Analyzing Various Social Networking Approaches for Covert Networks
暂无分享,去创建一个
[1] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[2] Kathleen M. Carley,et al. NETEST: Estimating a Terrorist Network's Structure—Graduate Student Best Paper Award, CASOS 2002 Conference , 2002, Comput. Math. Organ. Theory.
[3] Hsinchun Chen,et al. Using Shortest Path Algorithms to Identify Criminal Associations , 2002, DG.O.
[4] S. Borgatti. The Key Player Problem , 2002 .
[5] Kathleen M. Carley,et al. NETEST: Estimating a Terrorist Network's Structure , 2002 .
[6] Paul S. Fischbeck,et al. Estimating the Shape of Covert Networks , 2003 .
[7] Aparna Basu,et al. Application of Social Network Analysis (SNA) to terrorist networks in Jammu & Kashmir , 2004 .
[8] Hsinchun Chen,et al. Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks , 2004, Decis. Support Syst..
[9] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[10] Kathleen M. Carley. Estimating Vulnerabilities in Large Covert Networks , 2004 .
[11] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[12] Nasrullah Memon,et al. Notice of Violation of IEEE Publication PrinciplesPractical approaches for analysis, visualization and destabilizing terrorist networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[13] Christopher C. Yang,et al. Analyzing the Terrorist Social Networks with Visualization Tools , 2006, ISI.
[14] Rebecca Goolsby,et al. Combating terrorist networks: An evolutionary approach , 2006, Comput. Math. Organ. Theory.
[15] Kathleen M. Carley. A Dynamic Network Approach to the Assessment of Terrorist Groups and the Impact of Alternative Courses of Action , 2006 .
[16] Stephen J. Ressler. Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .
[17] Yukio Ohsawa,et al. Analyzing covert social network foundation behind terrorism disaster , 2007, ArXiv.
[18] Yukio Ohsawa,et al. Node discovery problem for a social network , 2007, ArXiv.
[19] Hsinchun Chen,et al. Automated criminal link analysis based on domain knowledge , 2007, J. Assoc. Inf. Sci. Technol..
[20] Tobun Dorbin Ng,et al. Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization , 2007, 2007 IEEE Intelligence and Security Informatics.
[21] Hsinchun Chen,et al. Uncovering the dark Web: A case study of Jihad on the Web , 2008 .
[22] Shou-De Lin,et al. Discovering and Explaining Abnormal Nodes in Semantic Graphs , 2008, IEEE Transactions on Knowledge and Data Engineering.
[23] Kathleen M. Carley,et al. Social Network Change Detection , 2008 .
[24] David L. Hicks,et al. Notice of Violation of IEEE Publication PrinciplesDetecting high-value individuals in covert networks: 7/7 London bombing case study , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[25] Brian Delaney,et al. Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition , 2009, 2009 IEEE Aerospace conference.
[26] Uffe Kock Wiil,et al. Knowledge Management Processes, Tools and Techniques for Counterterrorism , 2009, KMIS.
[27] N. Memon,et al. Notice of Violation of IEEE Publication PrinciplesNovel Algorithms for Subgroup Detection in Terrorist Networks , 2009, 2009 International Conference on Availability, Reliability and Security.
[28] S. Appavu alias Balamurugan,et al. Data mining based intelligent analysis of threatening e-mail , 2009, Knowl. Based Syst..
[29] Arian Spahiu,et al. Bootstrapping a Terrorist Network , 2010 .
[30] Christopher E. Hutchins,et al. Hiding in plain sight: criminal network analysis , 2010, Comput. Math. Organ. Theory.
[31] Tossapon Boongoen,et al. Disclosing false identity through hybrid link analysis , 2010, Artificial Intelligence and Law.
[32] Abraham Kandel,et al. Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS) , 2010 .