메뉴 건너뛰기




Volumn 24, Issue 6, 2009, Pages 54-61

Adversarial knowledge discovery

Author keywords

[No Author keywords available]

Indexed keywords

INTELLIGENT SYSTEMS;

EID: 77954868784     PISSN: 15411672     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIS.2009.108     Document Type: Article
Times cited : (24)

References (12)
  • 1
    • 0002629270 scopus 로고
    • Maximum likelihood from incomplete data via the em algorithm
    • series B
    • A.P. Dempster, N.M. Laird, and D.B. Rubin, "Maximum Likelihood from Incomplete Data via the EM Algorithm," J. Royal Statistical Soc., series B, vol.39, no.1, 1977, pp. 1-38.
    • (1977) J. Royal Statistical Soc. , vol.39 , Issue.1 , pp. 1-38
    • Dempster, A.P.1    Laird, N.M.2    Rubin, D.B.3
  • 4
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C.J.C. Burges, "A Tutorial on Support Vector Machines for Pattern Recognition," Data Mining and Knowledge Discovery, vol.2, no.2, 1998, pp. 121-167.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 6
    • 0006001358 scopus 로고    scopus 로고
    • tech. report 567, Dept. of Statistics, Univ. of California, Berkeley
    • L. Breiman, Random Forests-Random Features, tech. report 567, Dept. of Statistics, Univ. of California, Berkeley, 1999.
    • (1999) Random Forests-Random Features
    • Breiman, L.1
  • 7
    • 45849148052 scopus 로고    scopus 로고
    • Effective counterterrorism and the limited role of predictive data mining
    • 11 Dec.
    • J. Jonas and J. Harper, "Effective Counterterrorism and the Limited Role of Predictive Data Mining," Policy Analysis, 11 Dec. 2006, pp. 1-12.
    • (2006) Policy Analysis , pp. 1-12
    • Jonas, J.1    Harper, J.2
  • 8
    • 77955647724 scopus 로고    scopus 로고
    • Why data mining won't stop terror
    • 9 Mar.
    • B. Schneier, "Why Data Mining Won't Stop Terror," Wired, 9 Mar. 2006, www.wired.com/politics/security/commentary/securitymatters/2006/03/70357.
    • (2006) Wired
    • Schneier, B.1
  • 10
    • 77952370340 scopus 로고    scopus 로고
    • A quasi-experiment to determine the impact of a computer based deception detection training system: The use of agent 99 trainer in the US Military
    • IEEE CS Press
    • D.P. Biros et al., "A Quasi-Experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent 99 Trainer in the US Military," Proc. 38th Hawaii Int'l Conf. Systems Science (HICSS 05) vol.1, IEEE CS Press, 2005, p. 24.1.
    • (2005) Proc. 38th Hawaii Int'l Conf. Systems Science (HICSS 05) , vol.1 , pp. 241
    • Biros, D.P.1
  • 11
    • 0038069226 scopus 로고    scopus 로고
    • Lying words: Predicting deception from linguistic style
    • M.L. Newman et al., "Lying Words: Predicting Deception from Linguistic Style," Personality and Social Psychology Bull., vol.29, no.5, 2003, pp. 665-675.
    • (2003) Personality and Social Psychology Bull. , vol.29 , Issue.5 , pp. 665-675
    • Newman, M.L.1
  • 12
    • 70350488617 scopus 로고    scopus 로고
    • An exploratory study into deception detection in text-based computer mediated communication
    • IEEE CS Press
    • L. Zhou et al., "An Exploratory Study into Deception Detection in Text-Based Computer Mediated Communication," Proc. 36th Hawaii Int'l Conf. Systems Science (HICSS 03), IEEE CS Press, 2003, p. 44.2.
    • (2003) Proc. 36th Hawaii Int'l Conf. Systems Science (HICSS 03) , pp. 442
    • Zhou, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.