Investigative data mining and its application in counterterrorism
暂无分享,去创建一个
[1] Homa Atabakhsh,et al. MANAGING LAW ENFORCEMENT DATA AND KNOWLEDGE , 2003 .
[2] Ted E. Senator,et al. Restructuring Databases for Knowledge Discovery by Consolidation and Link Formation , 1995, KDD.
[3] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[4] Douglas H. Harris,et al. The Application of Link Analysis to Police Intelligence , 1975 .
[5] Jesus Mena,et al. Investigative Data Mining for Security and Criminal Detection , 2002 .
[6] Paul R. Pillar. Counterterrorism after Al Qaeda , 2004 .
[7] Richards J. Heuer,et al. Psychology of Intelligence Analysis , 1999 .
[8] Sherry Marcus,et al. Graph-based technologies for intelligence analysis , 2004, CACM.
[9] C. Lawrence. The Social Psychology of Crime: Groups, Teams and Networks , 2000 .
[10] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[11] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[12] Nasrullah Memon,et al. Investigative Data Mining: A General Framework , 2004, International Conference on Computational Intelligence.
[13] Hsinchun Chen,et al. COPLINK: managing law enforcement data and knowledge , 2003, CACM.
[14] Jeffrey Heer,et al. prefuse: a toolkit for interactive information visualization , 2005, CHI.
[15] D. Ruppert. The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .
[16] D. Mcandrew. The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.
[17] P. Klerks. The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .