CrimeFighter Investigator: Integrating synthesis and sense-making for criminal network investigation
暂无分享,去创建一个
[1] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[2] Stuart K. Card,et al. Principles and Tools for Collaborative Entity-Based Intelligence Analysis , 2010, IEEE Transactions on Visualization and Computer Graphics.
[3] Kenton O'Hara,et al. Social Impact , 2019, Encyclopedia of Food and Agricultural Ethics.
[4] V. S. Subrahmanian,et al. Handbook of Computational Approaches to Counterterrorism , 2013, Springer New York.
[5] B. Lévy,et al. Who killed Daniel Pearl , 2003 .
[6] C. J. Rhodes,et al. Social network topology: a Bayesian approach , 2007, J. Oper. Res. Soc..
[7] Claus Atzenbeck,et al. Supporting reasoning and communication for intelligence officers , 2011, Int. J. Netw. Virtual Organisations.
[8] Merrick E. Krause,et al. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States , 2004 .
[9] Uffe Kock Wiil,et al. CrimeFighter: A Toolbox for Counterterrorism , 2009, IC3K.
[10] David L. Hicks,et al. Mathematical Methods in Counterterrorism , 2009 .
[11] Richard Adderley,et al. Police crime recording and investigation systems – A user’s view , 2001 .
[12] Andreas Tolk,et al. NATO Code of Best Practice for C2 Assessment - Implications for SISO , 2002 .
[13] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[14] Johanna D. Moore,et al. Proceedings of the Conference on Human Factors in Computing Systems , 1989 .
[15] Tim Weiner,et al. Legacy of Ashes: The History of the CIA , 2007 .
[16] Uffe Kock Wiil,et al. CrimeFighter Investigator: Criminal Network Sense-Making , 2013 .
[17] Uffe Kock Wiil,et al. Hypertext structures for investigative teams , 2011, HT '11.
[18] Petter Gottschalk,et al. Knowledge management in policing and law enforcement : foundations, structures, applications , 2007 .
[19] Petter Gottschalk,et al. Knowledge Management in Policing and Law Enforcement , 2007 .
[20] Christine Merlino,et al. A Mighty Heart , 2007 .
[21] Nicholas J. Pioch,et al. POLESTAR: collaborative knowledge management and sensemaking tools for intelligence analysts , 2006, CIKM '06.
[22] Graham J Hole,et al. How to Design and Report Experiments , 2002 .
[23] Michael L. Begeman,et al. gIBIS: a hypertext tool for exploratory policy discussion , 1988, CSCW '88.
[24] J. Frey. The 9/11 Commission Report: Final Report of the National Commission on Terrorist attacks upon the United States , 2004 .
[25] Mark Bernstein. The Tinderbox Way , 2007 .
[26] P. Jones,et al. Inferring missing links in partially observed social networks , 2009, J. Oper. Res. Soc..
[27] Robert M. Clark,et al. Intelligence Analysis: A Target-Centric Approach , 2003 .
[28] Gordon Woo,et al. Intelligence Constraints on Terrorist Network Plots , 2009 .
[29] Frank L. Greitzer,et al. Top Ten Needs for Intelligence Analysis Tool Development , 2005 .
[30] Alexander W. Skaburskis,et al. The Sandbox for analysis: concepts and methods , 2006, CHI.
[31] Jarke J. van Wijk,et al. Supporting the analytical reasoning process in information visualization , 2008, CHI.
[32] Uffe Kock Wiil,et al. Node Removal in Criminal Networks , 2011, 2011 European Intelligence and Security Informatics Conference.
[33] Uffe Kock Wiil,et al. CrimeFighter Investigator: A Novel Tool for Criminal Network Investigation , 2011, 2011 European Intelligence and Security Informatics Conference.