-
1
-
-
0038718854
-
The structure and function of complex networks
-
M. E. J. Newman, "The structure and function of complex networks," Siam Review, vol. 45, no. 2, pp. 167-256, 2003.
-
(2003)
Siam Review
, vol.45
, Issue.2
, pp. 167-256
-
-
Newman, M.E.J.1
-
2
-
-
0242663598
-
Why social networks are different from other types of networks
-
M. E. J. Newman and P. Juyong, "Why social networks are different from other types of networks," Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), vol. 68, no. 3, pp. 36122-1-8, 2003.
-
(2003)
Physical Review E (Statistical, Nonlinear, and Soft Matter Physics)
, vol.68
, Issue.3
-
-
Newman, M.E.J.1
Juyong, P.2
-
3
-
-
0042855693
-
An experimental study of search in global social networks
-
P. S. Dodds, R. Muhamad, and D. J. Watts, "An experimental study of search in global social networks," Science, vol. 301, no. 5634, pp. 827-829, 2003.
-
(2003)
Science
, vol.301
, Issue.5634
, pp. 827-829
-
-
Dodds, P.S.1
Muhamad, R.2
Watts, D.J.3
-
4
-
-
84930064585
-
Hierarchical organization in complex networks
-
Ravasz and A. L. Barabasi, "Hierarchical organization in complex networks," Physical Review E, vol. 67, no. 2, pp. 26112-1-7, 2003.
-
(2003)
Physical Review E
, vol.67
, Issue.2
-
-
Ravasz1
Barabasi, A.L.2
-
5
-
-
42749098473
-
Growing network with local rules: Preferential attachment, clustering hierarchy, and degree correlations
-
Statistical, Nonlinear, and Soft Matter Physics
-
Alexei Vazquez, "Growing network with local rules: Preferential attachment, clustering hierarchy, and degree correlations," Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), vol. 67, no. 5, pp. 056104-15, 2003.
-
(2003)
Physical Review E
, vol.67
, Issue.5
, pp. 56104-56115
-
-
Vazquez, A.1
-
6
-
-
1842616539
-
Self-similar community structure in a network of human interactions
-
R. Guimera, L. Danon, A. Diaz-Guilera, F. Giralt, and A. Arenas, "Self-similar community structure in a network of human interactions," Physical Review E, vol. 68, no. 6, 2003.
-
(2003)
Physical Review E
, vol.68
, Issue.6
-
-
Guimera, R.1
Danon, L.2
Diaz-Guilera, A.3
Giralt, F.4
Arenas, A.5
-
7
-
-
3042801860
-
Modeling email communications
-
Y. J. Tsai, C. C. Lin, and P. N. Hsiao, "Modeling email communications," Ieice Transactions on Information and Systems, vol. E87D, no. 6, pp. 1438-1445, 2004.
-
(2004)
Ieice Transactions on Information and Systems
, vol.E87D
, Issue.6
, pp. 1438-1445
-
-
Tsai, Y.J.1
Lin, C.C.2
Hsiao, P.N.3
-
8
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world' networks," Nature, vol. 393, no. 6684, pp. 440-442, 1998.
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, J.1
Strogatz, S.H.2
-
9
-
-
0038483826
-
Emergence of scaling in random networks
-
L. Barabasi and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439, pp. 509-512, 1999.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabasi, L.1
Albert, R.2
-
10
-
-
42749099621
-
Properties of highly clustered networks
-
M. E. J. Newman, "Properties of highly clustered networks," Physical Review E, vol. 68, no. 2, 2003.
-
(2003)
Physical Review E
, vol.68
, Issue.2
-
-
Newman, M.E.J.1
-
12
-
-
0035475794
-
Structure of growing social networks
-
pp. art. no.-046132
-
M. Jin, M. Girvan, and M. E. J. Newman, "Structure of growing social networks," Physical Review E, vol. 6404, no. 4, pp. art. no.-046132, 2001.
-
(2001)
Physical Review E
, vol.6404
, Issue.4
-
-
Jin, M.1
Girvan, M.2
Newman, M.E.J.3
-
15
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
M. Schonlau, W. DuMouchel, W. H. Ju, A. F. Karr, M. Theus, and Y. Vardi, "Computer intrusion: Detecting masquerades," Statistical Science, vol. 16, no. 1, pp. 58-74, 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
16
-
-
1942436338
-
Masquerade detection augmented with error analysis
-
R. A. Maxion and T. N. Townsend, "Masquerade detection augmented with error analysis," IEEE Transactions on Reliability, vol. 53, no. 1, pp. 124-147, 2004.
-
(2004)
IEEE Transactions on Reliability
, vol.53
, Issue.1
, pp. 124-147
-
-
Maxion, R.A.1
Townsend, T.N.2
-
17
-
-
35248897174
-
An approach for detecting self-propagating email using anomaly detection
-
vol. 2820 of Lecture Notes in Computer Science. SPRINGER-VERLAG BERLIN, Berlin
-
Gupta and R. Sekar, "An approach for detecting self-propagating email using anomaly detection," in Recent Advances in Intrusion Detection, Proceedings, vol. 2820 of Lecture Notes in Computer Science, pp. 55-72. SPRINGER-VERLAG BERLIN, Berlin, 2003.
-
(2003)
Recent Advances in Intrusion Detection, Proceedings
, pp. 55-72
-
-
Gupta1
Sekar, R.2
-
18
-
-
35248848239
-
A behavior-based approach to securing email systems
-
Computer Network Security. SPRINGER-VERLAG BERLIN, Berlin
-
S. J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern, and C. W. Hu, "A behavior-based approach to securing email systems," in Computer Network Security, vol. 2776 of Lecture Notes in Computer Science, pp. 57-81. SPRINGER-VERLAG BERLIN, Berlin, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2776
, pp. 57-81
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.W.5
-
19
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
Washington, DC, USA, ACM Press
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou, "Specification-based anomaly detection: a new approach for detecting network intrusions," in 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2002, pp. 265-274, ACM Press.
-
(2002)
9th ACM Conference on Computer and Communications Security
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
20
-
-
84976668743
-
Finding all cliques of an undirected graph
-
C. Bron and J. Kerbosch, "Finding all cliques of an undirected graph," Communications of the ACM, vol. 16, no. 9, pp. 575-577, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.9
, pp. 575-577
-
-
Bron, C.1
Kerbosch, J.2
-
22
-
-
33745498517
-
Applications of fuzzy data mining methods for intrusion detection systems
-
Computational Science and Its Applications - Iccsa 2004, Pt 3. SPRINGER-VERLAG BERLIN, Berlin
-
J. Guan, D. X. Liu, and T. Wang, "Applications of fuzzy data mining methods for intrusion detection systems," in Computational Science and Its Applications - Iccsa 2004, Pt 3, vol. 3045 of Lecture Notes in Computer Science, pp. 706-714. SPRINGER-VERLAG BERLIN, Berlin, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3045
, pp. 706-714
-
-
Guan, J.1
Liu, D.X.2
Wang, T.3
-
23
-
-
33745501614
-
Neural network based anomaly detection in computer networks: A novel training paradigm
-
Las Vegas, NV, ISCA, Cary, NC
-
R. Sharafat, M. Rasti, and A. Yazdian, "Neural network based anomaly detection in computer networks: a novel training paradigm," in ISCA 16th International Conference: Computer Applications in Industry and Engineering, Las Vegas, NV, 2003, pp. 50-53, ISCA, Cary, NC.
-
(2003)
ISCA 16th International Conference: Computer Applications in Industry and Engineering
, pp. 50-53
-
-
Sharafat, R.1
Rasti, M.2
Yazdian, A.3
-
24
-
-
10044260457
-
-
Viewed 24 February 2005
-
Python Programming Language, 2005, Viewed 24 February 2005, http://www.python.org/.
-
(2005)
Python Programming Language
-
-
-
27
-
-
34147118994
-
Toward an adequate taxonomy of personality attributes: Replicated factor structure in peer nomination personality ratings
-
W. T. Norman, "Toward an adequate taxonomy of personality attributes: Replicated factor structure in peer nomination personality ratings," Journal of Abnormal and Social Psychology, vol. 66, pp. 574-583, 1963.
-
(1963)
Journal of Abnormal and Social Psychology
, vol.66
, pp. 574-583
-
-
Norman, W.T.1
-
30
-
-
33745509301
-
-
Viewed 24 February 2005
-
Jython Programming Language, 2005, Viewed 24 February 2005, http://www.jython.org/.
-
(2005)
Jython Programming Language
-
-
-
32
-
-
0001262839
-
Biological dimensions of personality
-
L. A. Pervin, Ed.
-
H. J. Eysenck, "Biological dimensions of personality," in. Handbook of personality: Theory and research, L. A. Pervin, Ed., 1990a, pp. 244-276.
-
(1990)
Handbook of Personality: Theory and Research
, pp. 244-276
-
-
Eysenck, H.J.1
-
33
-
-
8344230714
-
A model for personality and emotion simulation
-
Knowledge-Based Intelligent Information and Engineering Systems, Pt 1, Proceedings. Berlin: SPRINGER-VERLAG BERLIN
-
A. Egges, S. Kshirsagar, and N. Magnenat-Thalmann, "A model for personality and emotion simulation," in Knowledge-Based Intelligent Information and Engineering Systems, Pt 1, Proceedings, vol. 2773, Lecture Notes in Artificial Intelligence. Berlin: SPRINGER-VERLAG BERLIN, 2003, pp. 453-461.
-
(2003)
Lecture Notes in Artificial Intelligence
, vol.2773
, pp. 453-461
-
-
Egges, A.1
Kshirsagar, S.2
Magnenat-Thalmann, N.3
-
34
-
-
17044417371
-
Generic personality and emotion simulation for conversational agents
-
A. Egges, S. Kshirsagar, and N. Magnenat-Thalmann, "Generic personality and emotion simulation for conversational agents," Computer Animation and Virtual Worlds, vol. 15, no. 1, pp. 1-13, 2004.
-
(2004)
Computer Animation and Virtual Worlds
, vol.15
, Issue.1
, pp. 1-13
-
-
Egges, A.1
Kshirsagar, S.2
Magnenat-Thalmann, N.3
-
35
-
-
35048863855
-
Social organization in a software agent community with a non-zero-sum game interaction model
-
Regulated Agent-Based Social Systems. Berlin: SPRINGER-VERLAG BERLIN
-
M. A. Vanninen and J. R. Rose, "Social organization in a software agent community with a non-zero-sum game interaction model," in Regulated Agent-Based Social Systems, vol. 2934, Lecture Notes in Artificial Intelligence. Berlin: SPRINGER-VERLAG BERLIN, 2004, pp. 176-188.
-
(2004)
Lecture Notes in Artificial Intelligence
, vol.2934
, pp. 176-188
-
-
Vanninen, M.A.1
Rose, J.R.2
-
36
-
-
12944300212
-
The mind of the terrorist - A review and critique of psychological approaches
-
J. Victoroff, "The mind of the terrorist - A review and critique of psychological approaches," Journal of Conflict Resolution, vol. 49, no. 1, pp. 3-42, 2005.
-
(2005)
Journal of Conflict Resolution
, vol.49
, Issue.1
, pp. 3-42
-
-
Victoroff, J.1
-
38
-
-
0242549048
-
Destabilizing networks
-
K. M. Carley, J.-S. Lee, and D. Krackhardt, "Destabilizing networks," Connections, vol. 24, no. 3, pp. 79-92, 2002.
-
(2002)
Connections
, vol.24
, Issue.3
, pp. 79-92
-
-
Carley, K.M.1
Lee, J.-S.2
Krackhardt, D.3
-
39
-
-
11144288407
-
Destabilizing dynamic covert networks
-
National Defense War College, Washington DC
-
K. M. Carley, M. Dombroski, M. Tsvetovat, J. Reminga, and N. Kamneva, "Destabilizing dynamic covert networks," in 8th International Command and Control Research and Technology Symposium. National Defense War College, Washington DC, 2003.
-
(2003)
8th International Command and Control Research and Technology Symposium
-
-
Carley, K.M.1
Dombroski, M.2
Tsvetovat, M.3
Reminga, J.4
Kamneva, N.5
-
40
-
-
33745487632
-
NETEST: Estimating a terrorist network's structure - Graduate student best paper award, CASOS 2002 conference
-
M. J. Dombroski and K. M. Carley, "NETEST: estimating a terrorist network's structure - graduate student best paper award, CASOS 2002 conference," Computational & Mathematical Organization Theory, vol. 8, no. 3, pp. 235-241, 2002.
-
(2002)
Computational & Mathematical Organization Theory
, vol.8
, Issue.3
, pp. 235-241
-
-
Dombroski, M.J.1
Carley, K.M.2
|