-
1
-
-
24944475656
-
Semantic analysis for monitoring insider threats
-
S. Symonenko, E. D. Liddy, O. Yilmazel, R. DelZoppo, E. Brown, and M. Downey, "Semantic Analysis for Monitoring Insider Threats," ISI2004.
-
ISI2004
-
-
Symonenko, S.1
Liddy, E.D.2
Yilmazel, O.3
DelZoppo, R.4
Brown, E.5
Downey, M.6
-
3
-
-
24944511577
-
A multi-disciplinary approach for countering insider threats
-
R. DelZoppo, E. Brown, M. Downey, E. D. Liddy, S. Symonenko, J. S. Park, S. M. Ho, M. D'Eredita, and A. Natarajan, "A Multi-Disciplinary Approach for Countering Insider Threats," SKM Workshop, 2004.
-
(2004)
SKM Workshop
-
-
DelZoppo, R.1
Brown, E.2
Downey, M.3
Liddy, E.D.4
Symonenko, S.5
Park, J.S.6
Ho, S.M.7
D'Eredita, M.8
Natarajan, A.9
-
7
-
-
3142674223
-
Detecting deception through linguistic analysis
-
J. Burgoon, J. Blair, T. Qin, and J. Nunamaker, Jr., "Detecting Deception Through Linguistic Analysis," ISI 2003.
-
ISI 2003
-
-
Burgoon, J.1
Blair, J.2
Qin, T.3
Nunamaker Jr., J.4
-
8
-
-
3142669749
-
A longitudinal analysis of language behavior of deception in e-mail
-
L. Zhou, J. K. Burgoon, and D. P. Twitchell, "A Longitudinal Analysis of Language Behavior of Deception in E-mail," ISI 2003.
-
ISI 2003
-
-
Zhou, L.1
Burgoon, J.K.2
Twitchell, D.P.3
-
10
-
-
24944477411
-
One class support vector machines for detecting anomalous windows registry accesses
-
[K. A. Heller, K. M. Svore, A. Keromytis, D., and S. J. Stolfo, "One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses" DMSEC'03.
-
DMSEC'03
-
-
Heller, K.A.1
Svore, K.M.2
Keromytis, A.D.3
Stolfo, S.J.4
-
11
-
-
85087225051
-
Text classification from positive and unlabeled documents
-
H. Yu, C. Zhai, and J. Han, "Text Classification from Positive and Unlabeled Documents," CIKM'03.
-
CIKM'03
-
-
Yu, H.1
Zhai, C.2
Han, J.3
-
14
-
-
0038091288
-
-
B. Scholkopf, J. C. Platt, J. Shawe-Taylor, A. J. Smola, and R. C. Williamson, "Estimating the Support of a High-Dimensional Distribution," 1999.
-
(1999)
Estimating the Support of A High-dimensional Distribution
-
-
Scholkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
15
-
-
78149306870
-
Building text classifiers using positive and unlabeled examples
-
B. Liu, Y. Dai, X. Li, W. S. Lee, and P. S. Yu, "Building Text Classifiers Using Positive and Unlabeled Examples," ICDM'03.
-
ICDM'03
-
-
Liu, B.1
Dai, Y.2
Li, X.3
Lee, W.S.4
Yu, P.S.5
-
16
-
-
85105809948
-
Inductive learning algorithms and representations for text categorization
-
S. Dumais, P. John, D. Heckerman, and M. Sahami, "Inductive Learning Algorithms and Representations for Text Categorization," Seventh International Conference on Information and Knowledge Management, 1998.
-
(1998)
Seventh International Conference on Information and Knowledge Management
-
-
Dumais, S.1
John, P.2
Heckerman, D.3
Sahami, M.4
-
17
-
-
0002442796
-
Machine learning in automated text categorization
-
F. Sebastiani, "Machine Learning in Automated Text Categorization," ACM Computing Surveys, vol. 34, pp. 1-47, 2002.
-
(2002)
ACM Computing Surveys
, vol.34
, pp. 1-47
-
-
Sebastiani, F.1
-
19
-
-
84861251169
-
-
Center for Natural Language Processing (CNLP), www.cnlp.org.
-
-
-
-
20
-
-
84861251170
-
-
Center for Nonproliferation Studies (CNS), http://cns.miis.edu/.
-
-
-
-
22
-
-
85024373635
-
A re-examination of text categorization methods
-
Y. Yang and X. Liu, "A Re-Examination of Text Categorization Methods," SIGIR'99.
-
SIGIR'99
-
-
Yang, Y.1
Liu, X.2
|