메뉴 건너뛰기




Volumn 40, Issue , 2006, Pages 229-289

Intelligence and Security Informatics

Author keywords

[No Author keywords available]

Indexed keywords


EID: 28844486779     PISSN: 00664200     EISSN: None     Source Type: Book Series    
DOI: 10.1002/aris.1440400113     Document Type: Review
Times cited : (21)

References (171)
  • 3
    • 0036013593 scopus 로고    scopus 로고
    • Statistical mechanics of complex networks
    • Albert, R., & Barabási, A.-L. (2002). Statistical mechanics of complex networks. Reviews of Modern Physics, 74(1), 47-97.
    • (2002) Reviews of Modern Physics , vol.74 , Issue.1 , pp. 47-97
    • Albert, R.1    Barabási, A.-L.2
  • 5
    • 28844465409 scopus 로고    scopus 로고
    • Retrieved July 27, 2004
    • American Civil Liberties Union. (2004). MATRIX: Myths and reality. Retrieved July 27, 2004, from http://www.aclu.org/Privacy/Privacy.cfm?ID= 14894&c=130
    • (2004) MATRIX: Myths and Reality
  • 10
    • 84923618755 scopus 로고
    • The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry
    • Baker, W. E., & Faulkner, R. R. (1993). The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review, 58(12), 837-860.
    • (1993) American Sociological Review , vol.58 , Issue.12 , pp. 837-860
    • Baker, W.E.1    Faulkner, R.R.2
  • 11
    • 28844509692 scopus 로고    scopus 로고
    • Applying machine learning for high performance named-entity extraction
    • N. Cercone, K. Naruedomkul, & K. Kogure (Eds.). Waterloo, Ont.: Department of Computer Science, University of Waterloo
    • Baluja, S., Mittal, V., & Sukthankar, R. (1999). Applying machine learning for high performance named-entity extraction. In N. Cercone, K. Naruedomkul, & K. Kogure (Eds.), PACLING '99: Proceedings of the Conference (Pacific Association of Computational Linguistics) (pp. 1-14). Waterloo, Ont.: Department of Computer Science, University of Waterloo.
    • (1999) PACLING '99: Proceedings of the Conference (Pacific Association of Computational Linguistics) , pp. 1-14
    • Baluja, S.1    Mittal, V.2    Sukthankar, R.3
  • 12
    • 0002696312 scopus 로고    scopus 로고
    • Matching records in a national medical patient index
    • Bell, G. S., & Sethi, A. (2001). Matching records in a national medical patient index. Communications of the ACM, 44(9), 83-88.
    • (2001) Communications of the ACM , vol.44 , Issue.9 , pp. 83-88
    • Bell, G.S.1    Sethi, A.2
  • 15
    • 78650204155 scopus 로고    scopus 로고
    • NYU: Description of the MENE named entity system as used in MUC-7
    • Retrieved August 19, 2004
    • Borthwick, A., Sterling, J., Agichtein, E., & Grishman, R. (1998). NYU: Description of the MENE named entity system as used in MUC-7. Proceedings of the 7th Message Understanding Conference (MUC-7). Retrieved August 19, 2004, from http://www.itl.nist.gov/iaui/894.02/related_projects/muc/proceedings/ muc_7_proceedings/nyu_english_named_entity.pdf
    • (1998) Proceedings of the 7th Message Understanding Conference (MUC-7)
    • Borthwick, A.1    Sterling, J.2    Agichtein, E.3    Grishman, R.4
  • 16
    • 0028419282 scopus 로고
    • An expert system for police investigators of economic crimes
    • Bowen, J. E. (1994). An expert system for police investigators of economic crimes. Expert Systems with Applications, 7(2), 235-248.
    • (1994) Expert Systems with Applications , vol.7 , Issue.2 , pp. 235-248
    • Bowen, J.E.1
  • 17
    • 0032205202 scopus 로고    scopus 로고
    • AICAMS: Artificial Intelligence Crime Analysis and Management System
    • Brahan, J. W., Lam, K. P., Chan, H., & Leung, W. (1998). AICAMS: Artificial Intelligence Crime Analysis and Management System. Knowledge-Based Systems, 11, 355-361.
    • (1998) Knowledge-based Systems , vol.11 , pp. 355-361
    • Brahan, J.W.1    Lam, K.P.2    Chan, H.3    Leung, W.4
  • 19
    • 0032318658 scopus 로고    scopus 로고
    • The Regional Crime Analysis Program (RECAP): A framework for mining data to catch criminals
    • Piscataway, NJ: IEEE
    • Brown, D. E. (1998). The Regional Crime Analysis Program (RECAP): A framework for mining data to catch criminals. Proceedings of the 1998 International Conference on Systems, Man, and Cybernetics (Vol. 3, pp. 2848-2853). Piscataway, NJ: IEEE.
    • (1998) Proceedings of the 1998 International Conference on Systems, Man, and Cybernetics , vol.3 , pp. 2848-2853
    • Brown, D.E.1
  • 21
    • 0037208449 scopus 로고    scopus 로고
    • Data association methods with applications to law enforcement
    • Brown, D. E., & Hagen, S. (2002). Data association methods with applications to law enforcement. Decision Support Systems, 34(4), 369-378.
    • (2002) Decision Support Systems , vol.34 , Issue.4 , pp. 369-378
    • Brown, D.E.1    Hagen, S.2
  • 26
    • 84959779269 scopus 로고
    • Positions in networks
    • Burt, R. S. (1976). Positions in networks. Social Forces, 55, 93-122.
    • (1976) Social Forces , vol.55 , pp. 93-122
    • Burt, R.S.1
  • 30
    • 1942475668 scopus 로고    scopus 로고
    • Extracting meaningful entities from police narrative reports
    • Retrieved August 19, 2004
    • Chau, M., Xu, J., & Chen, H. (2002). Extracting meaningful entities from police narrative reports. Proceedings of the National Conference on Digital Government Research. Retrieved August 19, 2004, from http://www. digitalgovernment.org/library/library/pdf/chau2.pdf
    • (2002) Proceedings of the National Conference on Digital Government Research
    • Chau, M.1    Xu, J.2    Chen, H.3
  • 32
    • 1942500388 scopus 로고    scopus 로고
    • Crime data mining: A general framework and some examples
    • Chen, H., Chung, W., Xu, J., Wang, G., Chau, M., & Qin, Y. (2004). Crime data mining: A general framework and some examples. IEEE Computer, 37(4), 50-56.
    • (2004) IEEE Computer , vol.37 , Issue.4 , pp. 50-56
    • Chen, H.1    Chung, W.2    Xu, J.3    Wang, G.4    Chau, M.5    Qin, Y.6
  • 34
    • 0000352692 scopus 로고
    • Automatic construction of networks of concepts characterizing document databases
    • Chen, H., & Lynch, K. J. (1992). Automatic construction of networks of concepts characterizing document databases. IEEE Transactions on Systems, Man and Cybernetics, 22(5), 885-902.
    • (1992) IEEE Transactions on Systems, Man and Cybernetics , vol.22 , Issue.5 , pp. 885-902
    • Chen, H.1    Lynch, K.J.2
  • 42
    • 85120481005 scopus 로고    scopus 로고
    • Overview of MUC-7/MET-2
    • Retrieved August 19, 2004
    • Chinchor, N. A. (1998). Overview of MUC-7/MET-2. Proceedings of the 7th Message Understanding Conference (MUC-7). Retrieved August 19, 2004, from http://www.itl.nist.gov/iaui/894.02/related_projects/muc/proceedings/ muc_7_proceedings/overview.html
    • (1998) Proceedings of the 7th Message Understanding Conference (MUC-7)
    • Chinchor, N.A.1
  • 43
    • 4544335335 scopus 로고
    • Automated link analysis: Artificial intelligence-based tool for investigators
    • Coady, W. F. (1985). Automated link analysis: Artificial intelligence-based tool for investigators. Police Chief, 52(9), 22-23.
    • (1985) Police Chief , vol.52 , Issue.9 , pp. 22-23
    • Coady, W.F.1
  • 44
    • 0040674960 scopus 로고    scopus 로고
    • Advances in violent crime analysis and law enforcement: The Canadian violent crime linkage analysis system
    • Collins, P. I., Johnson, G. F., Choy, A., Davidson, K. T., & Mackay, R. E. (1998). Advances in violent crime analysis and law enforcement: The Canadian Violent Crime Linkage Analysis System. Journal of Government Information, 25(3), 277-284.
    • (1998) Journal of Government Information , vol.25 , Issue.3 , pp. 277-284
    • Collins, P.I.1    Johnson, G.F.2    Choy, A.3    Davidson, K.T.4    Mackay, R.E.5
  • 45
    • 20344384393 scopus 로고    scopus 로고
    • Social, ethical and legal issues of data mining
    • J. Wang (Ed.). Hershey, PA: Idea Group Publishing
    • Cook, J. S., & Cook, L. L. (2003). Social, ethical and legal issues of data mining. In J. Wang (Ed.), Data mining: Opportunities and challenges (pp. 395-420). Hershey, PA: Idea Group Publishing.
    • (2003) Data Mining: Opportunities and Challenges , pp. 395-420
    • Cook, J.S.1    Cook, L.L.2
  • 46
    • 0034019401 scopus 로고    scopus 로고
    • A comparative evaluation of approaches to urban crime pattern analysis
    • Craglia, M., Haining, R., & Wiles, P. (2000). A comparative evaluation of approaches to urban crime pattern analysis. Urban Studies, 37(4), 711-729.
    • (2000) Urban Studies , vol.37 , Issue.4 , pp. 711-729
    • Craglia, M.1    Haining, R.2    Wiles, P.3
  • 51
    • 0001765146 scopus 로고
    • An efficient algorithm for a complete link method
    • Defays, D. (1977). An efficient algorithm for a complete link method. Computer Journal, 20(4), 364-366.
    • (1977) Computer Journal , vol.20 , Issue.4 , pp. 364-366
    • Defays, D.1
  • 53
    • 34147120474 scopus 로고
    • A note on two problems in connection with graphs
    • Dijkstra, E. (1959). A note on two problems in connection with graphs. Numerische Mathematik, 1, 269-271.
    • (1959) Numerische Mathematik , vol.1 , pp. 269-271
    • Dijkstra, E.1
  • 58
    • 3342931840 scopus 로고    scopus 로고
    • Data mining techniques for autonomous exploration of large volumes of geo-referenced crime data
    • Retrieved August 19, 2004
    • Estivill-Castro, V., & Lee, I. (2001). Data mining techniques for autonomous exploration of large volumes of geo-referenced crime data. Proceedings of the 6th International Conference on GeoComputation. Retrieved August 19, 2004, from http://www.geocomputation.org/2001/papers/estivillcastro. pdf
    • (2001) Proceedings of the 6th International Conference on GeoComputation
    • Estivill-Castro, V.1    Lee, I.2
  • 59
    • 85129835356 scopus 로고
    • An organization-set model of interorganizational relations
    • M. Tuite, R. Chisholm, & M. Radnor (Eds.). Chicago: Aldine
    • Evan, W. M. (1972). An organization-set model of interorganizational relations. In M. Tuite, R. Chisholm, & M. Radnor (Eds.), Interorganizational decision-making (pp. 181-200). Chicago: Aldine.
    • (1972) Interorganizational Decision-making , pp. 181-200
    • Evan, W.M.1
  • 60
    • 0033446109 scopus 로고    scopus 로고
    • Using nation incident-based reporting system data for strategic crime analysis
    • Faggiani, D., & McLaughlin, C. (1999). Using nation incident-based reporting system data for strategic crime analysis. Journal of Quantitative Criminology, 15(2), 181-191.
    • (1999) Journal of Quantitative Criminology , vol.15 , Issue.2 , pp. 181-191
    • Faggiani, D.1    McLaughlin, C.2
  • 61
    • 0002389633 scopus 로고    scopus 로고
    • Automating the analysis and cataloging of sky surveys
    • U. Fayyad, G. Piatetsky-Shapiro, P. Smyth, & R. Uthurusamy (Eds.). Menlo Park, CA: AAAI Press
    • Fayyad, U. M., Djorgovshi, S. G., & Weir, N. (1996). Automating the analysis and cataloging of sky surveys. In U. Fayyad, G. Piatetsky-Shapiro, P. Smyth, & R. Uthurusamy (Eds.), Advances in knowledge discovery and data mining (pp. 471-493). Menlo Park, CA: AAAI Press.
    • (1996) Advances in Knowledge Discovery and Data Mining , pp. 471-493
    • Fayyad, U.M.1    Djorgovshi, S.G.2    Weir, N.3
  • 62
    • 0030285403 scopus 로고    scopus 로고
    • The KDD process for extracting useful knowledge from volumes of data
    • Fayyad, U., Piatetsk-Shapiro, G., & Smyth, P. (1996). The KDD process for extracting useful knowledge from volumes of data. Communications of the ACM, 39(11), 27-34.
    • (1996) Communications of the ACM , vol.39 , Issue.11 , pp. 27-34
    • Fayyad, U.1    Piatetsk-Shapiro, G.2    Smyth, P.3
  • 63
    • 33750177351 scopus 로고
    • Centrality in social networks: Conceptual clarification
    • Freeman, L. C. (1979). Centrality in social networks: Conceptual clarification. Social Networks, 1, 215-240.
    • (1979) Social Networks , vol.1 , pp. 215-240
    • Freeman, L.C.1
  • 65
    • 84977363017 scopus 로고
    • The analysis of spatial association by use of distance statistics
    • Getis, A., & Ord, J. K. (1992). The analysis of spatial association by use of distance statistics. Geographical Analysis, 24, 189-199.
    • (1992) Geographical Analysis , vol.24 , pp. 189-199
    • Getis, A.1    Ord, J.K.2
  • 67
    • 84976668719 scopus 로고
    • Using collaborative filtering to weave an information tapestry
    • Goldberg, D., Nichols, D., Oki, B., & Terry, D. (1992). Using collaborative filtering to weave an information tapestry. Communications of the ACM, 35(12), 61-69.
    • (1992) Communications of the ACM , vol.35 , Issue.12 , pp. 61-69
    • Goldberg, D.1    Nichols, D.2    Oki, B.3    Terry, D.4
  • 70
    • 28844464772 scopus 로고    scopus 로고
    • Information extraction
    • R. Mitkov (Ed.). New York: Oxford University Press
    • Grishman, R. (2003). Information extraction. In R. Mitkov (Ed.), The Oxford handbook of computational linguistics (pp. 545-559). New York: Oxford University Press.
    • (2003) The Oxford Handbook of Computational Linguistics , pp. 545-559
    • Grishman, R.1
  • 71
    • 84861298731 scopus 로고    scopus 로고
    • Detecting hot spots using cluster analysis and GIS
    • Retrieved August 19, 2004
    • Grubesic, T. H., & Murray, A. T. (2001). Detecting hot spots using cluster analysis and GIS. Proceedings of 2001 Crime Mapping Research Conference. Retrieved August 19, 2004, from http://www.ojp.usdoj.gov/nij/maps/Conferences/ 01conf/Grubesic.doc
    • (2001) Proceedings of 2001 Crime Mapping Research Conference
    • Grubesic, T.H.1    Murray, A.T.2
  • 72
    • 0036937227 scopus 로고    scopus 로고
    • Data integration through database federation
    • Haas, L. M. (2002). Data integration through database federation. IBM Systems Journal, 41(4), 578-596.
    • (2002) IBM Systems Journal , vol.41 , Issue.4 , pp. 578-596
    • Haas, L.M.1
  • 76
    • 0346487427 scopus 로고    scopus 로고
    • Information system integration
    • Hasselbring, W. (2000). Information system integration. Communications of the ACM, 43(6), 33-38.
    • (2000) Communications of the ACM , vol.43 , Issue.6 , pp. 33-38
    • Hasselbring, W.1
  • 77
    • 0013325845 scopus 로고    scopus 로고
    • Detecting payment card fraud with neural networks
    • P. J. G. Lisboa, A. Vellido, & B. Edisbury (Eds.). Singapore: World Scientific
    • Hassibi, K. (2000). Detecting payment card fraud with neural networks. In P. J. G. Lisboa, A. Vellido, & B. Edisbury (Eds.), Business applications of neural networks (pp. 141-158). Singapore: World Scientific.
    • (2000) Business Applications of Neural Networks , pp. 141-158
    • Hassibi, K.1
  • 79
    • 0002370418 scopus 로고
    • A tutorial on learning with Bayesian networks
    • M. Jordan (Ed.). Cambridge, MA: MIT Press
    • Heckerman, D. (1995). A tutorial on learning with Bayesian networks. In M. Jordan (Ed.), Learning in Graphical Models (pp. 301-354). Cambridge, MA: MIT Press.
    • (1995) Learning in Graphical Models , pp. 301-354
    • Heckerman, D.1
  • 81
    • 0036505670 scopus 로고    scopus 로고
    • A comparison of methods for multi-class support vector machines
    • Hsu, C. W., & Lin, C. J. (2002). A comparison of methods for multi-class support vector machines. IEEE Transactions on Neural Networks, 13, 415-425.
    • (2002) IEEE Transactions on Neural Networks , vol.13 , pp. 415-425
    • Hsu, C.W.1    Lin, C.J.2
  • 82
    • 0002930277 scopus 로고
    • Automated crime profiling
    • Icove, D. J. (1986). Automated crime profiling. Law Enforcement Bulletin, 55, 27-30.
    • (1986) Law Enforcement Bulletin , vol.55 , pp. 27-30
    • Icove, D.J.1
  • 83
    • 0012547271 scopus 로고    scopus 로고
    • Image segmentation using clustering
    • N. Ahuja & K. Bowyer (Eds.). Piscataway, NJ: IEEE Press
    • Jain, A. K., & Flynn, P. J. (1996). Image segmentation using clustering. In N. Ahuja & K. Bowyer (Eds.), Advances in image understanding (pp. 65-83). Piscataway, NJ: IEEE Press.
    • (1996) Advances in Image Understanding , pp. 65-83
    • Jain, A.K.1    Flynn, P.J.2
  • 85
    • 0036940651 scopus 로고    scopus 로고
    • Information integration: A research agenda
    • Jhingran, A. D., Mattos, N., & Pirahesh, H. (2002). Information integration: A research agenda. IBM Systems Journal, 41(4), 555-562.
    • (2002) IBM Systems Journal , vol.41 , Issue.4 , pp. 555-562
    • Jhingran, A.D.1    Mattos, N.2    Pirahesh, H.3
  • 86
    • 28844486722 scopus 로고    scopus 로고
    • Computer Aided Tracking and Characterization of Homicides and sexual assaults (CATCH)
    • J. Mena (Ed.). Amsterdam: Butterworth Heinemann
    • Kangas, L. J., Terrones, K. M., Keppel, R. D., & La Moria, R. D. (2003). Computer Aided Tracking and Characterization of Homicides and sexual assaults (CATCH). In J. Mena (Ed.), Investigative data mining for security and criminal detection (pp. 364-375). Amsterdam: Butterworth Heinemann.
    • (2003) Investigative Data Mining for Security and Criminal Detection , pp. 364-375
    • Kangas, L.J.1    Terrones, K.M.2    Keppel, R.D.3    La Moria, R.D.4
  • 89
    • 0242465495 scopus 로고    scopus 로고
    • The network paradigm applied to criminal organizations: Theoretical nit-picking or a relevant doctrine for investigators? Recent developments in the Netherlands
    • Klerks, P. (2001). The network paradigm applied to criminal organizations: Theoretical nit-picking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections, 24(3), 53-65.
    • (2001) Connections , vol.24 , Issue.3 , pp. 53-65
    • Klerks, P.1
  • 92
    • 0038401985 scopus 로고    scopus 로고
    • Mapping networks of terrorist cells
    • Krebs, V. E. (2001). Mapping networks of terrorist cells. Connections, 24(3), 43-52.
    • (2001) Connections , vol.24 , Issue.3 , pp. 43-52
    • Krebs, V.E.1
  • 93
    • 85120469168 scopus 로고    scopus 로고
    • IsoQuest Inc.: Description of the NetOwl text extractor system as used for MUC-7
    • Retrieved August 19, 2004
    • Krupka, G. R., & Hausman, K. (1998). IsoQuest Inc.: Description of the NetOwl text extractor system as used for MUC-7. Proceedings of the 7th Message Understanding Conference (MUC-7). Retrieved August 19, 2004, from http://www.itl.nist.gov/iaui/894.02/related_projects/muc/proceedings/ muc_7_proceedings/isoquest.pdf
    • (1998) Proceedings of the 7th Message Understanding Conference (MUC-7)
    • Krupka, G.R.1    Hausman, K.2
  • 94
    • 0007626881 scopus 로고    scopus 로고
    • A study of composite or hybrid classifiers for knowledge discovery
    • Kumar, A., & Olmeda, I. (1999). A study of composite or hybrid classifiers for knowledge discovery. INFORMS Journal on Computing, 11(3), 267-277.
    • (1999) INFORMS Journal on Computing , vol.11 , Issue.3 , pp. 267-277
    • Kumar, A.1    Olmeda, I.2
  • 96
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • Retrieved August 20, 2004
    • Lee, W., & Stolfo, S. (1998). Data mining approaches for intrusion detection. Proceedings of the 7th USENIX Security Symposium. Retrieved August 20, 2004, from http://citeseer.ist.psu.edu/cache/papers/cs/3327/http:zSzzSzwww. cs.columbia.eduzSz~wenkezSzpaperszSzusenix.pdf/lee98data.pdf
    • (1998) Proceedings of the 7th USENIX Security Symposium
    • Lee, W.1    Stolfo, S.2
  • 97
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Levenshtein, V. L. (1966). Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10, 707-710.
    • (1966) Soviet Physics Doklady , vol.10 , pp. 707-710
    • Levenshtein, V.L.1
  • 98
    • 28844460718 scopus 로고    scopus 로고
    • CrimeStat: A spatial statistics program for the analysis of crime incident locations
    • Levine, N. (2000). CrimeStat: A spatial statistics program for the analysis of crime incident locations. Crime Mapping News, 2(1), 8-9.
    • (2000) Crime Mapping News , vol.2 , Issue.1 , pp. 8-9
    • Levine, N.1
  • 102
    • 0001964443 scopus 로고
    • Structural equivalence of individuals in social networks
    • Lorrain, F. P., & White, H. C. (1971). Structural equivalence of individuals in social networks. Journal of Mathematical Sociology, 1, 49-80.
    • (1971) Journal of Mathematical Sociology , vol.1 , pp. 49-80
    • Lorrain, F.P.1    White, H.C.2
  • 106
    • 20344393500 scopus 로고    scopus 로고
    • The structural analysis of criminal networks
    • D. Canter & L. Alison (Eds.). Dartmouth, UK: Aldershot
    • McAndrew, D. (1999). The structural analysis of criminal networks. In D. Canter & L. Alison (Eds.), The social psychology of crime: Groups, teams, and networks (pp. 53-94). Dartmouth, UK: Aldershot.
    • (1999) The Social Psychology of Crime: Groups, Teams, and Networks , pp. 53-94
    • McAndrew, D.1
  • 108
    • 0002297105 scopus 로고
    • Conditional logit analysis of qualitative choice behavior
    • P. Zarembka, (Ed.). New York: Academic Press
    • McFadden, D. (1973). Conditional logit analysis of qualitative choice behavior. In P. Zarembka, (Ed.), Frontiers of econometrics (pp. 105-142). New York: Academic Press.
    • (1973) Frontiers of Econometrics , pp. 105-142
    • McFadden, D.1
  • 111
    • 76549254593 scopus 로고
    • Notes on continuous stochastic phenomena
    • Moran, P. A. P. (1950). Notes on continuous stochastic phenomena. Biometrika, 37, 17-23.
    • (1950) Biometrika , vol.37 , pp. 17-23
    • Moran, P.A.P.1
  • 115
  • 117
    • 0029514351 scopus 로고
    • Local spatial autocorrelation statistics: Distributional issues and an application
    • Ord, J. K., & Getis, A. (1995). Local spatial autocorrelation statistics: Distributional issues and an application. Geographical Analysis, 27, 286-296.
    • (1995) Geographical Analysis , vol.27 , pp. 286-296
    • Ord, J.K.1    Getis, A.2
  • 119
    • 0038724910 scopus 로고    scopus 로고
    • Disease surveillance and the academic, clinical, and public health communities
    • Retrieved August 19, 2004
    • Pinner, R. W., Rebmann, C. A., Schuchat, A., & Hughes, J. M. (2003). Disease surveillance and the academic, clinical, and public health communities. Emerging Infectious Diseases, 9(7). Retrieved August 19, 2004, from http://www.cdc.gov/ncidod/eid/vol9no7/03-0083.htm
    • (2003) Emerging Infectious Diseases , vol.9 , Issue.7
    • Pinner, R.W.1    Rebmann, C.A.2    Schuchat, A.3    Hughes, J.M.4
  • 120
    • 33744584654 scopus 로고
    • Induction of decision trees
    • Quinlan, J. R. (1986). Induction of decision trees. Machine Learning, 1, 86-106.
    • (1986) Machine Learning , vol.1 , pp. 86-106
    • Quinlan, J.R.1
  • 123
    • 0035657983 scopus 로고    scopus 로고
    • A survey of approaches to automatic schema matching
    • Rahm, E., & Bernstein, P. A. (2001). A survey of approaches to automatic schema matching. The VLDB Journal, 10, 334-350.
    • (2001) The VLDB Journal , vol.10 , pp. 334-350
    • Rahm, E.1    Bernstein, P.A.2
  • 124
    • 0000019005 scopus 로고
    • Clustering algorithms
    • W. B. Frakes & R. Baeza-Yates (Eds.). Englewood Cliffs, NJ: Prentice Hall
    • Rasmussen, E. (1992). Clustering algorithms. In W. B. Frakes & R. Baeza-Yates (Eds.), Information retrieval: Data structures and algorithms (pp. 419-442). Englewood Cliffs, NJ: Prentice Hall.
    • (1992) Information Retrieval: Data Structures and Algorithms , pp. 419-442
    • Rasmussen, E.1
  • 125
    • 0003116602 scopus 로고    scopus 로고
    • Hotbeds of crime and the search for spatial accuracy
    • Ratchliffe, J. H., & McCullagh, M. J. (1999). Hotbeds of crime and the search for spatial accuracy. Journal of Geographical Systems, 1(4), 385-398.
    • (1999) Journal of Geographical Systems , vol.1 , Issue.4 , pp. 385-398
    • Ratchliffe, J.H.1    McCullagh, M.J.2
  • 128
  • 129
    • 0001785560 scopus 로고
    • Overview: Multivariate spatial profiles as a tool in crime investigation
    • C. R. Block, M. Dabdoub, & S. Fregly (Eds.). Washington, DC: Police Executive Research Forum
    • Rossmo, D. K. (1995). Overview: Multivariate spatial profiles as a tool in crime investigation. In C. R. Block, M. Dabdoub, & S. Fregly (Eds.), Crime analysis through computer mapping (pp. 65-97). Washington, DC: Police Executive Research Forum.
    • (1995) Crime Analysis Through Computer Mapping , pp. 65-97
    • Rossmo, D.K.1
  • 131
    • 84898944587 scopus 로고    scopus 로고
    • Intrusion detection with neural networks
    • M. I. Jordan, M. J. Kearns, & S. A. Solla (Eds.). Cambridge, MA: MIT Press
    • Ryan, J., Lin, M., & Mikkulainen, R. (1998). Intrusion detection with neural networks. In M. I. Jordan, M. J. Kearns, & S. A. Solla (Eds.), Advances in neural information processing systems (pp. 943-949). Cambridge, MA: MIT Press.
    • (1998) Advances in Neural Information Processing Systems , pp. 943-949
    • Ryan, J.1    Lin, M.2    Mikkulainen, R.3
  • 132
    • 20344364026 scopus 로고    scopus 로고
    • A structural analysis of fraud and armed robbery networks in Norway
    • Retrieved August 20, 2004
    • Saether, M., & Canter, D. V. (2001). A structural analysis of fraud and armed robbery networks in Norway. Proceedings of the 6th International Investigative Psychology Conference. Retrieved August 20, 2004, from http://www.i-psy.com/conferences/sixth/multimedia/powerPoint/saether/saether.htm
    • (2001) Proceedings of the 6th International Investigative Psychology Conference
    • Saether, M.1    Canter, D.V.2
  • 133
    • 84903667395 scopus 로고    scopus 로고
    • Philadelphia: University of Pennsylvania Press
    • Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania Press.
    • (2004) Understanding Terror Networks
    • Sageman, M.1
  • 134
    • 0035521221 scopus 로고    scopus 로고
    • Bayesian models for early warning of bank failures
    • Sarkar, S., & Sriram, R. S. (2001). Bayesian models for early warning of bank failures. Management Science, 47(11), 1457-1475.
    • (2001) Management Science , vol.47 , Issue.11 , pp. 1457-1475
    • Sarkar, S.1    Sriram, R.S.2
  • 136
    • 84861290371 scopus 로고    scopus 로고
    • Spatial crime displacement resulting from large-scale urban renewal programs in the city of Baltimore, MD: A GIS modeling approach
    • Retrieved August 19, 2004
    • Schumacher, B. J., & Leitner, M. (1999). Spatial crime displacement resulting from large-scale urban renewal programs in the city of Baltimore, MD: A GIS modeling approach. Proceedings of the 4th International Conference on GeoComputation. Retrieved August 19, 2004, from http://www.geocomputation.org/ 1999/047/gc_047.htm
    • (1999) Proceedings of the 4th International Conference on GeoComputation
    • Schumacher, B.J.1    Leitner, M.2
  • 137
    • 28844464771 scopus 로고    scopus 로고
    • The computer meets medicine and biology: Emergence of a discipline
    • K. J. Hannah & M. J. Ball (Eds.). New York: Springer-Verlag
    • Shortliffe, E. H., & Blois, M. S. (2000). The computer meets medicine and biology: Emergence of a discipline. In K. J. Hannah & M. J. Ball (Eds.), Health informatics (pp. 1-40). New York: Springer-Verlag.
    • (2000) Health Informatics , pp. 1-40
    • Shortliffe, E.H.1    Blois, M.S.2
  • 138
    • 11344285341 scopus 로고    scopus 로고
    • Beyond market baskets: Generalizing association rules to dependence rules
    • Silverstein, C., Brin, S., & Motwani, R. (1998). Beyond market baskets: Generalizing association rules to dependence rules. Data Mining and Knowledge Discovery, 2, 39-68.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , pp. 39-68
    • Silverstein, C.1    Brin, S.2    Motwani, R.3
  • 139
    • 0012254042 scopus 로고
    • The application of network analysis to criminal intelligence: An assessment of the prospects
    • Sparrow, M. K. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251-274.
    • (1991) Social Networks , vol.13 , pp. 251-274
    • Sparrow, M.K.1
  • 142
    • 0142120236 scopus 로고    scopus 로고
    • Information and the war against terrorism (Part II): Were American intelligence and law enforcement effectively positioned to protect the public?
    • Strickland, L. S. (2002b). Information and the war against terrorism (Part II): Were American intelligence and law enforcement effectively positioned to protect the public? Bulletin of the American Society for Information Science and Technology, 28(3), 18-22.
    • (2002) Bulletin of the American Society for Information Science and Technology , vol.28 , Issue.3 , pp. 18-22
    • Strickland, L.S.1
  • 143
    • 0142088659 scopus 로고    scopus 로고
    • Information and the war against terrorism (Part III): New information-related laws and the impact on civil liberties
    • Strickland, L. S. (2002c). Information and the war against terrorism (Part III): New information-related laws and the impact on civil liberties. Bulletin of the American Society for Information Science and Technology, 29(3), 23-27.
    • (2002) Bulletin of the American Society for Information Science and Technology , vol.29 , Issue.3 , pp. 23-27
    • Strickland, L.S.1
  • 144
    • 0142024865 scopus 로고    scopus 로고
    • Information and the war against terrorism (Part IV): Civil liberties vs. security in the age of terrorism
    • Strickland, L. S. (2002d). Information and the war against terrorism (Part IV): Civil liberties vs. security in the age of terrorism. Bulletin of the American Society for Information Science and Technology, 28(4), 9-13.
    • (2002) Bulletin of the American Society for Information Science and Technology , vol.28 , Issue.4 , pp. 9-13
    • Strickland, L.S.1
  • 148
    • 0033874603 scopus 로고    scopus 로고
    • Comparing noun phrasing techniques for use with medical digital library tools
    • Tolle, K. M., & Chen, H. (2000). Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science, 51(4), 352-370.
    • (2000) Journal of the American Society for Information Science , vol.51 , Issue.4 , pp. 352-370
    • Tolle, K.M.1    Chen, H.2
  • 149
    • 84950351930 scopus 로고
    • Multidimensional scaling: Theory and method
    • Torgerson, W. S. (1952). Multidimensional scaling: Theory and method. Psychometrika, 17, 401-419.
    • (1952) Psychometrika , vol.17 , pp. 401-419
    • Torgerson, W.S.1
  • 153
    • 0011450426 scopus 로고    scopus 로고
    • Washington DC: Office of Homeland Security. Retrieved August 19, 2004
    • U.S. Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington DC: Office of Homeland Security. Retrieved August 19, 2004, from http://www.whitehouse.gov/homeland/book/nat_s trat_hls.pdf
    • (2002) National Strategy for Homeland Security
  • 155
    • 1942443495 scopus 로고    scopus 로고
    • Automatically detecting deceptive criminal identities
    • Wang, G., Chen, H., & Atabakhsh, H. (2004). Automatically detecting deceptive criminal identities. Communications of the ACM, 47(3), 71-76.
    • (2004) Communications of the ACM , vol.47 , Issue.3 , pp. 71-76
    • Wang, G.1    Chen, H.2    Atabakhsh, H.3
  • 161
    • 0016606093 scopus 로고
    • Mendenhall's studies of word-length distribution in the works of Shakespeare and Bacon
    • Williams, C. (1975). Mendenhall's studies of word-length distribution in the works of Shakespeare and Bacon. Biometrika, 62, 207-212.
    • (1975) Biometrika , vol.62 , pp. 207-212
    • Williams, C.1
  • 164
    • 28844509691 scopus 로고    scopus 로고
    • Criminal network analysis and visualization: A data mining perspective
    • in press
    • Xu, J., & Chen, H. (in press). Criminal network analysis and visualization: A data mining perspective. Communications of the ACM.
    • Communications of the ACM
    • Xu, J.1    Chen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.