Multimode co-clustering for analyzing terrorist networks
暂无分享,去创建一个
[1] Panagiotis Symeonidis,et al. Product recommendation and rating prediction based on multi-modal social networks , 2011, RecSys '11.
[2] Christopher C. Yang,et al. Analyzing the Terrorist Social Networks with Visualization Tools , 2006, ISI.
[3] Chunju Tseng,et al. Incorporating Geographical Contacts into Social Network Analysis for Contact Tracing in Epidemiology: A Study on Taiwan SARS Data , 2007, BioSurveillance.
[4] Ted E. Senator,et al. Countering terrorism through information technology , 2004, CACM.
[5] Huan Liu,et al. Community detection via heterogeneous interaction analysis , 2012, Data Mining and Knowledge Discovery.
[6] Peter J. Carrington,et al. Crime and Social Network Analysis , 2014 .
[7] Herbert Hamers,et al. The Influence of Secrecy on the Communication Structure of Covert Networks , 2008, Soc. Networks.
[8] William Ribarsky,et al. Visual analysis of entity relationships in the Global Terrorism Database , 2008, SPIE Defense + Commercial Sensing.
[9] Zheng Chen,et al. Latent semantic analysis for multiple-type interrelated data objects , 2006, SIGIR.
[10] Carlo Morselli,et al. The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.
[11] Pasquale De Meo,et al. Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..
[12] Václav Snásel,et al. Visual investigation of similarities in Global Terrorism Database by means of synthetic social networks , 2011, 2011 International Conference on Computational Aspects of Social Networks (CASoN).
[13] Huan Liu,et al. Uncoverning Groups via Heterogeneous Interaction Analysis , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[14] Stephen J. Ressler. Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .
[15] Nancy Roberts,et al. Strategies for Combating Dark Networks , 2011, J. Soc. Struct..
[16] Pontus Svenson,et al. The HiTS/ISAC Social Network Analysis Tool , 2012, 2012 European Intelligence and Security Informatics Conference.
[17] Jian-Ping Mei,et al. A Fuzzy Approach for Multitype Relational Data Clustering , 2012, IEEE Transactions on Fuzzy Systems.
[18] Abdul Rasool Qureshi,et al. Design and development of an early warning system to prevent terrorist attacks , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[19] Tina Eliassi-Rad,et al. Visual Analysis of Large Heterogeneous Social Networks by Semantic and Structural Abstraction , 2006 .
[20] Huan Liu,et al. Identifying Evolving Groups in Dynamic Multimode Networks , 2012, IEEE Transactions on Knowledge and Data Engineering.
[21] Lise Getoor,et al. Relational clustering for multi-type entity resolution , 2005, MRDM '05.
[22] Hsinchun Chen,et al. Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity , 2007, Int. J. Hum. Comput. Stud..
[23] Christopher C. Yang. Knowledge Discovery and Information Visualization for Terrorist Social Networks , 2008, Intelligence and Security Informatics.
[24] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[25] Adam Blake,et al. TOURISM CRISIS MANAGEMENT: US Response to September 11 , 2003 .
[26] George A. Barnett,et al. An examination of the relationship between international telecommunication networks, terrorism and global news coverage , 2013, Social Network Analysis and Mining.
[27] Christopher C. Yang,et al. Analysis of terrorist social networks with fractal views , 2009, J. Inf. Sci..
[28] Jiawei Han,et al. Mining Query-Based Subnetwork Outliers in Heterogeneous Information Networks , 2014, 2014 IEEE International Conference on Data Mining.
[29] Shyam Varan Nath,et al. Crime Pattern Detection Using Data Mining , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.
[30] Huan Liu,et al. Relational learning via latent social dimensions , 2009, KDD.
[31] Philip S. Yu,et al. Spectral clustering for multi-type relational data , 2006, ICML.
[32] Uffe Kock Wiil,et al. CrimeFighter: A Toolbox for Counterterrorism , 2009, IC3K.
[33] Cécile Favre,et al. Information diffusion in online social networks: a survey , 2013, SGMD.
[34] Chong-Wah Ngo,et al. Co-Clustering of Time-Evolving News Story with Transcript and Keyframe , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[35] Fatih Özgül,et al. How Much Similar Are Terrorists Networks of Istanbul? , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[36] Philip S. Yu,et al. A probabilistic framework for relational clustering , 2007, KDD '07.
[37] Aparna Basu. Social Network Analysis: A Methodology for Studying Terrorism , 2014 .
[38] Ying Gao,et al. A Two-Stage Clustering Algorithm for Multi-type Relational Data , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.
[39] Niklas Elmqvist,et al. Visual Analytics for Multimodal Social Network Analysis: A Design Study with Social Scientists , 2013, IEEE Transactions on Visualization and Computer Graphics.
[40] Juyun Wang,et al. A Novel Method of Centrality in Terrorist Network , 2014, 2014 Seventh International Symposium on Computational Intelligence and Design.
[41] Hsinchun Chen,et al. Identity matching using personal and social identity features , 2011, Inf. Syst. Frontiers.
[42] Yun Chi,et al. On evolutionary spectral clustering , 2009, TKDD.
[43] Hsinchun Chen,et al. The topology of dark networks , 2008, Commun. ACM.
[44] Le Gruenwald,et al. Using an ontology to improve search in a terrorism database system , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[45] Sergej Sizov,et al. GeoFolk: latent spatial semantics in web 2.0 social media , 2010, WSDM '10.
[46] Inderjit S. Dhillon,et al. Co-clustering documents and words using bipartite spectral graph partitioning , 2001, KDD '01.
[47] Feiping Nie,et al. Nonnegative Matrix Tri-factorization Based High-Order Co-clustering and Its Fast Implementation , 2011, 2011 IEEE 11th International Conference on Data Mining.
[48] Hongjun Lu,et al. ReCoM: reinforcement clustering of multi-type interrelated data objects , 2003, SIGIR.
[49] A. Perliger,et al. Social Network Analysis in the Study of Terrorism and Political Violence , 2011, PS: Political Science & Politics.
[50] A. Perliger,et al. The Changing Nature of Suicide Attacks - A Social Network Perspective , 2006, Social Forces.
[51] Huan Liu,et al. Discovering Overlapping Groups in Social Media , 2010, 2010 IEEE International Conference on Data Mining.
[52] Marc Cheong,et al. A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter , 2011, Inf. Syst. Frontiers.
[53] Philip Vos Fellman,et al. Modeling Terrorist Networks: The Second Decade , 2015 .
[54] Brian Delaney,et al. Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition , 2009, 2009 IEEE Aerospace conference.
[55] A. Hoffman,et al. Lower bounds for the partitioning of graphs , 1973 .
[56] Edward A. Fox,et al. Link fusion: a unified link analysis framework for multi-type interrelated data objects , 2004, WWW '04.
[57] Veda C. Storey,et al. Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..
[58] Huan Liu,et al. Community evolution in dynamic multi-mode networks , 2008, KDD.
[59] Laura K. Siebeneck,et al. Spatial and Temporal Analyses of Terrorist Incidents in Iraq, 2004–2006 , 2009 .
[60] Paulo Cesar G. da Costa,et al. Modeling a probabilistic ontology for Maritime Domain Awareness , 2011, 14th International Conference on Information Fusion.
[61] H. Raghav Rao,et al. Information control and terrorism: Tracking the Mumbai terrorist attack through twitter , 2011, Inf. Syst. Frontiers.
[62] Nasrullah Memon,et al. Evolution of Terrorist Network Using Clustered Approach: A Case Study , 2011, 2011 European Intelligence and Security Informatics Conference.
[63] Jian Xu,et al. Fuzzy clustering and iterative relational classification for terrorist profiling , 2008, 2008 IEEE International Conference on Granular Computing.
[64] D.M. Mount,et al. An Efficient k-Means Clustering Algorithm: Analysis and Implementation , 2002, IEEE Trans. Pattern Anal. Mach. Intell..