中子 发表于 2025-3-28 15:14:14

http://reply.papertrans.cn/47/4694/469309/469309_41.png

Landlocked 发表于 2025-3-28 20:50:54

A Cybercrime Forensic Method for Chinese Web Information Authorship Analysisnomena from happening has become a major concern for society. In this paper, a cybercrime forensic method for Chinese illegal web information authorship analysis was described. Various writing-style features including linguistic features and structural features were extracted. To classify the author

温和女人 发表于 2025-3-28 23:43:26

Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithmsps’ attacks and activities. In this study, a novel prediction model; CPM is applied to a crime dataset which includes solved and unsolved terrorist events in Istanbul, Turkey between 2003 and 2005, aiming to predict perpetuators of terrorist events which are still remained unsolved. CPM initially le

Aqueous-Humor 发表于 2025-3-29 05:46:17

http://reply.papertrans.cn/47/4694/469309/469309_44.png

grotto 发表于 2025-3-29 10:30:14

http://reply.papertrans.cn/47/4694/469309/469309_45.png

革新 发表于 2025-3-29 13:50:53

http://reply.papertrans.cn/47/4694/469309/469309_46.png

STELL 发表于 2025-3-29 18:48:29

http://reply.papertrans.cn/47/4694/469309/469309_47.png

埋伏 发表于 2025-3-29 22:36:31

http://reply.papertrans.cn/47/4694/469309/469309_48.png

Osteoarthritis 发表于 2025-3-30 01:18:34

http://reply.papertrans.cn/47/4694/469309/469309_49.png

dialect 发表于 2025-3-30 04:40:43

http://reply.papertrans.cn/47/4694/469309/469309_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Intelligence and Security Informatics; Pacific Asia Worksho Hsinchun Chen,Christopher C. Yang,Shu-Hsing Li Conference proceedings 2009 Spri