Zobrazeno 1 - 3
of 3
pro vyhledávání: '"SzeWang Fong"'
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering
Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example in intelligence and counterterrorism settings. One obvious defense is to replace words that might attract attention to a message
Publikováno v:
SIGIR
Those who want to conceal the content of their communications can do so by replacing words that might trigger attention. For example, instead of writing "The bomb is in position", a terrorist may chose to write "The flower is in position." The substi
Publikováno v:
Intelligence and Security Informatics ISBN: 9783540344780
ISI
ISI
Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinary. We address the problem of discovering such substitutions when the original an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3cccaf4f8de322021380896db6b0b486
https://doi.org/10.1007/11760146_17
https://doi.org/10.1007/11760146_17