Integrating Rule-Based System with Classification for Arabic Named Entity Recognition, Proceedings of the Thirteenth International Conference on Computational Linguistics and Intelligent Text Processing, pp.311-322, 2012. ,
DOI : 10.1007/978-3-642-28604-9_26
A Review of Relation Extraction, Language Technologies Institute, 2007. ,
Digital forensic research: The good, the bad and the unaddressed , in Advances in Digital Forensics, pp.17-36, 2009. ,
Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, pp.3-16, 2005. ,
Clustering digital forensic string search output, Digital Investigation, pp.314-322, 2014. ,
DOI : 10.1016/j.diin.2014.10.002
Collective information extraction with relational Markov networks, Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics , ACL '04, 2004. ,
DOI : 10.3115/1218955.1219011
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.5677
Empirical methods in information extraction, AI Magazine, pp.65-79, 1997. ,
Extracting meaningful entities from police narrative reports, Proceedings of the Annual National Conference on Digital Government Research, 2002. ,
Relation extraction using label propagation based semi-supervised learning, Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the ACL , ACL '06, pp.129-136, 2006. ,
DOI : 10.3115/1220175.1220192
Statistical profiling and visualization for detection of malicious insider attacks on computer networks, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.138-142, 2004. ,
DOI : 10.1145/1029208.1029231
Applying topic modeling to forensic data, in Advances in Digital Forensics IV, I Ray and, pp.115-126, 2008. ,
Incorporating non-local information into information extraction systems by Gibbs sampling, Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics , ACL '05, pp.363-370, 2005. ,
DOI : 10.3115/1219840.1219885
URL : http://acl.ldc.upenn.edu/p/p05/p05-1045.pdf
Digital forensics research: The next ten years, pp.64-73, 2010. ,
Named entity recognition in query, Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, SIGIR '09, pp.267-274, 2009. ,
DOI : 10.1145/1571941.1571989
Towards an integrated e-mail forensic analysis framework, Digital Investigation, pp.3-4, 2009. ,
DOI : 10.1016/j.diin.2009.01.004
TileBars, Proceedings of the SIGCHI conference on Human factors in computing systems, CHI '95, pp.59-66, 1995. ,
DOI : 10.1145/223904.223912
Tag Clouds: Data Analysis Tool or Social Signaller?, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008. ,
DOI : 10.1109/HICSS.2008.422
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.916
Online named entity recognition method for microtexts in social networking services: A case study of twitter, Expert Systems with Applications, vol.39, issue.9, pp.8066-8070, 2012. ,
DOI : 10.1016/j.eswa.2012.01.136
Introducing the Enron corpus, Proceedings of the Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, 2004. ,
Natural language processing and egovernment: Crime information extraction from heterogeneous data sources, Proceedings of the Ninth Annual International Conference on Digital Government Research, pp.162-170, 2008. ,
Increasing NER Recall with Minimal Precision Loss, 2013 European Intelligence and Security Informatics Conference, pp.106-111, 2013. ,
DOI : 10.1109/EISIC.2013.23
URL : http://eprints.eemcs.utwente.nl/23400/01/PID2822297.pdf
Conditional random fields: Probabilistic models for segmenting and labeling sequence data, Proceedings of the Eighteenth International Conference on Machine Learning, pp.282-289, 2001. ,
Named entity recognition in a South African context, Proceedings of the 2006 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing couuntries , SAICSIT '06, pp.170-179, 2006. ,
DOI : 10.1145/1216262.1216281
Unsupervised discovery of relations for analysis of textual data, Digital Investigation, pp.154-171, 2011. ,
DOI : 10.1016/j.diin.2010.08.004
Ontology learning for the Semantic Web, IEEE Intelligent Systems, vol.16, issue.2, pp.72-79, 2001. ,
DOI : 10.1109/5254.920602
Named entity recognition from diverse text types, Proceedings of the Conference on Recent Advances in Natural Language Processing, pp.257-274, 2001. ,
Early results for named entity recognition with conditional random fields, feature induction and web-enhanced lexicons, Proceedings of the seventh conference on Natural language learning at HLT-NAACL 2003 -, pp.188-191, 2003. ,
DOI : 10.3115/1119176.1119206
Extracting personal names from email, Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing , HLT '05, pp.443-450, 2005. ,
DOI : 10.3115/1220575.1220631
Mining knowledge from text using information extraction, ACM SIGKDD Explorations Newsletter, vol.7, issue.1, pp.3-10, 2005. ,
DOI : 10.1145/1089815.1089817
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.4183
A survey of named entity recognition and classification, Lingvisticae Investigationes, pp.3-26, 2007. ,
DOI : 10.1075/bct.19.03nad
Using PLSI-U To Detect Insider Threats from Email Traffic, Advances in Digital Forensics II, pp.91-103, 2006. ,
DOI : 10.1007/0-387-36891-4_8
Analyzing Entities and Topics in News Articles Using Statistical Topic Models, Proceedings of the Fourth IEEE International Conference on Intelligence and Security Informatics, pp.93-104, 2006. ,
DOI : 10.1007/11760146_9
Enhancing the Apriori algorithm for frequent set counting, Proceedings of the Third International Conference on Data Warehousing and Knowledge Discovery, pp.71-82, 2001. ,
Exploring big haystacks, in Advances in Digital Forensics II, pp.67-76, 2006. ,
Information extraction and text summarization using linguistic knowledge acquisition, Information Processing & Management, vol.25, issue.4, pp.419-428, 1989. ,
DOI : 10.1016/0306-4573(89)90069-1
A Term Distribution Visualization Approach to Digital Forensic String Search, Proceedings of the Fifth International Workshop on Visualization for Computer Security, pp.36-43, 2008. ,
DOI : 10.1007/978-3-540-85933-8_4
Semi-supervised relation extraction with large-scale word clustering, Proceedings of the Forty- Ninth Annual Meeting of the Association for Computational Linguistics, pp.521-529, 2011. ,
An introduction to conditional random fields for relational learning, in Introduction to Statistical Relational Learning, pp.93-128, 2007. ,
Introduction to Data Mining, 2005. ,
Specializing CRISP-DM for Evidence Mining, Advances in Digital Forensics III, pp.303-315, 2007. ,
DOI : 10.1007/978-0-387-73742-3_21
URL : http://researchspace.csir.co.za/dspace/bitstream/10204/5539/1/Venter3_2007.pdf
SCAN, Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval , SIGIR '99, pp.26-33, 1999. ,
DOI : 10.1145/312624.312639
Unsupervised relation extraction by mining Wikipedia texts using information from the web, Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP: Volume 2, ACL-IJCNLP '09, pp.1021-1029, 2009. ,
DOI : 10.3115/1690219.1690289
Kernel methods for relation extraction, Proceedings of the ACL-02 conference on Empirical methods in natural language processing , EMNLP '02, pp.1083-1106, 2003. ,
DOI : 10.3115/1118693.1118703
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.821
Extracting relations with integrated information using kernel methods, Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics , ACL '05, pp.419-426, 2005. ,
DOI : 10.3115/1219840.1219892
URL : http://acl.ldc.upenn.edu/P/P05/P05-1052.pdf