Deb Shinder begins a series of columns on the subject of cybercrime and law enforcement with this post on profiling the criminals and figuring out the types of crimes they are likely to commit.
S. Bergsma, M. Post, and D. Yarowsky. Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, page 327--337. Association for Computational Linguistics, (2012)
M. Koppel, J. Schler, and K. Zigdon. Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, page 624--628. ACM, (2005)