參考文獻 |
[1] The Economist print edition , : http://www.economist.com/displaystory.cfm?story_id=13416219 , The Economist , Apr 2nd 2009
[2] CNN print edition, : http://edition.cnn.com/2009/TECH/03/30/ghostnet.cyber.espionage/index.html,CNN, March 30, 2009
[3] Kjell, B., Addison Woods, W, Frieder O.: Discrimination of authorship using visualization. Information Processing and Management 30:1 (1994).
[4] Keselj, V., Peng, F., Cercone, N. Thomas, C.: N-gram-based Author Profiles for Authorship Attribution. In Proc. of the Conference Pacific Association for Computational Linguistics (2003).
[5] F Iqbal, R Hadjidj, BCM Fung, M Debbabi, : A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digital Investigation, 2008
[6] Jianbin Ma Ying Li Guifa Teng Fang Wang Yang Zhao.: Sequential Pattern Mining for Chinese E-mail Authorship Identification. : Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference on
[7] B Allison, L Guthrie,: Authorship Attribution of E-Mail Comparing Classifiers Over a New Corpus for Evaluation. Proceedings of LREC, 2008
[8] Gui-Fa Teng Mao-Sheng Lai Jian-Bin Ma Ying Li .: E-MAIL AUTHORSHIP MINING BASED ON SVM FOR COMPUTER. Machine Learning and Cybernetics, 2004
[9] O De Vel, A Anderson, M Corney, G Mohay.: Mining Email Content for Author Identification Forensics. ACM Sigmod Record, 2001
[10] K Calix, M Connors, D Levy, H Manzar, G McCabe, S.: Stylometry for E-mail Author Identification and Authentication. CSIS Research Day, Pace Univ, 2008
[11] Stamatatos, E., Fakotakis, N., Kokkinakis, G.: Automatic Text Categorization in Terms of Genre and Author. Computational Linguistics 26:4 (2000) 471-495.
[12] Peng, F., Shuurmans, F., Keselj, V.,: Wang, S.: Language Independent Authorship Attribution Using Character Level Language Models. In Proc. of the 10th European Association for Computational Linguistics (2003).
[13] de Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining E-mail Content for Author Identification Forensics. SIGMOD Record, 30:4 (2001) 55-64.
[14] Abbasi, A., Chen, H.: Applying Authorship Analysis to Extremist-Group Web Forum Messages. IEEE Intelligent Systems, 20:5 (2005) 67-75.
[15] van Halteren, H.: Linguistic Profiling for Author Recognition and Verification. In Proc. Of the 42nd Annual Meeting of the Association for Computational Linguistics (2004) 199-206.
[16] Chaski, C.: Empirical Evaluations of Language-based Author Identification Techniques.Forensic Linguistics, 8:1 (2001) 1-65.
[17]De Vel O. Mining e-mail authorship. Paper presented at the workshop on text mining. In: ACM international conference on knowledge discovery and data mining (KDD); 2000.
[18] Abbasi A, Chen H. Writeprints: a stylometric approach to identitylevel identification and similarity detection in cyberspace.ACM Transactions on Information Systems March 2008;26(2).
[19] C. Apte, F. Damerau, and S. Weiss.:Text mining with decision rules and decision trees". In Workshop on Learning from text and the Web, Conference on Automated Learning and Discovery, 1998.
[20] H. Ng, W. Goh, and K. Low. Feature selection, perceptron learning, and a usability case study for text categorization". In Proc. 20th Int. ACM SIGIR Conf. on Research and Development in Information Retrieval (SIGIR97), pages 67{73, 1997.
[21] T. Mitchell. Machine Learning. McGraw-Hill, New York, 1997.
[22] Y. Yang and X. Liu. A re-examination of text categorisation methods". In Proc. 22nd Int. ACM SIGIR Conf. on Research and Development in Information Retrieval (SIGIR99), pages 67{73, 1999.
[23] T. Joachims. Text categorization with support vector machines: Learning with many relevant features". In Proc. European Conf. Machine Learning (ECML'98), pages 137{142, 1998.
[24] Holmes, D.: The Evolution of Stylometry in Humanities Scholarship. Literary and Linguistic Computing, 13:3 (1998) 111-117.
[25] Burrows, J.F.:Word Patterns and Story Shapes: The Statistical Analysis of Narrative Style. Literary and Linguistic Computing, 2: 61-70. 1987.
[26] Keselj, V., Peng, F., Cercone, N. Thomas, C.: N-gram-based Author Profiles for Authorship Attribution. In Proc. of the Conference Pacific Association for Computational Linguistics (2003).
[27] Ali ,C. Tunga ,G.: Time-efficient spam e-mail filtering using n-gram models , 2007.
[28] Abou-Assaleh, T. Cercone, N. Keselj, V. Sweidan, R. : N-gram-based Detection of New Malicious Code, : Computer Software and Applications Conference, 2004. COMPSAC 2004. Proceedings of the 28th Annual International
[29] Yamamoto, H. Sagisaka, Y.:MULTI-CLASS COMPOSITE N-GRAM BASED ON CONNECTION DIRECTION, Acoustics, Speech, and Signal Processing, 1999. ICASSP '99. Proceedings., 1999 IEEE International Conference on Publication Date: 15-19 Mar 1999
[30] De Vel O, Anderson A, Corney M, Mohay G. Mining e-mail content For author identification forensics. SIGMOD Record 2001a; 30(4):55–64.
[31] I Rigoutsos, T Huynh,: Chung-Kwei: a Pattern-discovery-based System for theAutomatic Identification of Unsolicited E-mail Messages (SPAM),2004
[32] 林惠聆,陳正倉,:統計學原理(二版),雙葉書局,2001
|