Uncovering the dark Web: A case study of Jihad on the Web
暂无分享,去创建一个
[1] Lee S. Strickland,et al. Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..
[2] Y. Tsfati,et al. www.terrorism.com: Terror on the Internet , 2002 .
[3] Hsinchun Chen,et al. EBizPort: Collecting and analyzing business intelligence information , 2004, J. Assoc. Inf. Sci. Technol..
[4] John M. Chambers,et al. Graphical Methods for Data Analysis , 1983 .
[5] Abraham Kandel,et al. Multi-lingual Detection of Terrorist Content on the Web , 2006, WISI.
[6] Wingyan Chung,et al. Visualising e-business stakeholders on the Web: a methodology and experimental results , 2008, Int. J. Electron. Bus..
[7] T. Thomas. Al Qaeda and the Internet: The Danger of “Cyberplanning” , 2003, Parameters.
[8] Beat Kleiner,et al. Graphical Methods for Data Analysis , 1983 .
[9] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[10] Hsinchun Chen,et al. MetaSpider: Meta-searching and categorization on the Web , 2001, J. Assoc. Inf. Sci. Technol..
[11] Ted E. Senator,et al. Countering terrorism through information technology , 2004, CACM.
[12] Jay F. Nunamaker,et al. A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration , 2005, J. Manag. Inf. Syst..
[13] William A. Kealy. Knowledge Maps and Their Use in Computer-Based Collaborative Learning Environments , 2001 .
[14] Tetsuya Nasukawa,et al. Text analysis and knowledge mining system , 2001, IBM Syst. J..
[15] Hsinchun Chen,et al. Internet Categorization and Search: A Self-Organizing Approach , 1996, J. Vis. Commun. Image Represent..
[16] Oren Etzioni,et al. The World-Wide Web: quagmire or gold mine? , 1996, CACM.
[17] Hsinchun Chen,et al. Evaluating event visualization: a usability study of COPLINK spatio-temporal visualizer , 2005, Int. J. Hum. Comput. Stud..
[18] S. C. Hui,et al. Mining a Web Citation Database for author co-citation analysis , 2002, Inf. Process. Manag..
[19] Forrest W. Young. Multidimensional Scaling: History, Theory, and Applications , 1987 .
[20] Gang Wang,et al. Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort) , 2004, J. Assoc. Inf. Sci. Technol..
[21] Hsinchun Chen,et al. Web mining: Machine learning for web applications , 2005, Annu. Rev. Inf. Sci. Technol..
[22] Sean B. Eom,et al. The contributions of organizational science to the development of decision support systems research subspecialties , 1996 .
[23] Susan Karr. The United States Government , 2007 .
[24] Hsinchun Chen,et al. Introduction to the special topic issue: Intelligence and security informatics , 2005, J. Assoc. Inf. Sci. Technol..
[25] Hsinchun Chen,et al. Criminal network analysis and visualization , 2005, CACM.