Abstract
Enhancing traditional algorithmic techniques for improved pattern analysis.
- Baker, W.E. and Faulkner, R.R. The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review 58, 6 (Dec. 1993), 837--860.Google ScholarCross Ref
- Coffman, T. and Marcus, S. Pattern classification in social network analysis: A case study. In Proceedings of the 2004 IEEE Aerospace Conference (Big Sky, MT, Mar. 2004).Google ScholarCross Ref
- Coffman, T. and Marcus, S. Dynamic classification of groups using social network analysis and HMMs. In Proceedings of the 2004 IEEE Aerospace Conference (Big Sky, MT, Mar. 2004).Google Scholar
- Heuer, R.J. Psychology of Intelligence Analysis. Center for the Study of Intelligence, Central Intelligence Agency, 2001.Google Scholar
- Jensen, D., Rattigan, M., and Blau, H. Information awareness: A prospective technical assessment. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003. Google ScholarDigital Library
- Krebs, V. Mapping networks of terrorist cells. Connections 24, 3 (Winter 2001), 43--52.Google Scholar
- Thomason, B., Coffman, T., and Marcus, S. Sensitivity of social network analysis metrics to observation noise. In Proceedings of the 2004 IEEE Aerospace Conference (Big Sky, MT, Mar. 2004).Google ScholarCross Ref
- Ullman, J.R. An algorithm for subgraph isomorphism. Journal of the ACM 23, 1 (Jan. 1976), 31--42. Google ScholarDigital Library
Index Terms
- Graph-based technologies for intelligence analysis
Recommendations
Analysis of English Teaching System Based on Artificial Intelligence
ICIEB '18: Proceedings of the 2018 1st International Conference on Internet and e-BusinessArtificial intelligence is a science and technology to study of the law of human intelligence activities. In this paper, we introduce the principle, characteristics and applications of artificial intelligence, analyze the current English teaching ...
Online behavior analysis-based blended learning model
ACM TURC '18: Proceedings of ACM Turing Celebration Conference - ChinaStudent-centered instruction aims to develop skills and practices of learners to enable independent problem-solving and lifelong learning. How to make good use of learning behaviour data to optimize curriculum design poses severe challenges as well as ...
Artificial Intelligence Assisted Malware Analysis
SAT-CPS '21: Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical SystemsThis tutorial provides a review of the state-of-the-art research and the applications of Artificial Intelligence and Machine Learning for malware analysis. We will provide an overview, background and results with respect to the three main malware ...
Comments