Publisher
Springer Science and Business Media LLC
Subject
Law,Strategy and Management,Safety Research
Reference73 articles.
1. Allanach, J., Tu, H., Singh, S., Willett, P. and Pattipati, K. (2004) Detecting, tracking and counteracting terrorist networks via hidden Markov models. In: Proceedings of IEEE Aerospace Conference; 6–13 March, Big Sky, MT. IEEE Computer Society, pp. 3246–3257.
2. Amoore, L. and de Goede, M. (2008) Transactions after 9/11: The banal face of the preemptive strike. Transactions of the Institute of British Geographers 33 (2): 173–185.
3. Baker, J. (2012) European online counter-terrorism group considering widespread surveillance, http://www.pcadvisor.co.uk/news/internet/3399847/european-online-counter-terrorism-group-considering-widespread-surveillance/ , accessed 31 December 2012.
4. Barnes, J. and Harary, F. (1983) Graph theory in network analysis. Social Networks 5 (2): 235–244.
5. Bartal, A., Sasson, E. and Ravid, G. (2009) Predicting links in social networks using text mining and SNA. In: Proceedings International Conference on Advances in Social Networking and Mining; 20–22 July, Athens. ASONAM ’09. IEEE Computer Society, pp. 131–136.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献