Extracting Social Structure from DarkWeb Forums
暂无分享,去创建一个
[1] Claus Atzenbeck,et al. Proceedings of the 2009 IEEE international conference on Intelligence and security informatics , 2009 .
[2] Wenji Mao,et al. Intelligence and Security Informatics: Research Frameworks , 2013, Intelligence and Security Informatics.
[3] Darren J Wilkinson,et al. Bayesian parameter inference for stochastic biochemical network models using particle Markov chain Monte Carlo , 2011, Interface Focus.
[4] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[5] A. Vázquez,et al. Network clustering coefficient without degree-correlation biases. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Christopher C. Yang,et al. Analyzing the Terrorist Social Networks with Visualization Tools , 2006, ISI.
[7] Sadie Creese,et al. Applying Social Network Analysis to Security , 2015 .
[8] Sebastián A. Ríos,et al. Topic-based social network analysis for virtual communities of interests in the Dark Web , 2010, ISI-KDD '10.
[9] Kathy Crilley. Information warfare: new battle fields Terrorists, propaganda and the Internet , 2001 .
[10] Hsinchun Chen,et al. Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[11] Phyllis B. Gerstenfeld,et al. Hate Online: A Content Analysis of Extremist Internet Sites , 2003 .
[12] Coenraad Bron,et al. Finding all cliques of an undirected graph , 1973 .
[13] Hsinchun Chen,et al. The topology of dark networks , 2008, Commun. ACM.
[14] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[15] S. B. Lyerly. The average spearman rank correlation coefficient , 1952 .
[16] Philip Sedgwick,et al. Pearson’s correlation coefficient , 2012, BMJ : British Medical Journal.
[17] Stefan Richter,et al. Centrality Indices , 2004, Network Analysis.
[18] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[19] Hsinchun Chen,et al. US domestic extremist groups on the Web: link and content analysis , 2005, IEEE Intelligent Systems.
[20] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[21] Grace S. Shieh. A weighted Kendall's tau statistic , 1998 .
[22] C. Bron,et al. Algorithm 457: finding all cliques of an undirected graph , 1973 .
[23] T. Stevens. Regulating the ‘Dark Web’: How a Two-Fold Approach can Tackle Peer-to-Peer Radicalisation , 2009 .
[24] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[25] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.
[26] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[27] Lise Getoor,et al. Link mining: a survey , 2005, SKDD.
[28] Hsinchun Chen. Dark Web Forum Portal , 2012 .