Cognitive Hacking

[1]  Adam Kilgarriff,et al.  of the European Chapter of the Association for Computational Linguistics , 2006 .

[2]  Martin C. Libicki The Mesh and The Net: Speculations on Armed Conflict in a Time of Free Silicon , 2004 .

[3]  George Cybenko,et al.  COGNITIVE HACKING : TECHNOLOGICAL AND LEGAL ISSUES , 2004 .

[4]  George Cybenko,et al.  Cognitive Hacking and the Value of Information , 2004 .

[5]  Jay F. Nunamaker,et al.  Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection , 2003, ISI.

[6]  Judee K. Burgoon,et al.  A Longitudinal Analysis of Language Behavior of Deception in E-mail , 2003, ISI.

[7]  Jay F. Nunamaker,et al.  Detecting Deception through Linguistic Analysis , 2003, ISI.

[8]  Jay F. Nunamaker,et al.  Training Professionals to Detect Deception , 2003, ISI.

[9]  Paul Thompson Semantic Hacking and Intelligence and Security Informatics (Extended Abstract) , 2003, ISI.

[10]  ChengXiang Zhai,et al.  Probabilistic Relevance Models Based on Document and Query Generation , 2003 .

[11]  Hsinchun Chen,et al.  Intelligence and security informatics : first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings , 2003 .

[12]  Ayman Farahat,et al.  AuGEAS: authoritativeness grading, estimation, and sorting , 2002, CIKM '02.

[13]  George Cybenko,et al.  Cognitive Hacking: A Battle for the Mind , 2002, Computer.

[14]  David R. Karger,et al.  Haystack: A Platform for Creating, Organizing and Visualizing Information Using RDF , 2002, Semantic Web Workshop.

[15]  Masha Sosonkina,et al.  A New Model for Probabilistic Information Retrieval on the Web , 2002 .

[16]  Pontus Johansson,et al.  User Modeling in Dialog Systems , 2002 .

[17]  John C. Munson,et al.  Watcher: the missing piece of the security puzzle , 2001, Seventeenth Annual Computer Security Applications Conference.

[18]  Robert E. Brown Next: the future just happened , 2001 .

[19]  Chrysanthos Dellarocas,et al.  Building Trust On-Line: The Design of Reliable Reputation Reporting : Mechanisms for Online Trading Communities , 2001 .

[20]  Karen M. Cornetto,et al.  Identity and illusion on the Internet : interpersonal deception and detection in interactive Internet environments , 2001 .

[21]  John Riedl,et al.  Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.

[22]  Sergei Nirenburg,et al.  Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.

[23]  H. V. Jagadish,et al.  Information warfare and security , 1998, SGMD.

[24]  Yougu Yuan,et al.  Web Spoofing 2001 , 2001 .

[25]  Clifford A. Lynch,et al.  When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web , 2001, J. Assoc. Inf. Sci. Technol..

[26]  Philip E. Agre,et al.  The market logic of information , 2000 .

[27]  Pankaj Rohatgi,et al.  Can Pseudonymity Really Guarantee Privacy? , 2000, USENIX Security Symposium.

[28]  Thomas Bozek,et al.  Research on Mitigating the Insider Threat to Information Systems - #2 , 2000 .

[29]  Jacob O. Wobbrock,et al.  Put your best face forward: anthropomorphic agents, e-commerce consumers, and the law , 2000, AGENTS '00.

[30]  Sally M. Abel Trademark Issues in Cyberspace: The Brave New Frontier , 1999 .

[31]  Jeannette M. Wing A symbiotic relationship between formal methods and security , 1998, Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358).

[32]  Alberto Trombetta,et al.  Optimal Comparison Strategies in Ulam's Searching Game with Two Errors , 1997, Theor. Comput. Sci..

[33]  Dan S. Wallach,et al.  Web Spoofing: An Internet Con Game , 1997 .

[34]  Ross Anderson,et al.  The Use of Information Retrieval Techniques for Intrusion Detection , 1997 .

[35]  J. Burgoon,et al.  Interpersonal Deception Theory , 1996 .

[36]  Douglas Biber,et al.  Dimensions of Register Variation: A Cross-Linguistic Comparison , 1995 .

[37]  Jussi Karlgren,et al.  Recognizing Text Genres With Simple Metrics Using Discriminant Analysis , 1994, COLING.

[38]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[39]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[40]  V. Rich Personal communication , 1989, Nature.

[41]  K. Mani Chandy,et al.  Parallel program design - a foundation , 1988 .

[42]  D. Biber Spoken and Written Textual Dimensions in English: Resolving the Contradictory Findings , 1986 .

[43]  Nicholas J. Belkin,et al.  Using problem structures for driving human-computer dialogues , 1997, RIAO.

[44]  Carl E. Landwehr,et al.  A security model for military message systems , 1984, TOCS.

[45]  Elaine Rich,et al.  Users are Individuals: Individualizing User Models , 1999, Int. J. Man Mach. Stud..

[46]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[47]  William S. Cooper,et al.  Foundations of Probabilistic and Utility-Theoretic Indexing , 1978, JACM.

[48]  S. Fienberg,et al.  Inference and Disputed Authorship: The Federalist , 1966 .

[49]  M. E. Maron,et al.  On Relevance, Probabilistic Indexing and Information Retrieval , 1960, JACM.