-
1
-
-
0037907534
-
Toulmin’s philosophy of argument and its relevance to offender profiling
-
Alison L, Smith M, Eastman O, Rainbow L (2003) Toulmin’s philosophy of argument and its relevance to offender profiling. Psychol Crime Law 9(2):173–183
-
(2003)
Psychology, Crime and Law
, vol.9
, Issue.2
, pp. 173-183
-
-
Alison, L.1
Smith, M.2
Eastman, O.3
Rainbow, L.4
-
3
-
-
85041447514
-
Markmonitor.com
-
Brandjacking index (2009) Markmonitor.com, Spring 2009. http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf
-
(2009)
Spring
, pp. 2009
-
-
index, B.1
-
4
-
-
0036330608
-
Serial killers with military experience: applying learning theory to serial murder
-
Castle T, Hensley C (2002) Serial killers with military experience: applying learning theory to serial murder. International J Offender Ther Comp Criminol 46:453–465
-
(2002)
International J Offender Ther Comp Criminol
, vol.46
, pp. 453-465
-
-
Castle, T.1
Hensley, C.2
-
6
-
-
84870548992
-
Prototyping a lightweight trust architecture to fight phishing
-
Tech, Rep., final Report
-
Chau D (2005) Prototyping a lightweight trust architecture to fight phishing, MIT Computer Science and Artificial Intelligence Laboratory, Tech. Rep., final Report. http://groups.csail.mit.edu/cis/crypto/projects/antiphishing/
-
(2005)
MIT Computer Science and Artificial Intelligence Laboratory
-
-
Chau, D.1
-
7
-
-
0005044188
-
Profiling: a hidden challenge to the regulation of data surveillance
-
Clark R (1993) Profiling: a hidden challenge to the regulation of data surveillance. J Inf Sci 4(2)
-
(1993)
J Inf Sci
, vol.4
, Issue.2
-
-
Clark, R.1
-
8
-
-
77954878926
-
Spam Email Filtering Using Network-Level Properties
-
Berlin, Germany
-
Cortez P, Correia A, Sousa P, Rocha M, Rio M, Perner P (2010) Spam Email Filtering Using Network-Level Properties. In: Proceedings, Advances in Data Mining Applications and Theoretical Aspects. 10th Industrial Conference, ICDM 2010. Berlin, Germany
-
(2010)
Proceedings, Advances in Data Mining Applications and Theoretical Aspects. 10th Industrial Conference, ICDM
, pp. 2010
-
-
Cortez, P.1
Correia, A.2
Sousa, P.3
Rocha, M.4
Rio, M.5
Perner, P.6
-
9
-
-
85041448118
-
-
Customer profiling survey solution enabling cross and up selling (2007) Confirmit.
-
Customer profiling survey solution enabling cross and up selling (2007) Confirmit. http://www.confirmit.com/home.aspx
-
-
-
-
11
-
-
84898270337
-
Online identity theft: Phishing technilogy
-
Radix Labs: Tech. Rep., retrieved from Anti-Phishing Working Group
-
Emigh A (2005) Online identity theft: Phishing technilogy, chokepoints and countermeasures, Radix Labs, Tech. Rep., retrieved from Anti-Phishing Working Group. http://www.antiphishing.org/resources.html
-
(2005)
chokepoints and countermeasures
-
-
Emigh, A.1
-
12
-
-
85041432921
-
-
FBI method of profiling (2006) Wikipedia, January 2006, retrieved June 10, 2011. http://en.wikipedia.org/wiki/FBI_method_of_profiling
-
(2006)
Wikipedia, January 2006, retrieved June
, vol.10
, Issue.2011
-
-
-
13
-
-
35348913799
-
Tomasic A (2007) Learning to detect phishing emails
-
ACM Press, New York
-
Fette I, Sadeh N, Tomasic A (2007) Learning to detect phishing emails. In: WWW ’07: Proceedings of the 16th international conference on the World Wide Web. New York, NY, USA. ACM Press, New York, pp 649–656
-
WWW ’07: Proceedings of the 16th international conference on the World Wide Web. New York, NY, USA
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
-
14
-
-
0001963082
-
A short introduction to boosting
-
Freund Y, Schapire R (1999) A short introduction to boosting, J Jpn Soc Artif Intell 14(5):771–780
-
(1999)
J Jpn Soc Artif Intell
, vol.14
, Issue.5
, pp. 771-780
-
-
Freund, Y.1
Schapire, R.2
-
15
-
-
84922187857
-
Applying modality and equivalence concepts to pattern finding in social process-produced data
-
Hanneman RA, Shelton CR (2011) Applying modality and equivalence concepts to pattern finding in social process-produced data. Soc Netw Anal Min 1(1):59–72
-
(2011)
Soc Netw Anal Min
, vol.1
, Issue.1
, pp. 59-72
-
-
Hanneman, R.A.1
Shelton, C.R.2
-
17
-
-
85041439860
-
-
InterNIC : Whois search InterNIC—Public information Regarding Internel Domain Name Registration Services.
-
InterNIC: Whois search InterNIC—Public information Regarding Internel Domain Name Registration Services. http://www.internic.net/whois.html
-
-
-
-
19
-
-
85041437628
-
Distributed phishing attacks, Cryptology ePrint Archive
-
Jakobsson M, Young A (2005) Distributed phishing attacks, Cryptology ePrint Archive, Report 2005/091. http://eprint.iacr.org/
-
(2005)
Report
, vol.2005
-
-
Jakobsson, M.1
Young, A.2
-
20
-
-
0038167128
-
Learning to classify text using support vector machines: methods
-
Kluwer Academic Publishers, Dordrecht
-
Joachims TJ (2002) Learning to classify text using support vector machines: methods, theory and algorithms. Kluwer Academic Publishers, Dordrecht
-
(2002)
theory and algorithms
-
-
Joachims, T.J.1
-
21
-
-
33751030004
-
-
USA. IEEE Computer Society: NW
-
Juels A, Jakobsson M, Jagatic TN (2006) Cache cookies for browser authentication (extended abstract), In: SP ’06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06). minus 0.4em Washington, DC, USA. IEEE Computer Society, NW, pp 301–305
-
(2006)
Cache cookies for browser authentication (extended abstract), In: SP ’06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06). minus 0.4em Washington, DC
, pp. 301-305
-
-
Juels, A.1
Jakobsson, M.2
Jagatic, T.N.3
-
22
-
-
33845310880
-
The study of drug-reaction relationships using global optimization techniques
-
Mammadov M, Rubinov A, Yearwood J (2007a) The study of drug-reaction relationships using global optimization techniques. Optim Methods Softw 22(1):99–126
-
(2007)
Optim Methods Softw
, vol.22
, Issue.1
, pp. 99-126
-
-
Mammadov, M.1
Rubinov, A.2
Yearwood, J.3
-
23
-
-
84947232505
-
Classification on shorter featured and multi-label datasets
-
Kobe, Japan
-
Mammadov M, Yearwood J, Banarjee A (2007b) Classification on shorter featured and multi-label datasets. In: Proceedings of the 7th International Conference on Optimization: Techniques and Applications (ICOTA07), December 12–15, Kobe, Japan
-
(2007)
Proceedings of the 7th International Conference on Optimization: Techniques and Applications (ICOTA07), December
, pp. 12-15
-
-
Mammadov, M.1
Yearwood, J.2
Banarjee, A.3
-
24
-
-
85041445960
-
-
Market basket analysis (2011) Information drivers, retrieved June 10, 2011. http://www.information-drivers.com/market_basket_analysis.php
-
(2011)
Information drivers, retrieved June
, vol.10
, pp. 2011
-
-
-
25
-
-
85041440625
-
Analysis of consumer behaviour online, Analogik.com, Tech
-
Petrovic D (2007) Analysis of consumer behaviour online, Analogik.com, Tech. Rep., retrieved June 10, 2011. http://analogik.com/articles/227/analysis-of-consumer-behaviour-online
-
(2007)
Rep., retrieved June
, vol.10
, Issue.2011
-
-
Petrovic, D.1
-
26
-
-
85041442273
-
-
Ripe database RIPE Network Coordination Centre.
-
Ripe database RIPE Network Coordination Centre. http://www.ripe.net/index.html
-
-
-
-
27
-
-
84863950364
-
Social networks and online environments: when science and practice co-evolve
-
Rosen D, Barnett GA, Kim JH (2011) Social networks and online environments: when science and practice co-evolve. Soc Netw Anal Min 1(1):27–42
-
(2011)
Soc Netw Anal Min
, vol.1
, Issue.1
, pp. 27-42
-
-
Rosen, D.1
Barnett, G.A.2
Kim, J.H.3
-
28
-
-
0033905095
-
BoosTexter: A boosting-based system for text categorization
-
Schapire R, Singer Y (2000) BoosTexter: a boosting-based system for text categorization. Mach Learn 39(2/3):135–168
-
(2000)
Machine Learning
, vol.39
, Issue.2-3
, pp. 135-168
-
-
Schapire, R.1
Singer, Y.2
-
29
-
-
0002442796
-
Machine learning in automated text categorization
-
Sebastiani F (2002) Machine learning in automated text categorization. IACM Comput Surv (CSUR) 34(1). doi:10.1145/505282.505283
-
(2002)
IACM Comput Surv (CSUR)
, vol.34
, Issue.1
-
-
Sebastiani, F.1
-
32
-
-
84947276512
-
-
The APNIC whois Asia Pacific Network Information Center.
-
The APNIC whois Asia Pacific Network Information Center. http://wq.apnic.net/apnic-bin/whois.pl
-
-
-
-
34
-
-
85041432633
-
A free and comprehensive guide to the world of forensic psychology
-
Webb D (2011) A free and comprehensive guide to the world of forensic psychology, All About Forensic Psychology, retrieved June, 2011. http://student-guide-to-forensic-psychology.blogspot.com/
-
(2011)
All About Forensic Psychology, retrieved June
, pp. 2011
-
-
Webb, D.1
-
35
-
-
84947285566
-
-
The Australasian Data Mining Conference: CRPIT
-
Webb D, Yearwood J, Vamplew P, Liping M, Ofoghi B, Kelarev A (2009) Applying clustering and ensemble clustering approaches to phishing profiling. In: Proceedings of AusDM 2009, The Australasian Data Mining Conference 2009. CRPIT
-
(2009)
Kelarev A (2009) Applying clustering and ensemble clustering approaches to phishing profiling. In: Proceedings of AusDM
, vol.2009
-
-
Webb, D.1
Yearwood, J.2
Vamplew, P.3
Liping, M.4
Ofoghi, B.5
-
37
-
-
70349325096
-
Preventing phishing attacks by revealing user intentions
-
In, Symposium on Usable Privacy and Security (SOUPS
-
Wu M, Miller R, Little G (2006) Preventing phishing attacks by revealing user intentions. In: Symposium on Usable Privacy and Security (SOUPS)
-
(2006)
-
-
Wu, M.1
Miller, R.2
Little, G.3
-
38
-
-
70449473998
-
Revealing social networks of spammers through spectral clustering
-
Dresden, Germany
-
Xu KS, Kliger MM, Yilun C, Woolf PJ, Hero A (2009) Revealing social networks of spammers through spectral clustering. In: Proceedings of the IEEE International Conference on Communications. Dresden, Germany. doi:10.1109/ICC.2009.5199418
-
(2009)
In: Proceedings of the IEEE International Conference on Communications
-
-
Xu, K.S.1
Kliger, M.M.2
Yilun, C.3
Woolf, P.J.4
Hero, A.5
|