Author:
Schroeder Jennifer,Xu Jennifer,Chen Hsinchun
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Ali, M., Kamoun, F.: Neural networks for shortest path computation and routing in computer networks. IEEE Transactions on Neural Networks, Vol. 4, No. 5. (1993) 941–953.
2. Anderson, T., Arbetter, L., Benawides, A., Longmore-Etheridge, A.: Security works. Security Management, Vol. 38, No. 17. (1994) 17–20.
3. Blair, D. C., Maron, M. E.: An evaluation of retrieval effectiveness for a full-text document-retrieval system. Communications of the ACM, Vol. 28, No. 3. (1985) 289–299.
4. Chen, H., Lynch, K. J.: Automatic construction of networks of concepts characterizing document database. IEEE Transaction on Systems, Man and Cybernetics, Vol. 22, No. 5. (1992) 885–902.
5. Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., Schroeder, J.: COPLINK: Managing law enforcement data and knowledge. Communications of the ACM, Vol. 46, No. 1. (2003) 28–34.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Big data analytics for security and criminal investigations;WIREs Data Mining and Knowledge Discovery;2017-05-12
2. By investigation, I mean computation;Trends in Organized Crime;2016-06-30
3. Early Identification of Violent Criminal Gang Members;Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining;2015-08-10
4. Social network intelligence analysis to combat street gang violence;Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining;2013-08-25
5. Data Mining in the Investigation of Money Laundering and Terrorist Financing;Data Mining;2013