJ Journal] , 2008 .
[147] Joseph Pugliese. Biotypologies of Terrorism , 2011 .
[148] Hsinchun Chen,et al. Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security , 2008 .
[149] R. Cañal-Bruland,et al. Response bias in judging deceptive movements. , 2009, Acta psychologica.
[150] H. Hollien,et al. Stress and Deception in Speech: Evaluating Layered Voice Analysis * , 2009, Journal of forensic sciences.
[151] L. Kuznar,et al. From the Mind to the Feet: Assessing the Perception-to Intent-to-Action Dynamic , 2011 .
[152] Marc'Aurelio Ranzato,et al. Building high-level features using large scale unsupervised learning , 2011, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[153] Marilyn A. Walker,et al. Using Linguistic Cues for the Automatic Recognition of Personality in Conversation and Text , 2007, J. Artif. Intell. Res..
[154] L. Zadeh. Fuzzy sets as a basis for a theory of possibility , 1999 .
[155] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[156] Elinor Levy,et al. Bounded Choice: True Believers and Charismatic Cults , 2006 .
[157] J. Pennebaker,et al. Word Use in the Poetry of Suicidal and Nonsuicidal Poets , 2001, Psychosomatic medicine.
[158] Martha Crenshaw,et al. “Explaining Suicide Terrorism: A Review Essay” , 2007 .
[159] Barry M. Horowitz,et al. Implementation of a Methodology for the Prioritizing of Suicide Attacker Recruitment Preferences , 2007 .
[160] F. Guess. Bayesian Statistics: Principles, Models, and Applications , 1990 .
[161] Katayoun Farrahi,et al. Extracting Mobile Behavioral Patterns with the Distant N-Gram Topic Model , 2012, 2012 16th International Symposium on Wearable Computers.
[162] Sheldon Howard Jacobson. Watching through the “I”s of aviation security , 2012 .
[163] T. Elbert,et al. Dissociation Following Traumatic Stress Etiology and Treatment , 2010 .
[164] Dipak K. Gupta,et al. Understanding Terrorism and Political Violence: The Life Cycle of Birth, Growth, Transformation, and Demise , 2008 .
[165] J. Reid Meloy,et al. Approaching and Attacking Public Figures: A Contemporary Analysis of Communications and Behavior , 2014 .
[166] S. Elson,et al. Using Social Media to Gauge Iranian Public Opinion and Mood After the 2009 Election , 2012 .
[167] Brian A. Jackson,et al. Assessing the security benefits of a trusted traveler program in the presence of attempted attacker exploitation and compromise , 2012 .
[168] M. Weigelt,et al. Trust my face: cognitive factors of head fakes in sports. , 2011, Journal of experimental psychology. Applied.
[169] S. Weinberger. Airport security: Intent to deceive? , 2010, Nature.
[170] Bartholomew Elias. Airport Passenger Screening: Background and Issues for Congress , 2009 .
[171] M. Shiffrar,et al. Detecting deception in a bluffing body: The role of expertise , 2009, Psychonomic bulletin & review.
[172] Maureen O’Sullivan,et al. Unicorns or Tiger Woods: Are Lie Detection Experts Myths or Rarities? A Response to On Lie Detection “Wizards” by Bond and Uysal , 2007, Law and human behavior.
[173] Pascal Vasseur,et al. Introduction to Multisensor Data Fusion , 2005, The Industrial Information Technology Handbook.
[174] Mohan Venkatachalam,et al. The Power of Voice: Managerial Affective States and Future Firm Performance , 2011 .
[175] R. Pape,et al. The Strategic Logic of Suicide Terrorism , 2003, American Political Science Review.
[176] Brian A. Jackson,et al. Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies , 2006 .
[177] Shaogang Gong,et al. A Markov Clustering Topic Model for mining behaviour in video , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[178] H. Paterson,et al. Vocal Pitch Production during Lying: Beliefs about Deception Matter , 2013 .
[179] Mia Bloom,et al. Dying to Kill: The Allure of Suicide Terror , 2005 .
[180] Teddy Ko,et al. A survey on behavior analysis in video surveillance for homeland security applications , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.
[181] Hervé Abdi,et al. Processing Faces and Facial Expressions , 2003, Neuropsychology Review.
[182] Cristian Morosan,et al. Understanding the Antecedents of Perceived Value of Registered Traveler Biometric Systems , 2012 .
[183] A. Krueger,et al. Journal of Economic Perspectives—Volume 17, Number 4—Fall 2003—Pages 119–144 Education, Poverty and Terrorism: Is There a Causal Connection? , 2001 .
[184] P. Ekman. Universal facial expressions of emotion. , 1970 .
[185] Aldert Vrij,et al. A Comparison between Lying about Intentions and Past Activities: Verbal Cues and Detection Accuracy , 2011 .
[186] Daniel McDuff,et al. Crowdsourced data collection of facial responses , 2011, ICMI '11.
[187] Brian A. Jackson,et al. Aptitude for Destruction, Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism , 2005 .
[188] Michael J. Meaney,et al. Early environment and the development of individual differences in the hypothalamic-pituitary-adrenal stress response. , 1996 .
[189] Diego De Leo,et al. Critical issues in psychological autopsy studies. , 2006, Suicide & life-threatening behavior.
[190] M. Hamburg. Statistical analysis for decision making , 1977 .
[191] R. M. Tobin,et al. Measuring emotional expression with the Linguistic Inquiry and Word Count. , 2007, The American journal of psychology.
[192] Ralph L. Keeney,et al. Decisions with multiple objectives: preferences and value tradeoffs , 1976 .
[193] Aldert Vrij,et al. Nonverbal communication and deception , 2006 .
[194] J. Pennebaker,et al. PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES Words of Wisdom: Language Use Over the Life Span , 2003 .
[195] Jennifer L. Skeem,et al. Psychopathic Personality , 2011, Psychological science in the public interest : a journal of the American Psychological Society.
[196] M. Shiffrar,et al. The visual analysis of emotional actions , 2006, Social neuroscience.
[197] C. F. Bond,et al. On Lie Detection “Wizards” , 2007, Law and human behavior.
[198] Aldert Vrij,et al. Eliciting cues to deception and truth: What matters are the questions asked , 2012 .
[199] Brian Michael Jenkins,et al. Security Awareness for Public Bus Transportation: Case Studies of Attacks Against the Israeli Public Bus System , 2012 .
[200] Thomas L. Saaty,et al. Decision making for leaders , 1985, IEEE Transactions on Systems, Man, and Cybernetics.
[201] Jennifer E. Lake,et al. Border and Transportation Security: Possible New Directions and Policy Options , 2005 .
[202] Harry E. Stephanou,et al. A quantitative treatment of multilevel specificity and uncertainty in variable precision reasoning , 1993, IEEE Trans. Syst. Man Cybern..
[203] Alex Pentland,et al. Pervasive Sensing to Model Political Opinions in Face-to-Face Networks , 2011, Pervasive.