暂无分享,去创建一个
Stephen A. Davis | Asha Rao | Pritheega Magalingam | Stephen Davis | Pritheega Magalingam | Asha Rao | S. Davis
[1] Muhammad Abulaish,et al. A social graph based text mining framework for chat log investigation , 2014, Digit. Investig..
[2] Stephen A. Davis,et al. Identifying a Criminal's Network of Trust , 2014, 2014 Tenth International Conference on Signal-Image Technology and Internet-Based Systems.
[3] Aparna Basu. Social Network Analysis: A Methodology for Studying Terrorism , 2014 .
[4] Muhammad Abulaish,et al. Identifying cliques in dark web forums - An agglomerative clustering approach , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.
[5] Ping Zhang. Model Selection Via Multifold Cross Validation , 1993 .
[6] Claudio Castellano,et al. Defining and identifying communities in networks. , 2003, Proceedings of the National Academy of Sciences of the United States of America.
[7] Jongsung Kim,et al. A granular approach for user-centric network analysis to identify digital evidence , 2014, Peer-to-Peer Networking and Applications.
[8] Xing-yuan Wang,et al. Uncovering the overlapping community structure of complex networks by maximal cliques , 2014 .
[9] C. Bron,et al. Algorithm 457: finding all cliques of an undirected graph , 1973 .
[10] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.
[11] Wenke Lee,et al. Connected Colors: Unveiling the Structure of Criminal Networks , 2013, RAID.
[12] Andries Petrus Engelbrecht,et al. Unsupervised discovery of relations for analysis of textual data , 2010, Digit. Investig..
[13] David B. Skillicorn,et al. Detecting unusual email communication , 2005, CASCON.
[14] J. Shao. Bootstrap Model Selection , 1996 .
[15] M E J Newman,et al. Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[16] Pasquale De Meo,et al. Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..
[17] T. Vicsek,et al. Uncovering the overlapping community structure of complex networks in nature and society , 2005, Nature.
[18] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[19] Tim Menzies,et al. oftware effort models should be assessed via leave-one-out validation , 2013 .
[20] Haluk Bingol,et al. Community Detection in Complex Networks Using Genetic Algorithms , 2006, 0711.0491.
[21] Malcolm S. Salter. Innovation Corrupted: The Origins and Legacy of Enron's Collapse , 2008 .
[22] Roger Piqueras Jover,et al. Crime scene investigation: SMS spam data analysis , 2012, IMC '12.
[23] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[24] Jian Pei,et al. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.
[25] Amr M. Youssef,et al. Mining criminal networks from unstructured text documents , 2012, Digit. Investig..
[26] R. Carter. 11 – IT and society , 1991 .
[27] Mark Newman,et al. Networks: An Introduction , 2010 .
[28] M. Newman,et al. Finding community structure in networks using the eigenvectors of matrices. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[29] Nicolas Christin,et al. Dissecting one click frauds , 2010, CCS '10.
[30] Tom Crick,et al. Measuring UK crime gangs , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).
[31] Kathleen F. Brickey,et al. From Enron to WorldCom and Beyond: Life and Crime After Sarbanes-Oxley , 2003 .
[32] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[33] Thomas T. Hills,et al. Categorical structure among shared features in networks of early-learned nouns , 2009, Cognition.
[34] Tobun Dorbin Ng,et al. Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization , 2007, 2007 IEEE Intelligence and Security Informatics.
[35] M E J Newman,et al. Fast algorithm for detecting community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[36] Gavin C. Cawley,et al. Fast exact leave-one-out cross-validation of sparse least-squares support vector machines , 2004, Neural Networks.
[37] Matthieu Latapy,et al. Computing Communities in Large Networks Using Random Walks , 2004, J. Graph Algorithms Appl..
[38] Jean-Loup Guillaume,et al. Fast unfolding of communities in large networks , 2008, 0803.0476.
[39] Jean-Marc Petit,et al. Web Intelligence and Intelligent Agent Technology , 2011 .
[40] Benjamin C. M. Fung,et al. Mining Criminal Networks from Chat Log , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.
[41] Mao-Bin Hu,et al. Detect overlapping and hierarchical community structure in networks , 2008, ArXiv.
[42] K. K. Bhoyar,et al. Email Mining: A Review , 2012 .
[43] Xiuzhen Zhang,et al. Anomaly detection in online social networks , 2014, Soc. Networks.
[44] M. Newman,et al. Finding community structure in very large networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[45] Walter Didimo,et al. An advanced network visualization system for financial crime detection , 2011, 2011 IEEE Pacific Visualization Symposium.