Investigative Data Mining: Identifying Key Nodes in Terrorist Networks
暂无分享,去创建一个
[1] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[2] Nasrullah Memon,et al. Notice of Violation of IEEE Publication PrinciplesPractical approaches for analysis, visualization and destabilizing terrorist networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[3] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.
[4] Hsinchun Chen,et al. Criminal network analysis and visualization , 2005, CACM.
[5] W. Baker,et al. THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .
[6] Jonathan David Farley,et al. Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .
[7] Richards J. Heuer,et al. Psychology of Intelligence Analysis , 1999 .
[8] D. Mcandrew. The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.
[9] Jeffrey Scott McIllwain,et al. Organized crime: A social network approach , 1999 .
[10] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[11] Paul R. Pillar. Counterterrorism after Al Qaeda , 2004 .
[12] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[13] S. Borgatti. The Key Player Problem , 2002 .
[14] V. Hougham. Sociological Skills Used in the Capture of Saddam Hussein , 2005 .
[15] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[16] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[17] Kathleen M. Carley. Estimating Vulnerabilities in Large Covert Networks , 2004 .
[18] Jay Liebowitz,et al. The synergy of social network analysis and knowledge mapping: a case study , 2006 .
[19] Alain Degenne,et al. Introducing Social Networks , 1999 .
[20] Padhraic Smyth,et al. Algorithms for estimating relative importance in networks , 2003, KDD '03.