-
1
-
-
4544373848
-
Security works
-
Anderson, T., Arbetter, L., Benawides, A., and Longmore-Etheridge, A. Security works. Security Management 38, 17, (1994), 17-20.
-
(1994)
Security Management
, vol.38
, Issue.17
, pp. 17-20
-
-
Anderson, T.1
Arbetter, L.2
Benawides, A.3
Longmore-Etheridge, A.4
-
2
-
-
84923618755
-
The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry
-
Baker, W.E. and Faulkner, R.R. The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Amer. Sociological Rev. 58, 2 (1993), 837-860.
-
(1993)
Amer. Sociological Rev.
, vol.58
, Issue.2
, pp. 837-860
-
-
Baker, W.E.1
Faulkner, R.R.2
-
3
-
-
0442298972
-
COPLINK: Managing law enforcement data and knowledge
-
Jan.
-
Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., and Schroeder, J. COPLINK: Managing law enforcement data and knowledge. Commun. ACM 46, 1 (Jan. 2003), 28-34.
-
(2003)
Commun. ACM
, vol.46
, Issue.1
, pp. 28-34
-
-
Chen, H.1
Zeng, D.2
Atabakhsh, H.3
Wyzga, W.4
Schroeder, J.5
-
4
-
-
0001070640
-
A heuristic for graph drawing
-
Eades, P. A heuristic for graph drawing. Congressus Numerantium 42 (1984), 149-160.
-
(1984)
Congressus Numerantium
, vol.42
, pp. 149-160
-
-
Eades, P.1
-
6
-
-
0016494374
-
The application of link analysis to police intelligence
-
Harper, W.R., and Harris, D.H. The application of link analysis to police intelligence. Human Factors 17, 2 (1975), 157-164.
-
(1975)
Human Factors
, vol.17
, Issue.2
, pp. 157-164
-
-
Harper, W.R.1
Harris, D.H.2
-
7
-
-
0242465495
-
The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands
-
Klerks, P. The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24, 3 (2001), 53-65.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 53-65
-
-
Klerks, P.1
-
8
-
-
0038401985
-
Mapping networks of terrorist cells
-
Krebs, V. E. Mapping networks of terrorist cells. Connections 24, 3 (2001), 43-52.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 43-52
-
-
Krebs, V.E.1
-
9
-
-
20344393500
-
The structural analysis of criminal networks
-
D. Canter and L. Alison (Eds.). Aldershot, Dartmouth
-
McAndrew, D. The structural analysis of criminal networks. The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. D. Canter and L. Alison (Eds.). Aldershot, Dartmouth (1999).
-
(1999)
The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III
-
-
McAndrew, D.1
-
10
-
-
0012254042
-
The application of network analysis to criminal intelligence: An assessment of the prospects
-
Sparrow, M.K. The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks 13 (1991), 251-274.
-
(1991)
Social Networks
, vol.13
, pp. 251-274
-
-
Sparrow, M.K.1
-
11
-
-
0003948494
-
-
Cambridge University Press, Cambridge, MA
-
Wasserman, S., and Faust, K. Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge, MA, 1994.
-
(1994)
Social Network Analysis: Methods and Applications
-
-
Wasserman, S.1
Faust, K.2
-
12
-
-
20344363304
-
CrimeNet explorer: A framework for criminal network knowledge discovery
-
Xu, J., and Chen, H. CrimeNet explorer: A framework for criminal network knowledge discovery. To appear in ACM Trans. on Info. Systems.
-
ACM Trans. on Info. Systems
-
-
Xu, J.1
Chen, H.2
|