COPLINK: managing law enforcement data and knowledge
Communications of the ACM
CrimeNet explorer: a framework for criminal network knowledge discovery
ACM Transactions on Information Systems (TOIS)
The centrality and prestige of CACM
Communications of the ACM - 50th anniversary issue: 1958 - 2008
Graph Structural Mining in Terrorist Networks
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Privacy-preserving social network analysis for criminal investigations
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Using importance flooding to identify interesting networks of criminal activity
Journal of the American Society for Information Science and Technology
Jigsaw: supporting investigative analysis through interactive visualization
Information Visualization
The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Temporal evolution of social networks in Paltalk™
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Analysis of terrorist social networks with fractal views
Journal of Information Science
SSnetViz: a visualization engine for heterogeneous semantic social networks
Proceedings of the 11th International Conference on Electronic Commerce
Expert Systems with Applications: An International Journal
Practical privacy-preserving protocols for criminal investigations
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Practical algorithms for subgroup detection in covert networks
International Journal of Business Intelligence and Data Mining
Community detection in scale-free networks based on hypergraph model
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
A proposed data mining approach for internet auction fraud detection
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Investigative data mining for counterterrorism
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Analysis of dynamic social network: e-mail messages exchange network
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Hiding in plain sight: criminal network analysis
Computational & Mathematical Organization Theory
Visual analysis of financial crimes: [system paper]
Proceedings of the International Conference on Advanced Visual Interfaces
PutMode: prediction of uncertain trajectories in moving objects databases
Applied Intelligence
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Mining typical features for highly cited papers
Scientometrics
Visual analysis of implicit social networks for suspicious behavior detection
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications: Part II
Analysis of temporal evolution of social networks
Journal of Mobile Multimedia
Robustness of dynamic social networks
Journal of Mobile Multimedia
Visualization of semantic network fragments using multistripe layout
RSFDGrC'11 Proceedings of the 13th international conference on Rough sets, fuzzy sets, data mining and granular computing
Public security: simulations need to replace conventional wisdom
Proceedings of the 2011 workshop on New security paradigms workshop
Analyzing the terrorist social networks with visualization tools
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Recovering social networks from contagion information
TAMC'10 Proceedings of the 7th annual conference on Theory and Applications of Models of Computation
Analyzing terrorist networks: a case study of the global salafi jihad network
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
ICADL'06 Proceedings of the 9th international conference on Asian Digital Libraries: achievements, Challenges and Opportunities
A social network analysis approach to detecting suspicious online financial activities
SBP'10 Proceedings of the Third international conference on Social Computing, Behavioral Modeling, and Prediction
An overview of social network analysis
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
Evolutionary Community Detection for Observing Covert Political Elite Cliques
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Hi-index | 0.00 |
A new generation of data mining tools and applications work to unearth hidden patterns in large volumes of crime data.