Protecting research and technology from espionage
暂无分享,去创建一个
[1] George Kingsley Zipf,et al. Human behavior and the principle of least effort , 1949 .
[2] Shirley J. Ho. AN ECONOMIC ANALYSIS OF MILITARY INTELLIGENCE , 2007 .
[3] Dirk Thorleuchter,et al. Usability Based Modeling for Advanced IT-Security – An Electronic Engineering Approach , 2012 .
[4] Dirk Thorleuchter,et al. Extracting Consumers Needs for New Products - A Web Mining Approach , 2010, 2010 Third International Conference on Knowledge Discovery and Data Mining.
[5] Michael E. Gorman,et al. Types of Knowledge and Their Roles in Technology Transfer , 2002 .
[6] Jie Yang,et al. The effect of knowledge protection, knowledge ambiguity, and relational capital on alliance performance , 2007 .
[7] Chao-Fu Hong,et al. Opportunities for Crossing the Chasm between Early Adopters and the Early Majority through New Uses of Innovative Products , 2011, Rev. Socionetwork Strateg..
[8] Jianping Zeng,et al. Topics modeling based on selective Zipf distribution , 2012, Expert Syst. Appl..
[9] Pedro Garrido-Vega,et al. Manufacturing strategy-technology relationship among auto suppliers , 2011 .
[10] Horst Geschka,et al. The idea and project database of WELLA AG , 2002, Int. J. Technol. Manag..
[11] Warren R. Greiff,et al. A theory of term weighting based on exploratory data analysis , 1998, SIGIR '98.
[12] Albert H. Rubenstein,et al. Management Perceptions of Government Incentives to Technological Innovation in England, France, West Germany and Japan : Research Policy , 1988 .
[13] S. J. Ho,et al. Extracting the information: espionage with double crossing , 2008 .
[14] Maximilien Kintz,et al. Aggregating web-based ideation platforms , 2012 .
[15] Markus K. Brunnermeier. Information Leakage and Market Efficiency , 2005 .
[16] William T. Warner. International technology transfer and economic espionage , 1994 .
[17] Hui Xiong,et al. A semantic term weighting scheme for text categorization , 2011, Expert Syst. Appl..
[18] James Fleck,et al. Technology, the Technology Complex and the Paradox of Technological Determinism , 2001, Technol. Anal. Strateg. Manag..
[19] Geert Wets,et al. Customer-adapted coupon targeting using feature selection , 2004, Expert Syst. Appl..
[20] Giri Sivanesan. The human factor in espionage , 2011 .
[21] Dirk Thorleuchter,et al. Extraction of Ideas from Microsystems Technology , 2012, CSIE 2012.
[22] Iraklis Oikonomou. The European Defence Agency and EU military space policy: Whose space odyssey? , 2012 .
[23] C. Jothi Venkateswaran,et al. Fuzzy Temporal Clustering Approach for E-Commerce Websites , 2012 .
[24] Dirk Thorleuchter,et al. Technology classification with latent semantic indexing , 2013, Expert Syst. Appl..
[25] Hsu-Hao Tsai,et al. Global data mining: An empirical study of current trends, future forecasts and technology diffusions , 2012, Expert Syst. Appl..
[26] So Young Sohn,et al. Impact analysis for national R&D funding in science and technology using quantification method II , 2009 .
[27] Cornelius Herstatt,et al. Need assessment in practice: Methods, experiences and trends , 2002 .
[28] Merrill E. Whitney,et al. An Inquiry Into the Rationale for Economic Espionage , 1999 .
[29] Andrew Beng Jin Teoh,et al. An online AUC formulation for binary classification , 2012, Pattern Recognit..
[30] A. Jaffe. Technological Opportunity and Spillovers of R&D: Evidence from Firms&Apos; Patents, Profits and Market Value , 1986 .
[31] Rossitza Setchi,et al. User-oriented ontology-based clustering of stored memories , 2012, Expert Syst. Appl..
[32] Youngjoong Ko,et al. Text classification from unlabeled documents with bootstrapping and feature projection techniques , 2009, Inf. Process. Manag..
[33] Hans Radder,et al. Science, Technology and the Science-Technology Relationship , 2009 .
[34] Dirk Thorleuchter,et al. Improved multilevel security with latent semantic indexing , 2012, Expert Syst. Appl..
[35] Dirk Thorleuchter,et al. Vertrauliche Verarbeitung staatlich eingestufter Information – die Informationstechnologie im Geheimschutz , 2008, Informatik-Spektrum.
[36] A. Matsui. Information Leakage Forces Cooperation , 1989 .
[37] P. K. Marhavilas,et al. Risk analysis and assessment methodologies in the work sites: On a review, classification and comparative study of the scientific literature of the period 2000–2009 , 2011 .
[38] P. Pattynama,et al. Receiver operating characteristic (ROC) analysis: basic principles and applications in radiology. , 1998, European journal of radiology.
[39] Leeat Yariv,et al. Games with espionage , 2004, Games Econ. Behav..
[40] Dirk Thorleuchter,et al. Mining ideas from textual information , 2010, Expert Syst. Appl..
[41] Dirk Thorleuchter,et al. Using Webcrawling of Publicly Available Websites to Assess E-commerce Relationships , 2012, 2012 Annual SRII Global Conference.
[42] Jae Kyeong Kim,et al. A literature review and classification of recommender systems research , 2012, Expert Syst. Appl..
[43] João Falcão e Cunha,et al. Modeling partial customer churn: On the value of first product-category purchase sequences , 2012, Expert systems with applications.
[44] Andrew Jones. Industrial espionage in a hi-tech world , 2008 .
[45] Dirk Thorleuchter,et al. Predicting e-commerce company success by mining the text of its publicly-accessible website , 2012, Expert Syst. Appl..
[46] Horst Geschka,et al. Creativity Techniques in Product Planning and Development : A View from West Germany : R&D Management , 1983 .
[47] James Kliebenstein,et al. A Test for Complementarities Among Multiple Technologies that Avoids the Curse of Dimensionality , 2012 .
[48] Dirk Van den Poel,et al. Investigating purchasing-sequence patterns for financial services using Markov, MTD and MTDg models , 2006, Eur. J. Oper. Res..
[49] Paul D. Allison,et al. Logistic Regression Using the SAS System : Theory and Application , 1999 .
[50] Dirk Thorleuchter,et al. A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies , 2010 .
[51] Dirk Thorleuchter,et al. Predicting customer profitability during acquisition: Finding the optimal combination of data source and data mining technique , 2013, Expert Syst. Appl..
[52] J. Sobel,et al. STRATEGIC INFORMATION TRANSMISSION , 1982 .
[53] James Allan,et al. Automatic structuring and retrieval of large text files , 1994, CACM.
[54] Olga Demidova,et al. Risk assessment for improved treatment of health considerations in EIA , 2005 .
[55] Geert Wets,et al. Direct and indirect effects of retail promotions on sales and profits in the do-it-yourself market , 2003, Expert Syst. Appl..
[56] Dirk Thorleuchter,et al. Mining Innovative Ideas to Support New Product Research and Development , 2010 .
[57] E. DeLong,et al. Comparing the areas under two or more correlated receiver operating characteristic curves: a nonparametric approach. , 1988, Biometrics.
[58] Dirk Thorleuchter,et al. Semantic technology classification — A defence and security case study , 2011, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering.
[59] Chung-Hong Lee,et al. An information fusion approach to integrate image annotation and text mining methods for geographic knowledge discovery , 2012, Expert Syst. Appl..
[60] T. Landauer,et al. Indexing by Latent Semantic Analysis , 1990 .
[61] Michael W. Berry,et al. Mining consumer product data via latent semantic indexing , 1999, Intell. Data Anal..
[62] Hong Ji,et al. Quantitative risk assessment model of hazardous chemicals leakage and application , 2012 .
[63] Selçuk Çebi,et al. A fuzzy risk assessment model for hospital information system implementation , 2012, Expert Syst. Appl..
[64] Dirk Thorleuchter,et al. Granular Deleting in Multi Level Security Models – An Electronic Engineering Approach , 2012 .
[65] C. F. Douds,et al. Management perceptions of government incentives to technological innovation in england, Trance, West Germany and Japan , 1977 .
[66] Yuh-Min Chen,et al. Developing a semantic-enable information retrieval mechanism , 2010, Expert Syst. Appl..
[67] Annapoornima M. Subramanian,et al. An empirical examination of the science-technology relationship in the biotechnology industry , 2010 .
[68] Xue Li,et al. Unified collaborative filtering model based on combination of latent features , 2010, Expert Syst. Appl..
[69] Arnold Reisman. A taxonomic view of illegal transfer of technologies: A case study , 2006 .
[70] Dirk Thorleuchter,et al. Analyzing existing customers' websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing , 2012, Expert Syst. Appl..
[71] Dirk Thorleuchter,et al. Mining Social Behavior Ideas of Przewalski Horses , 2011 .
[72] Dirk Van den Poel,et al. Predicting home-appliance acquisition sequences: Markov/Markov for Discrimination and survival analysis for modeling sequential information in NPTB models , 2007, Decis. Support Syst..
[73] Dirk Thorleuchter,et al. Companies website optimising concerning consumer's searching for new products , 2011, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering.
[74] Willem A. Smit,et al. Civilian-military co-operation strategies in developing new technologies , 2003 .
[75] Gregoris Mentzas,et al. Using latent topics to enhance search and recommendation in Enterprise Social Software , 2012, Expert Syst. Appl..
[76] Paul Almeida,et al. Knowledge sourcing by foreign multinationals: Patent citation analysis in the U.S. semiconductor industry , 1996 .
[77] Dirk Thorleuchter,et al. Using NMF for Analyzing War Logs , 2012, Future Security.
[78] Dirk Thorleuchter,et al. High granular multi-level-security model for improved usability , 2011, 2011 International Conference on System science, Engineering design and Manufacturing informatization.
[79] Andrew Crane,et al. In the Company of Spies: When Competitive Intelligence Gathering Becomes Industrial Espionage , 2005 .
[80] Dirk Thorleuchter,et al. Improved Emergency Management by a Loosely Coupled Logistic System , 2012, Future Security.
[81] J. Hanley,et al. The meaning and use of the area under a receiver operating characteristic (ROC) curve. , 1982, Radiology.