Propose a Framework for Criminal Mining by Web Structure and Content Mining
暂无分享,去创建一个
Hamed Taherdoost | Suriayati Chuprat | Amin Shahraki Moghaddam | Javad Hosseinkhani | Hamed Taherdoost | A. S. Moghaddam | J. Hosseinkhani | S. Chuprat
[1] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[2] SangKeun Lee,et al. Fractional PageRank Crawler: Prioritizing URLs Efficiently for Crawling Important Pages Early , 2009, DASFAA.
[3] Mitsuru Ishizuka,et al. Ranking Companies on the Web Using Social Network Mining , 2009 .
[4] Michael Sannella,et al. Constraint satisfaction and debugging for interactive user interfaces , 1994 .
[5] Sandip Debnath,et al. Automatic extraction of informative blocks from webpages , 2005, SAC '05.
[6] Song Ji-hua. A Method of Text Classifier for Focused Crawler , 2010 .
[7] Philip Tavel,et al. Modeling and Simulation Design , 2011 .
[8] Bernd Fröhlich,et al. The cubic mouse: a new device for three-dimensional input , 2000, CHI.
[9] David B. Skillicorn,et al. Novel information discovery for intelligence and counterterrorism , 2007, Decis. Support Syst..
[10] Tobun Dorbin Ng,et al. Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization , 2007, 2007 IEEE Intelligence and Security Informatics.
[11] A. Vrij. Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice , 2000 .
[12] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[13] Laura K. Guerrero,et al. Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .
[14] Padmini Srinivasan,et al. Text mining: Generating hypotheses from MEDLINE , 2004, J. Assoc. Inf. Sci. Technol..
[15] A. Z. Spector,et al. Achieving application requirements , 1990 .
[16] Hongyuan Zha,et al. Probabilistic models for discovering e-communities , 2006, WWW '06.
[17] Gary Marchionini,et al. A study on video browsing strategies , 1997 .
[18] Hamed Taherdoost,et al. Criminal Network Mining by Web Structure and Content Mining , 2012 .
[19] Amr M. Youssef,et al. Mining criminal networks from unstructured text documents , 2012, Digit. Investig..
[20] Larry L. Peterson,et al. Reasoning about naming systems , 1993, TOPL.
[21] George Forman,et al. An Extensive Empirical Study of Feature Selection Metrics for Text Classification , 2003, J. Mach. Learn. Res..
[22] Rohini K. Srihari,et al. A Text Mining Model for Hypothesis Generation , 2007, 19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007).
[23] Hsinchun Chen,et al. An International Perspective on Fighting Cybercrime , 2003, ISI.
[24] Ramasamy Uthurusamy,et al. EVOLVING DATA MINING INTO SOLUTIONS FOR INSIGHTS , 2002 .
[25] Hong Hua,et al. A widget framework for augmented interaction in SCAPE , 2003, UIST '03.
[26] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[27] Yuen-Tak Yu,et al. A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions , 2006, J. Syst. Softw..
[28] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[29] Ravinder Singh,et al. Research on the Application of Web Mining Technique Based on XML for Unstructured Web Data Using LINQ , 2011 .
[30] David G. Stork,et al. Pattern Classification , 1973 .
[31] Junghoo Cho,et al. RankMass crawler: a crawler with high personalized pagerank coverage guarantee , 2007, VLDB 2007.
[32] Rohini K. Srihari,et al. A Text Mining Model for Hypothesis Generation , 2007 .
[33] Hideaki Takeda,et al. An integrated method for social network extraction , 2006, WWW '06.
[34] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[35] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .