[1] |
乔少杰, 唐长杰, 彭京 . 基于个性特征仿真邮件分析系统挖掘犯罪网络核心[J]. 计算机学报, 2008,31(10): 1795-1803.
|
|
QIAO S J , TANG C J , PENG J . The core of the crime network based on the personalized characteristic simulation mail analysis system[J]. Journal of Computer Science, 2008,31(10): 1795-1803.
|
[2] |
XU J J , CHEN H C . CrimeNet explorer:a framework for criminal network knowledge discovery[J]. ACM Transactions on Informa-tion Systems, 2005,23(2): 202-226.
|
[3] |
KREBS V E . Mapping networks of terrorist cells[J]. Connections, 2002,24(3): 43-52.
|
[4] |
DOMBROSKI M J , CARLEY K . Estimating a terrorist network's structure[J]. Computational and Mathematics Organization Theory, 2002,8(3): 235-241.
|
[5] |
QIAO S J , TANG C J , PENG J . VCCM Mining:mining virtual cornmullity core members based on gene expression program-ming[C]// The Workshop on Intelligence and Security Informatics. 2006: 133-138.
|
[6] |
QIAO S J , TANG C J , YU Z H . Bim mining virtual community structure based on SVM[J]. Computer Science(Supplement A), 2005,32(7): 208-212.
|
[7] |
STOLFO S J , HERSHKOP S , WANG K ,et al. A behavior-based approach to securing email systems[C]// The Second International Workshop on Mathematical Methods,Models,and Architectures for Computer Network Security. 2003: 57-81.
|
[8] |
杨博, 刘大有, 金弟 ,等. 复杂网络聚类方法[J]. 软件学报, 2009,20(1): 54-66.
|
|
YANG B , LIU D Y , JIN D ,et al. Complex network clustering method[J]. Journal of Software, 2009,20(1): 54-66.
|
[9] |
许国根, 贾瑛 . 模式识别与智能计算的 Matlab 实现第 2 版[M]. 北京: 北京航空航天大学出版社, 2014: 22-27.
|
|
XU G G , JIA Y . Pattern recognition and intelligent computing based on MatlabThe second Edition[M]. Beijing:Beijing University of Aeronautics and Astronautics Press. 2014: 22-27.
|
[10] |
VAN D E AALST P , WEIJTERS A . Process mining a rearch agenda[J]. Computer in Industry, 2004,53(3): 231-244.
|
[11] |
GALBRAITH J R . Organization design:an information processing view[J]. Interfaces, 1974,4(3): 28-36.
|