Estimating the Importance of Terrorists in a Terror Network
暂无分享,去创建一个
Tansel Özyer | Reda Alhajj | Omar Addam | Mick J. Ridley | Ahmed Elhajj | Abdallah M. ElSheikh | Mohamad Alzohbi | Omar Zarour | Alper Aksaç | Orkun Öztürk | Alper Aksaç | R. Alhajj | O. Öztürk | Tansel Özyer | Omar Addam | Omar Zarour | M. Ridley | Ahmed Elhajj | Mohamad Alzohbi
[1] Linton C. Freeman,et al. The gatekeeper, pair-dependency and structural centrality , 1980 .
[2] Kathleen M. Carley,et al. Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..
[3] Reda Alhajj,et al. Multi-objective genetic algorithms based automated clustering for fuzzy association rules mining , 2008, Journal of Intelligent Information Systems.
[4] L. Freeman. Research Methods in Social Network Analysis , 1991 .
[5] Jonathan David Farley,et al. Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .
[6] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[7] Jian Pei,et al. Mining frequent patterns without candidate generation , 2000, SIGMOD 2000.
[8] S. Wasserman,et al. Models and methods in social network analysis , 2005 .
[9] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[10] Wang Jiaxin,et al. Discovering Hierarchical Structure in Terrorist Networks , 2006, 2006 International Conference on Emerging Technologies.
[11] Hsinchun Chen,et al. Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network , 2005, ISI.
[12] Jon Kleinberg,et al. Authoritative sources in a hyperlinked environment , 1999, SODA '98.
[13] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[14] Tansel Özyer,et al. From Alternative Clustering to Robust Clustering and Its Application to Gene Expression Data , 2011, IDEAL.
[15] R. Alhajj,et al. Achieving Natural Clustering by Validating Results of Iterative Evolutionary Clustering Approach , 2006, 2006 3rd International IEEE Conference Intelligent Systems.
[16] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[17] Kathleen M. Carley,et al. Destabilizing Terrorist Networks , 1998 .
[18] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[19] Francisco Herrera,et al. Tackling Real-Coded Genetic Algorithms: Operators and Tools for Behavioural Analysis , 1998, Artificial Intelligence Review.
[20] Zbigniew Michalewicz,et al. Genetic Algorithms + Data Structures = Evolution Programs , 1996, Springer Berlin Heidelberg.
[21] Rami Puzis,et al. Finding the most prominent group in complex networks , 2007, AI Commun..
[22] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[23] S. Strogatz. Exploring complex networks , 2001, Nature.