How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks
暂无分享,去创建一个
[1] Nasrullah Memon,et al. Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining , 2006, ADMA.
[2] David L. Hicks,et al. Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies , 2008, ISI Workshops.
[3] David L. Hicks,et al. Notice of Violation of IEEE Publication PrinciplesDetecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[4] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[5] Nasrullah Memon. A First Look on iMiner' s Knowledge Base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network , 2007, IMECS.
[6] Mary Derosa,et al. Data mining and data analysis for counterterrorism , 2004 .
[7] Alain Degenne,et al. Introducing Social Networks , 1999 .
[8] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994 .
[9] Peter R. Monge,et al. Theories of Communication Networks , 2003 .
[10] D. Mcandrew. The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.
[11] L. Freeman,et al. On human social intelligence , 1988 .
[12] Mark S. Granovetter. Network Sampling: Some First Steps , 1976, American Journal of Sociology.
[13] W. Baker,et al. THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .
[14] John Arquilla,et al. What Next for Networks and Netwars , 2001 .
[15] Jesus Mena,et al. Investigative Data Mining for Security and Criminal Detection , 2002 .
[16] D. West. Introduction to Graph Theory , 1995 .
[17] Mark S. Granovetter. T H E S T R E N G T H O F WEAK TIES: A NETWORK THEORY REVISITED , 1983 .
[18] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.
[19] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .