what-when-how
In Depth Tutorials and Information
2. Hussain, D. M. 2007. Terrorist networks analysis through argument driven hypotheses
model. In
ProceedingsoftheSecondInternationalConferenceonAvailability,Reliability
andSecurity
(April 10-13, 2007). ARES. IEEE Computer Society, Washington, DC,
480-492.
3. Kossinets, G., Kleinberg, J., and Watts, D. 2008. he structure of information path-
ways in a social communication network. In
Proceeding of the 14th ACM SIGKDD
InternationalConferenceonKnowledgeDiscoveryandDataMining
(Las Vegas, Nevada,
August 24-27, 2008). KDD '08. ACM, New York, 435-443.
4. Liben-Nowell, D. and Kleinberg, J. 2003. he link prediction problem for social
networks. In
Proceedings of the Twelfth International Conference on Information and
Knowledge Management
(New Orleans, LA, November 03-08, 2003). CIKM '03.
ACM, New York, 556-559.
5. Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., and Bhattacharjee, B. 2007.
Measurement and analysis of online social networks. In
Proceedings of the 7th ACM
SIGCOMM Conference on Internet Measurement
(San Diego, California, October
24-26, 2007). IMC '07. ACM, New York, 29-42.