Cognitive Hacking
暂无分享,去创建一个
[1] Adam Kilgarriff,et al. of the European Chapter of the Association for Computational Linguistics , 2006 .
[2] Martin C. Libicki. The Mesh and The Net: Speculations on Armed Conflict in a Time of Free Silicon , 2004 .
[3] George Cybenko,et al. COGNITIVE HACKING : TECHNOLOGICAL AND LEGAL ISSUES , 2004 .
[4] George Cybenko,et al. Cognitive Hacking and the Value of Information , 2004 .
[5] Jay F. Nunamaker,et al. Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection , 2003, ISI.
[6] Judee K. Burgoon,et al. A Longitudinal Analysis of Language Behavior of Deception in E-mail , 2003, ISI.
[7] Jay F. Nunamaker,et al. Detecting Deception through Linguistic Analysis , 2003, ISI.
[8] Jay F. Nunamaker,et al. Training Professionals to Detect Deception , 2003, ISI.
[9] Paul Thompson. Semantic Hacking and Intelligence and Security Informatics (Extended Abstract) , 2003, ISI.
[10] ChengXiang Zhai,et al. Probabilistic Relevance Models Based on Document and Query Generation , 2003 .
[11] Hsinchun Chen,et al. Intelligence and security informatics : first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings , 2003 .
[12] Ayman Farahat,et al. AuGEAS: authoritativeness grading, estimation, and sorting , 2002, CIKM '02.
[13] George Cybenko,et al. Cognitive Hacking: A Battle for the Mind , 2002, Computer.
[14] David R. Karger,et al. Haystack: A Platform for Creating, Organizing and Visualizing Information Using RDF , 2002, Semantic Web Workshop.
[15] Masha Sosonkina,et al. A New Model for Probabilistic Information Retrieval on the Web , 2002 .
[16] Pontus Johansson,et al. User Modeling in Dialog Systems , 2002 .
[17] John C. Munson,et al. Watcher: the missing piece of the security puzzle , 2001, Seventeenth Annual Computer Security Applications Conference.
[18] Robert E. Brown. Next: the future just happened , 2001 .
[19] Chrysanthos Dellarocas,et al. Building Trust On-Line: The Design of Reliable Reputation Reporting : Mechanisms for Online Trading Communities , 2001 .
[20] Karen M. Cornetto,et al. Identity and illusion on the Internet : interpersonal deception and detection in interactive Internet environments , 2001 .
[21] John Riedl,et al. Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.
[22] Sergei Nirenburg,et al. Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.
[23] H. V. Jagadish,et al. Information warfare and security , 1998, SGMD.
[24] Yougu Yuan,et al. Web Spoofing 2001 , 2001 .
[25] Clifford A. Lynch,et al. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web , 2001, J. Assoc. Inf. Sci. Technol..
[26] Philip E. Agre,et al. The market logic of information , 2000 .
[27] Pankaj Rohatgi,et al. Can Pseudonymity Really Guarantee Privacy? , 2000, USENIX Security Symposium.
[28] Thomas Bozek,et al. Research on Mitigating the Insider Threat to Information Systems - #2 , 2000 .
[29] Jacob O. Wobbrock,et al. Put your best face forward: anthropomorphic agents, e-commerce consumers, and the law , 2000, AGENTS '00.
[30] Sally M. Abel. Trademark Issues in Cyberspace: The Brave New Frontier , 1999 .
[31] Jeannette M. Wing. A symbiotic relationship between formal methods and security , 1998, Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358).
[32] Alberto Trombetta,et al. Optimal Comparison Strategies in Ulam's Searching Game with Two Errors , 1997, Theor. Comput. Sci..
[33] Dan S. Wallach,et al. Web Spoofing: An Internet Con Game , 1997 .
[34] Ross Anderson,et al. The Use of Information Retrieval Techniques for Intrusion Detection , 1997 .
[35] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[36] Douglas Biber,et al. Dimensions of Register Variation: A Cross-Linguistic Comparison , 1995 .
[37] Jussi Karlgren,et al. Recognizing Text Genres With Simple Metrics Using Discriminant Analysis , 1994, COLING.
[38] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[39] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[40] V. Rich. Personal communication , 1989, Nature.
[41] K. Mani Chandy,et al. Parallel program design - a foundation , 1988 .
[42] D. Biber. Spoken and Written Textual Dimensions in English: Resolving the Contradictory Findings , 1986 .
[43] Nicholas J. Belkin,et al. Using problem structures for driving human-computer dialogues , 1997, RIAO.
[44] Carl E. Landwehr,et al. A security model for military message systems , 1984, TOCS.
[45] Elaine Rich,et al. Users are Individuals: Individualizing User Models , 1999, Int. J. Man Mach. Stud..
[46] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[47] William S. Cooper,et al. Foundations of Probabilistic and Utility-Theoretic Indexing , 1978, JACM.
[48] S. Fienberg,et al. Inference and Disputed Authorship: The Federalist , 1966 .
[49] M. E. Maron,et al. On Relevance, Probabilistic Indexing and Information Retrieval , 1960, JACM.