The (not so) Critical Nodes of Criminal Networks
暂无分享,去创建一个
[1] Giorgio Ausiello,et al. Real-time analysis of critical nodes in network cores , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[2] J. Miro-Julia,et al. Marvel Universe looks almost like a real social network , 2002 .
[3] P. Duijn,et al. The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.
[4] W. Zachary,et al. An Information Flow Model for Conflict and Fission in Small Groups , 1977, Journal of Anthropological Research.
[5] Pasquale De Meo,et al. Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..
[6] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[7] Pasquale De Meo,et al. Visualizing criminal networks reconstructed from mobile phone records , 2014, HT.
[8] Efstathios D. Mainas,et al. The Analysis of Criminal and Terrorist Organisations as Social Network Structures: A Quasi-Experimental Study , 2012 .
[9] Vladimir Batagelj,et al. Generalized Cores , 2002, ArXiv.
[10] W. Baker,et al. THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .
[11] M. Newman,et al. Finding community structure in networks using the eigenvectors of matrices. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[12] Stephen P. Borgatti,et al. Centrality and network flow , 2005, Soc. Networks.
[13] Anthony Masys,et al. Networks and network analysis for defence and security , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[14] Stephen B. Seidman,et al. Network structure and minimum degree , 1983 .
[15] Carlo Morselli,et al. Inside Criminal Networks , 2008 .
[16] D. M. Schwartz,et al. Using social network analysis to target criminal networks , 2009 .
[17] S. Borgatti. The Key Player Problem , 2002 .
[18] Stephen P. Borgatti,et al. Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.
[19] Giorgio Ausiello,et al. The (betweenness) centrality of critical nodes and network cores , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[20] Jure Leskovec,et al. Discovering social circles in ego networks , 2012, ACM Trans. Knowl. Discov. Data.
[21] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[22] Hsinchun Chen,et al. Criminal network analysis and visualization , 2005, CACM.