Deception Detection on the Internet
暂无分享,去创建一个
Rajarathnam Chandramouli | K. P. Subbalakshmi | Xiaoling Chen | Ziqian Dong | Rohan D. W. Perera | K.P. Subbalakshmi | R. Chandramouli | Xiaoling Chen | R. D. Perera | Ziqian Dong
[1] Robert E. Kraut,et al. Verbal and nonverbal cues in the perception of lying. , 1978 .
[2] P. Ekman,et al. Who can catch a liar? , 1991, The American psychologist.
[3] Judee K. Burgoon,et al. Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics , 1994 .
[4] James W. Pennebaker,et al. Emotion, Disclosure, and Health , 1995 .
[5] James W. Pennebaker,et al. Emotion, disclosure, & health. , 1995 .
[6] Hamish Cunningham,et al. GATE-a General Architecture for Text Engineering , 1996, COLING.
[7] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[8] James J. Gross,et al. Composure at Any Cost? The Cognitive Consequences of Emotion Suppression , 1999 .
[9] R. Bull,et al. Detecting Deceit via Analysis of Verbal and Nonverbal Behavior , 2000 .
[10] J. Gross,et al. PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES Emotion Regulation and Memory: The Cognitive Costs of Keeping One's Cool , 2004 .
[11] C. Lee Giles,et al. Accessibility of information on the Web , 2000, INTL.
[12] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[13] George M. Mohay,et al. Identifying the authors of suspect email , 2001 .
[14] Lakshminarayanan Subramanian,et al. An investigation of geographic mapping techniques for internet hosts , 2001, SIGCOMM 2001.
[15] Shlomo Argamon,et al. Style mining of electronic messages for multiple authorship discrimination: first results , 2003, KDD '03.
[16] Jay F. Nunamaker,et al. Detecting Deception through Linguistic Analysis , 2003, ISI.
[17] J. Pennebaker,et al. Lying Words: Predicting Deception from Linguistic Styles , 2003, Personality & social psychology bulletin.
[18] Judee K. Burgoon,et al. A Longitudinal Analysis of Language Behavior of Deception in E-mail , 2003, ISI.
[19] Therani Madhusudan,et al. On a text-processing approach to facilitating autonomous deception detection , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[20] Jay F. Nunamaker,et al. An exploratory study into deception detection in text-based computer-mediated communication , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[21] Moshe Koppel,et al. Authorship verification as a one-class classification problem , 2004, ICML.
[22] Jay F. Nunamaker,et al. Language dominance in interpersonal deception in computer-mediated communication , 2004, Comput. Hum. Behav..
[23] Jay F. Nunamaker,et al. An exploratory study on promising cues in deception detection and application of decision tree , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[24] John R. Carlson,et al. Deception in Computer-Mediated Communication , 2004 .
[25] J. Nunamaker,et al. Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .
[26] Dongsong Zhang,et al. Can online behavior unveil deceivers? - an exploratory investigation of deception in instant messaging , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[27] Jay F. Nunamaker,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..
[28] Jeffrey T. Hancock,et al. Lies in Conversation: An Examination of Deception Using Automated Linguistic Analysis , 2004 .
[29] Lina Zhou,et al. Modeling and Handling Uncertainty in Deception Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[30] William H. Mangione-Smith,et al. Fast reconfiguring deep packet filter for 1+ gigabit network , 2005, 13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM'05).
[31] Jeffrey T. Hancock,et al. Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[32] L. Zhou. An empirical investigation of deception behavior in instant messaging , 2005, IEEE Transactions on Professional Communication.
[33] Jay F. Nunamaker,et al. Modality Effects in Deception Detection and Applications in Automatic-Deception-Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[34] Hsinchun Chen,et al. A framework for authorship identification of online messages: Writing-style features and classification techniques , 2006 .
[35] David Wetherall,et al. Towards IP geolocation using delay and topology measurements , 2006, IMC '06.
[36] Patrick Brennan,et al. A Prototype for Authorship Attribution Studies , 2006, Lit. Linguistic Comput..
[37] Serge Fdida,et al. Constraint-Based Geolocation of Internet Hosts , 2004, IEEE/ACM Transactions on Networking.
[38] Elad Yom-Tov,et al. Serial Sharers: Detecting Split Identities of Web Authors , 2007, PAN.
[39] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[40] Robert Goodman,et al. The Use of Stylometry for Email Author Identification: A Feasibility Study , 2007 .
[41] Sos S. Agaian,et al. On steganalysis and clean image estimation , 2008 .
[42] Dongsong Zhang,et al. A Statistical Language Modeling Approach to Online Deception Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.
[43] T. Holt,et al. Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications , 2010 .
[44] A. Daskalaki. Digital Forensics for the Health Sciences: Applications in Practice and Research , 2011 .
[45] Michael Bachmann,et al. Deciphering the Hacker Underground: First Quantitative Insights , 2011 .
[46] Lynn Margaret Batten,et al. Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations , 2012, Int. J. Digit. Crime Forensics.