CrimeFighter: A Toolbox for Counterterrorism
暂无分享,去创建一个
[1] Uffe Kock Wiil,et al. Knowledge Management Processes, Tools and Techniques for Counterterrorism , 2009, KMIS.
[2] David V. Canter,et al. Prioritizing Burglars: Comparing the Effectiveness of Geographical Profiling Methods , 2007 .
[3] Lisa Tompson,et al. Crime Mapping Case Studies: Practice and Research , 2008 .
[4] Claus Atzenbeck,et al. Supporting reasoning and communication for intelligence officers , 2011, Int. J. Netw. Virtual Organisations.
[5] Gabriele Suder,et al. Corporate Strategies under International Terrorism and Adversity , 2006 .
[6] Mason A. Carpenter,et al. Social Network Theory and Methods as Tools for Helping Business Confront Global Terrorism: Capturing the Case and Contingencies Presented by Dark Social Networks , 2006 .
[7] Jennifer Xu,et al. Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs , 2008 .
[8] James J. Thomas,et al. Defining Insight for Visual Analytics , 2009, IEEE Computer Graphics and Applications.
[9] Yan Zhao,et al. Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis , 2006, Tenth International Conference on Information Visualisation (IV'06).
[10] Frank M. Shipman,et al. The visual knowledge builder: a second generation spatial hypertext , 2001, HYPERTEXT '01.
[11] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[12] Uffe Kock Wiil,et al. Asap: a planning tool for agile software development , 2008, HT '08.
[13] Keith Devlin,et al. The Numbers Behind NUMB3RS: Solving Crime with Mathematics , 2007 .
[14] Torsten Suel,et al. Design and implementation of a high-performance distributed Web crawler , 2002, Proceedings 18th International Conference on Data Engineering.
[15] Ben Shneiderman,et al. Balancing Systematic and Flexible Exploration of Social Networks , 2006, IEEE Transactions on Visualization and Computer Graphics.
[16] Douglas C. Engelbart,et al. Augmenting human intellect: a conceptual framework , 1962 .
[17] François Fages,et al. Principles and Practice of Semantic Web Reasoning, Third International Workshop, PPSWR 2005, Dagstuhl Castle, Germany, September 11-16, 2005, Proceedings , 2005, PPSWR.
[18] Ryan Hafen,et al. Generating Synthetic Syndromic-Surveillance Data for Evaluating Visual-Analytics Techniques , 2009, IEEE Computer Graphics and Applications.
[19] D. Kim Rossmo,et al. Geographic Profiling Analysis: Principles, Methods and Applications , 2008 .
[20] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[21] D. Kim Rossmo,et al. Geographic profiling applied to testing models of bumble-bee foraging , 2008, Journal of The Royal Society Interface.
[22] Daniel Zeng,et al. Syndromic surveillance systems , 2008, Annual Review of Information Science and Technology.
[23] Nasrullah Memon. Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks , 2007 .
[24] Danah Boyd,et al. Vizster: visualizing online social networks , 2005, IEEE Symposium on Information Visualization, 2005. INFOVIS 2005..
[25] Hsinchun Chen,et al. Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security , 2008 .
[26] Claus Atzenbeck,et al. Harvesting covert networks: a case study of the iMiner database , 2011, Int. J. Netw. Virtual Organisations.
[27] Georg Lausen,et al. Information Gathering in a Dynamic World , 2006, PPSWR.
[28] Craig Bennell,et al. Geographic Profiling of Terrorist Attacks , 2008 .
[29] Richard N Kocsis,et al. Criminal profiling : international theory, research and practice , 2007 .
[30] John T. Stasko,et al. Jigsaw: Supporting Investigative Analysis through Interactive Visualization , 2007, 2007 IEEE Symposium on Visual Analytics Science and Technology.
[31] Jesus Mena,et al. Investigative Data Mining for Security and Criminal Detection , 2002 .
[32] Mohammed Badrul Alam,et al. Perceptions of Japanese students on terrorism and other security problems: Initial results from a pilot study , 2003 .