COMPUTATIONAL MEASURES OF DECEPTIVE LANGUAGE: PROSPECTS AND ISSUES

Computational Measures of Deceptive Language: Prospects and Issues

In this article, we wish to foster a dialogue between theory-based and classification-oriented stylometric approaches regarding deception detection.To do so, we review how cue-based and model-based stylometric systems are used to detect deceit.Baseline methods, common cues, recent Latigos and Billets methods, and field studies are presented.After r

read more

Version-Wide Software Birthmark via Machine Learning

Identifying the credibility of executable files is critical for the security of an operating system.Modern operating systems rely on code signing, which uses a default-valid trust model, for executable files to identify their publishers.A malware could pass software validation of operating systems and security software by using copyright code-signi

read more


GIS-based RAG-coded search priority scenarios for predictive maps to prevent future serial serious crimes: The case study of the Florence Monster

In the present research, the GIS (Geographical Information System)-based RAG (Red-Amber-Green) color-coded search priority system was applied to the case study of the serial murders of the monster of Florence occurred between 1968 and 1985 in the Florence province (northern Italy).Through a predictive search priority scenario, the RAG maps were aim

read more