1. C. Cortes, D. Pregibon, and C. Volinsky. Computational methods for dynamic graphs. Journal of Computational and Graphical Statistics, 12:950--970, 2003.
2. O. de Vel, A. Anderson, M. Corney, and G. Mohay. Mining {E-mail} content for author identification forensics. SIGMOD Record, 30(4):55--64, December 2001. European Parliament Temporary Committee on the ECHELON Interception System. Final report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system), 2001.
3. SW. Fong, D.B. Skillicorn, and D. Roussinov. Detecting word substitutions in text. IEEE Transactions on Knowledge and Data Engineering, to appear, 2007.
4. G. Fung. The disputed Federalist papers: SVM and feature selection via concave minimization. In Proceedings of the 2003 Conference on Diversity in Computing, pages 42--46, Atlanta, Georgia, USA, 2003.
5. D. Gupta, M. Saul, and J. Gilbertson. Evaluation of a deidentification {(De-Id)} software engine to share pathology reports and clinical documents for research. American Journal of Clinical Pathology, 121(2):176--186, February 2004.