Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism
暂无分享,去创建一个
Hsinchun Chen | Marc Sageman | Edna Reid | Jennifer Jie Xu | Yilu Zhou | Jialun Qin | Wingyan Chung | Robert P. Schumaker | Hsinchun Chen | J. Xu | E. Reid | Jialun Qin | Yilu Zhou | M. Sageman | Wingyan Chung
[1] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[2] Oliver A. McBryan,et al. GENVL and WWWW: Tools for taming the Web , 1994, WWW Spring 1994.
[3] Kenneth Mark Colby,et al. Artificial Paranoia , 1975, Artif. Intell..
[4] S. Boorman,et al. Social structure from multiple networks: I , 1976 .
[5] Anil K. Jain,et al. Algorithms for Clustering Data , 1988 .
[6] Oren Etzioni,et al. Multi-Service Search and Comparison Using the MetaCrawler , 1995 .
[7] D. Mcandrew. The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.
[8] H. White,et al. STRUCTURAL EQUIVALENCE OF INDIVIDUALS IN SOCIAL NETWORKS , 1977 .
[9] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[10] Oren Etzioni,et al. Multi-Engine Search and Comparison Using the MetaCrawler , 1995, World Wide Web J..
[11] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[12] Antonella De Angeli,et al. The unfriendly user: exploring social reactions to chatterbots , 2001 .
[13] Ray J. Paul,et al. Fitting the jigsaw of citation: Information visualization in domain analysis , 2001, J. Assoc. Inf. Sci. Technol..
[14] E. Cohen. Making the Nation Safer: The Role of Science and Technology in Countering Terrorism , 2002 .
[15] Hsinchun Chen,et al. Comparing noun phrasing techniques for use with medical digital library tools , 2000 .
[16] Hsinchun Chen,et al. Using sentence-selection heuristics to rank text segments in TXTRACTOR , 2002, JCDL '02.
[17] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[18] P. Arabie,et al. An algorithm for clustering relational data with applications to social network analysis and comparison with multidimensional scaling , 1975 .
[19] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[20] S. Boorman,et al. Social Structure from Multiple Networks. I. Blockmodels of Roles and Positions , 1976, American Journal of Sociology.
[21] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[22] W. Baker,et al. THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .
[23] Kevin W Boyack,et al. Mapping knowledge domains: Characterizing PNAS , 2004, Proceedings of the National Academy of Sciences of the United States of America.
[24] Gang Wang,et al. Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort) , 2004, J. Assoc. Inf. Sci. Technol..
[25] Gerard Salton,et al. Recent trends in automatic information retrieval , 1986, SIGIR '86.
[26] E. O. F. Reid,et al. Evolution of a Body of Knowledge: An Analysis of Terrorism Research , 1997, Inf. Process. Manag..
[27] A. Silke. The Devil You Know: Continuing Problems with Research on Terrorism , 2001 .
[28] Fionn Murtagh,et al. A Survey of Recent Advances in Hierarchical Clustering Algorithms , 1983, Comput. J..
[29] K. J. Lynch,et al. Automatic construction of networks of concepts characterizing document databases , 1992, IEEE Trans. Syst. Man Cybern..
[30] C. Lee Giles,et al. Accessibility of information on the Web , 2000, INTL.
[31] Martha Crenshaw,et al. The Psychology of Terrorism: An Agenda for the 21st Century , 2000 .
[32] Destabilizing networks , 2002 .
[33] Joseph Weizenbaum,et al. and Machine , 1977 .