From data to disruption
暂无分享,去创建一个
[1] Peter M. A. Sloot,et al. Towards understanding the behavior of physical systems using information theory , 2013 .
[2] Paul Duijn,et al. De brug tussen wetenschap en opsporingspraktijk , 2014 .
[3] P. Duijn,et al. Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement , 2014 .
[4] Richard Frank,et al. Terrorist and extremist organizations’ use of the Internet for recruitment , 2015 .
[5] Carlo Morselli,et al. Inside Criminal Networks , 2008 .
[6] D. M. Schwartz,et al. Using social network analysis to target criminal networks , 2009 .
[7] John H. Holland,et al. Emergence. , 1997, Philosophica.
[8] David Décary-Hétu,et al. Policing the Hackers by Hacking Them: Studying Online Deviants in IRC Chat Rooms , 2014 .
[9] Aili Malm,et al. Comparing the ties that bind criminal networks: Is blood thicker than water? , 2010 .
[10] Rick Quax,et al. The diminishing role of hubs in dynamical processes on complex networks , 2011, Journal of The Royal Society Interface.
[11] Peter M. A. Sloot,et al. Inference of the Russian Drug Community from One of the Largest Social Networks in the Russian Federation , 2016 .
[12] D. Cornish. THE PROCEDURAL ANALYSIS OF OFFENDING AND ITS RELEVANCE FOR SITUATIONAL PREVENTION , 1994 .
[13] Martin Bouchard,et al. On the Resilience of Illegal Drug Markets , 2007 .
[14] M. Natarajan. Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data , 2006 .
[15] Damián Zaitch,et al. The social embeddedness of organized crime , 2014 .
[16] Anthony Masys,et al. Networks and network analysis for defence and security , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[17] W. Bernasco,et al. Criminal groups and transnational illegal markets , 2004 .
[18] Franca van der Laan,et al. “Prison doesn’t stop them” Orchestrating criminal acts from behind bars , 2012 .
[19] Carlo Morselli,et al. The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.
[20] J. Raab,et al. Dark Networks as Organizational Problems: Elements of a Theory 1 , 2006 .
[21] Francesco Calderoni,et al. Identifying Mafia Bosses from Meeting Attendance , 2014 .
[22] Gisela Bichler,et al. Disrupting Criminal Networks : Network Analysis in Crime Prevention , 2015 .
[23] Cyrille Fijnaut,et al. Organized Crime in the Netherlands , 1998 .
[24] W. Ashby,et al. Requisite Variety and Its Implications for the Control of Complex Systems , 1991 .
[25] A. Graycar. Intelligence-led policing , 2005 .
[26] B. Erickson. Secret Societies and Social Structure , 1981 .
[27] Nicolas Christin,et al. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem , 2015, USENIX Security Symposium.
[28] P. Klerks. The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .
[29] David Bright,et al. Evolution of a drug trafficking network: Mapping changes in network structure and function across time , 2013 .
[30] P. Duijn,et al. The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.
[32] Ulrich Eggers,et al. Emergence From Chaos To Order , 2016 .
[33] Ben Shneiderman,et al. Integrating Statistics and Visualization for Exploratory Power: From Long-Term Case Studies to Design Guidelines , 2009, IEEE Computer Graphics and Applications.
[34] Carlo Morselli,et al. Law-Enforcement Disruption of a Drug Importation Network , 2006 .
[35] Martin Bouchard,et al. Strategies to Disrupt Online Child Pornography Networks , 2011, 2011 European Intelligence and Security Informatics Conference.
[36] David Décary-Hétu,et al. The social network of hackers , 2012 .
[37] Edward R. Kleemans,et al. Criminal Careers in Organized Crime and Social Opportunity Structure , 2008 .
[38] George Kampis,et al. The importance of centralities in dark network value chains , 2013 .
[39] R. Hulst. Introduction to Social Network Analysis (SNA) as an investigative tool , 2009 .
[40] Stelios Psarakis,et al. The Use of Indices in Surveys , 2006 .
[41] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .