Graph Structural Mining in Terrorist Networks
暂无分享,去创建一个
[1] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[2] P. Bonacich. Factoring and weighting approaches to status scores and clique identification , 1972 .
[3] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[4] S. Borgatti. The Key Player Problem , 2002 .
[5] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[6] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[7] Oliver Günther,et al. Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.
[8] D. Mcandrew. The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.
[9] Jeffrey Scott McIllwain,et al. Organized crime: A social network approach , 1999 .
[10] W. Baker,et al. THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .
[11] Hsinchun Chen,et al. Criminal network analysis and visualization , 2005, CACM.
[12] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[13] Hsinchun Chen,et al. Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network , 2005, ISI.
[14] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[15] Jay Liebowitz,et al. The synergy of social network analysis and knowledge mapping: a case study , 2006 .