Approaches to analyze cyber terrorist communities: Survey and challenges
暂无分享,去创建一个
Henda Hajjami Ben Ghézala | Khaled Salah | Zouheir Trabelsi | Firas Saidi | K. Salah | Z. Trabelsi | H. Ghézala | Firas Saidi
[1] Mustafa Emirbayer,et al. Network Analysis, Culture, and the Problem of Agency , 1994, American Journal of Sociology.
[2] Douglas H. Harris,et al. The Application of Link Analysis to Police Intelligence , 1975 .
[3] Phipps Arabie,et al. Constructing blockmodels: How and why , 1978 .
[4] David Knoke,et al. Emerging Trends in Social Network Analysis of Terrorism and Counterterrorism , 2015 .
[5] Richard M. Medina,et al. Social Network Analysis: A case study of the Islamist terrorist network , 2012, Security Journal.
[6] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[7] Fionn Murtagh,et al. A Survey of Recent Advances in Hierarchical Clustering Algorithms , 1983, Comput. J..
[8] Ronald S. Burt,et al. Network items and the general social survey , 1984 .
[9] Cliff Goddard,et al. Semantic Analysis: A Practical Introduction , 1998 .
[10] James E. Yonamine,et al. A nuanced study of political conflict using the Global Datasets of Events Location and Tone (GDELT) dataset , 2013 .
[11] Didier Dubois,et al. A Brief Overview of Possibilistic Logic , 1991, ECSQARU.
[12] Michael I. Jordan,et al. Supervised learning from incomplete data via an EM approach , 1993, NIPS.
[13] Stephen J. Ressler. Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .
[14] P. Bonacich. Factoring and weighting approaches to status scores and clique identification , 1972 .
[15] H. White,et al. “Structural Equivalence of Individuals in Social Networks” , 2022, The SAGE Encyclopedia of Research Design.
[16] Kerri Morgan,et al. Certificates of Factorisation for a Class of Triangle-Free Graphs , 2009, Electron. J. Comb..
[17] Lotfi A. Zadeh,et al. Toward a generalized theory of uncertainty (GTU)--an outline , 2005, Inf. Sci..
[18] Lillian Lee,et al. Opinion Mining and Sentiment Analysis , 2008, Found. Trends Inf. Retr..
[19] Gary LaFree,et al. Introducing the Global Terrorism Database , 2007 .
[20] Alex Bavelas,et al. Communication Patterns in Task‐Oriented Groups , 1950 .
[21] S. Karthika,et al. Analyzing Various Social Networking Approaches for Covert Networks , 2011 .
[22] Hsinchun Chen,et al. A concept space approach to addressing the vocabulary problem in scientific information retrieval: an experiment on the worm community system , 1997 .
[23] Uffe Kock Wiil,et al. CrimeFighter Assistant - A Knowledge Management Tool for Terrorist Network Analysis , 2010, KMIS.
[24] Christian Borgelt,et al. Possibilistic Graphical Models , 2000, Computational Intelligence in Data Mining.
[25] Nancy Roberts,et al. Strategies for Combating Dark Networks , 2011, J. Soc. Struct..
[26] J. Nieminen. On the centrality in a graph. , 1974, Scandinavian journal of psychology.
[27] Sean F. Everton. Network Topography, Key Players and Terrorist Networks , 2009 .
[28] Sam Mullins,et al. An exploratory, dynamic application of Social Network Analysis for modelling the development of Islamist terror‐cells in the West , 2010 .
[29] Jaideep Srivastava,et al. Incremental page rank computation on evolving graphs , 2005, WWW '05.
[30] Joseph A. Gallian,et al. A Dynamic Survey of Graph Labeling , 2009, The Electronic Journal of Combinatorics.
[31] Ellen M. Voorhees,et al. Implementing agglomerative hierarchic clustering algorithms for use in document retrieval , 1986, Inf. Process. Manag..
[32] Gerra Gilberto,et al. Dr. Gilberto Gerra, Chief of Drug Prevention and Health Branch, Division for Operations, United Nations Office on Drugs and Crime (UNODC), Vienna. , 2013 .
[33] Nasrullah Memon,et al. Analyzing news summaries for identification of terrorism incident type , 2014 .
[34] Bernhard Rieder,et al. Studying Facebook via data extraction: the Netvizz application , 2013, WebSci.
[35] Damon McCoy,et al. Constructing and Analyzing Criminal Networks , 2014, 2014 IEEE Security and Privacy Workshops.
[36] Hsinchun Chen,et al. Criminal network analysis and visualization , 2005, CACM.
[37] S. Koschade. A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .
[38] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[39] John Scott. What is social network analysis , 2010 .
[40] Shouyang Wang,et al. Network analysis of terrorist activities , 2014, J. Syst. Sci. Complex..
[41] Nasrullah Memon,et al. Practical Algorithms for Destabilizing Terrorist Networks , 2006, ISI.
[42] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[43] Sean F. Everton,et al. Detecting significant changes in dark networks , 2013 .
[44] Ted E. Senator,et al. Restructuring Databases for Knowledge Discovery by Consolidation and Link Formation , 1995, KDD.
[45] Eliane Tschaen Barbieri,et al. The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign , 2012 .
[46] Nisha Chaurasia,et al. A Survey on Terrorist Network Mining: Current Trends and Opportunities , 2012 .
[47] Pankaj Choudhary,et al. A Survey on Social Network Analysis for Counter- Terrorism , 2015 .
[48] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[49] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[50] Thomas Hofmann,et al. Unsupervised Learning by Probabilistic Latent Semantic Analysis , 2004, Machine Learning.
[51] Garth Davies,et al. Discovering bin-Laden’s Replacement in al-Qaeda, using Social Network Analysis: A Methodological Investigation , 2014 .
[52] P. Klerks. The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .