-
1
-
-
0035789623
-
Data mining case study: Modeling the behavior of offenders who commit serious sexual assaults
-
F. Provost & R. Srikant Eds, New York: Association for Computing Machinery
-
Adderley, R., & Musgrove, P. B. (2001). Data mining case study: Modeling the behavior of offenders who commit serious sexual assaults. In F. Provost & R. Srikant (Eds.), Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 215-220). New York: Association for Computing Machinery.
-
(2001)
Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 215-220
-
-
Adderley, R.1
Musgrove, P.B.2
-
2
-
-
0013182812
-
A new algorithm to generate Arabic root-pattern forms
-
King Fahd University of Petroleum & Minerals, Dhahran, Saudi Arabia, pp
-
Al-Fedaghi Saban S. and Al-Anzi, F. (1989) A new algorithm to generate Arabic root-pattern forms. Proceedings of the 11th National Computer Conference, King Fahd University of Petroleum & Minerals, Dhahran, Saudi Arabia, (pp. 4-7).
-
(1989)
Proceedings of the 11th National Computer Conference
, pp. 4-7
-
-
Al-Fedaghi Saban, S.1
Al-Anzi, F.2
-
3
-
-
28844465409
-
-
American Civil Liberties Union, Retrieved July 27, 2004, from the World Wide Web
-
American Civil Liberties Union. (2004). MATRIX: Myths and reality. Retrieved July 27, 2004, from the World Wide Web: http://www.aclu.org/Privacy/ Privacy.cfm?ID=14894&c=130
-
(2004)
MATRIX: Myths and reality
-
-
-
4
-
-
38049183137
-
-
Arquilla, J. & Ronfeldt, D. F. Advent of Netwar. (1996). Rand Report, http://www.rand.org/.
-
Arquilla, J. & Ronfeldt, D. F. Advent of Netwar. (1996). Rand Report, http://www.rand.org/.
-
-
-
-
5
-
-
38049152828
-
-
Chen, H, Miranda, R, Zeng, D. D, Demchak, C, Schroeder, J, & Madhusudan, T, Eds, Berlin: Springer
-
Chen, H., Miranda, R., Zeng, D. D., Demchak, C., Schroeder, J., & Madhusudan, T. (Eds.). (2003a). Intelligence and Security Informatics: Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics. Berlin: Springer.
-
(2003)
Intelligence and Security Informatics: Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics
-
-
-
6
-
-
38049097925
-
-
Chen, H, Moore, R, Zeng, D, & Leavitt, J, Eds, Berlin: Springer
-
Chen, H., Moore, R., Zeng, D., & Leavitt, J. (Eds.). (2004b). Intelligence and Security Informatics: Proceedings of the Second Symposium on Intelligence and Security Informatics. Berlin: Springer.
-
(2004)
Intelligence and Security Informatics: Proceedings of the Second Symposium on Intelligence and Security Informatics
-
-
-
7
-
-
33745783788
-
The Dark Web Portal: Collecting and analyzing the presence of domestic and international terrorist groups on the Web
-
Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., et al. (2004c). The Dark Web Portal: Collecting and analyzing the presence of domestic and international terrorist groups on the Web. In Proceedings of the 7th Annual IEEE Conference on Intelligent Transportation Systems (ITSC 2004).
-
(2004)
Proceedings of the 7th Annual IEEE Conference on Intelligent Transportation Systems (ITSC 2004)
-
-
Chen, H.1
Qin, J.2
Reid, E.3
Chung, W.4
Zhou, Y.5
Xi, W.6
-
8
-
-
38049172922
-
-
Chen, H. & Xu, J. (2005) Intelligence and security informatics for national security: a knowledge discovery perspective, In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), 40. Information Today, Inc., Medford, New Jersey.
-
Chen, H. & Xu, J. (2005) Intelligence and security informatics for national security: a knowledge discovery perspective, In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), Volume 40. Information Today, Inc., Medford, New Jersey.
-
-
-
-
9
-
-
20344384393
-
Social, ethical and legal issues of data mining
-
J. Wang Ed, Hershey, PA: Idea Group Publishing
-
Cook, J. S., & Cook, L. L. (2003). Social, ethical and legal issues of data mining. In J. Wang (Ed.), Data mining: Opportunities and challenges (pp. 395-420). Hershey, PA: Idea Group Publishing.
-
(2003)
Data mining: Opportunities and challenges
, pp. 395-420
-
-
Cook, J.S.1
Cook, L.L.2
-
10
-
-
24944437168
-
Netwar: Studying Rebels on the Internet
-
Elison, W. (2000) Netwar: Studying Rebels on the Internet. The Social Studies 91, 127-131.
-
(2000)
The Social Studies
, vol.91
, pp. 127-131
-
-
Elison, W.1
-
11
-
-
0002389633
-
Automating the analysis and cataloging of sky surveys
-
U. Fayyad, G. Piatetsky-Shapiro, P. Smyth & R. Uthurusamy Eds, Menlo Park, CA: AAAI Press
-
Fayyad, U. M., Djorgovshi, S. G., & Weir, N. (1996). Automating the analysis and cataloging of sky surveys. In U. Fayyad, G. Piatetsky-Shapiro, P. Smyth & R. Uthurusamy (Eds.), Advances in knowledge discovery and data mining (pp. 471-493). Menlo Park, CA: AAAI Press.
-
(1996)
Advances in knowledge discovery and data mining
, pp. 471-493
-
-
Fayyad, U.M.1
Djorgovshi, S.G.2
Weir, N.3
-
12
-
-
0041912948
-
Evolving data mining into solutions for insights
-
Fayyad, U. M., & Uthurusamy, R. (2002). Evolving data mining into solutions for insights. Communications of the ACM, 45(8), 28-31.
-
(2002)
Communications of the ACM
, vol.45
, Issue.8
, pp. 28-31
-
-
Fayyad, U.M.1
Uthurusamy, R.2
-
13
-
-
0031617713
-
Inferring Web communities from link topology
-
R. Akscyn, D. McCracken, & E. Yoder Eds, New York: Association for Computing Machinery
-
Gibson, D., Kleinberg, J., & Raghavan, P. (1998). Inferring Web communities from link topology. In R. Akscyn, D. McCracken, & E. Yoder (Eds.), Proceedings of the 9th ACM Conference on Hypertext and Hypermedia (pp. 225-234). New York: Association for Computing Machinery.
-
(1998)
Proceedings of the 9th ACM Conference on Hypertext and Hypermedia
, pp. 225-234
-
-
Gibson, D.1
Kleinberg, J.2
Raghavan, P.3
-
15
-
-
0011450426
-
-
Office of Homeland Security, Washington D.C, Office of Homeland Security
-
Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security.
-
(2002)
National Strategy for Homeland Security
-
-
-
17
-
-
35048854724
-
Terrorism Knowledge Discovery Project: A knowledge discovery approach to address the threats of terrorism
-
H. Chen, R. Moore, D. Zeng & J. Leavitt Eds, Berlin: Springer
-
Reid, E. O. F., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., et al. (2004). Terrorism Knowledge Discovery Project: A knowledge discovery approach to address the threats of terrorism. In H. Chen, R. Moore, D. Zeng & J. Leavitt (Eds.), Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04) (pp. 125-145). Berlin: Springer.
-
(2004)
Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04)
, pp. 125-145
-
-
Reid, E.O.F.1
Qin, J.2
Chung, W.3
Xu, J.4
Zhou, Y.5
Schumaker, R.6
-
18
-
-
3843140883
-
Computer-based authorship attribution without lexical measures
-
Stamatatos, E., Fakotakis, N., & Kokkinakis, G. (2001). Computer-based authorship attribution without lexical measures. Computers and the Humanities, 35(2), (pp. 193-214).
-
(2001)
Computers and the Humanities
, vol.35
, Issue.2
, pp. 193-214
-
-
Stamatatos, E.1
Fakotakis, N.2
Kokkinakis, G.3
-
19
-
-
10044256201
-
-
Strickland, L. S., Baldwin, D. A., & Justsen, M. (2005) Domestic security surveillance and civil liberties, In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), 39. Information Today, Inc., Medford, New Jersey.
-
Strickland, L. S., Baldwin, D. A., & Justsen, M. (2005) Domestic security surveillance and civil liberties, In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), Volume 39. Information Today, Inc., Medford, New Jersey.
-
-
-
-
20
-
-
0033874603
-
Comparing noun phrasing techniques for use with medical digital library tools
-
Tolle, K. M., & Chen, H. (2000). Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science, 57(4), 352-370.
-
(2000)
Journal of the American Society for Information Science
, vol.57
, Issue.4
, pp. 352-370
-
-
Tolle, K.M.1
Chen, H.2
-
21
-
-
84950351930
-
Multidimensional scaling: Theory and method
-
Torgerson, W. S. (1952). Multidimensional scaling: Theory and method. Psychometrika, 17, 401-419.
-
(1952)
Psychometrika
, vol.17
, pp. 401-419
-
-
Torgerson, W.S.1
-
22
-
-
0033474337
-
-
Trybula, W. J. (1999). Text mining. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (ARIST) (34, pp. 385-419). Medford, NJ: Information Today, Inc.
-
Trybula, W. J. (1999). Text mining. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (ARIST) (vol. 34, pp. 385-419). Medford, NJ: Information Today, Inc.
-
-
-
-
24
-
-
38049155870
-
-
Weimann, G. (2004). www.terrorism.net: How Modern Terrorism Uses the Internet. Special Report 116, U.S. Institute of Peace.
-
Weimann, G. (2004). www.terrorism.net: How Modern Terrorism Uses the Internet. Special Report 116, U.S. Institute of Peace.
-
-
-
-
25
-
-
35048871882
-
Authorship analysis in cybercrime investigation
-
H. Chen, R. Miranda, D. Zeng, C. Demchak, et al, Eds, Berlin: Springer
-
Zheng, R., Qin, Y., Huang, Z., & Chen, H. (2003). Authorship analysis in cybercrime investigation. In H. Chen, R. Miranda, D. Zeng, C. Demchak, et al. (Eds.), Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03) (pp.59-73). Berlin: Springer.
-
(2003)
Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI'03)
, pp. 59-73
-
-
Zheng, R.1
Qin, Y.2
Huang, Z.3
Chen, H.4
|