Visual Analysis of Implicit Social Networks for Suspicious Behavior Detection
暂无分享,去创建一个
Amyn Bennamane | Hakim Hacid | Arnaud Ansiaux | Alain Cagnati | Hakim Hacid | A. Bennamane | A. Ansiaux | A. Cagnati
[1] Detlef Schoder,et al. Web Science 2.0: Identifying Trends through Semantic Social Network Analysis , 2008, 2009 International Conference on Computational Science and Engineering.
[2] Bruce H. McCormick,et al. Visualization: expanding scientific and engineering research opportunities , 1989, Computer.
[3] Tamara Munzner,et al. TopoLayout: Multilevel Graph Layout by Topological Features , 2007, IEEE Transactions on Visualization and Computer Graphics.
[4] Danah Boyd,et al. Vizster: visualizing online social networks , 2005, IEEE Symposium on Information Visualization, 2005. INFOVIS 2005..
[5] Dino Pedreschi,et al. Mining Mobility Behavior from Trajectory Data , 2009, 2009 International Conference on Computational Science and Engineering.
[6] Krishna P. Gummadi,et al. You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.
[7] Laks V. S. Lakshmanan,et al. On Query Spreadsheets , 1998, ICDE 1998.
[8] Yossi Matias,et al. Suggesting friends using the implicit social graph , 2010, KDD.
[9] Ching-Yung Lin,et al. On the quality of inferring interests from social neighbors , 2010, KDD.
[10] Laks V. S. Lakshmanan,et al. Learning influence probabilities in social networks , 2010, WSDM '10.
[11] Matthew Richardson,et al. Mining knowledge-sharing sites for viral marketing , 2002, KDD.
[12] B. John Oommen,et al. Anomaly Detection in Dynamic Social Systems Using Weak Estimators , 2009, 2009 International Conference on Computational Science and Engineering.
[13] Owen Rambow,et al. Predicting Interests of People on Online Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[14] Hsinchun Chen,et al. Criminal network analysis and visualization , 2005, CACM.
[15] Ben Shneiderman,et al. Systematic yet flexible discovery: guiding domain experts through exploratory data analysis , 2008, IUI '08.
[16] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .