6McCallum,Andrew,Corrada-Emmanuel,Andrés,Wang Xuerui,The Author-Recipient-Topic Model for Topic and Role Discovery inSocial Networks:Experiments with Enron and Academic Email(2005).Computer Science Department Faculty Publication Series.Paper 44.
7Valdis E.Krebs,Mapping Networks of Terrorist Cell[s J].connec-tions,2002,24(3):43-52.
8Criminal Network Analysis and Visualization(2005),COM-MU-NICATIONS OF THE ACM June 2005/Vol.48,No.6.
5Xu Jennifer, Chen Hsinchun. CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery [J]. ACM Transactions on Information Systems, 2005, 23(2): 201- 226.
6Stephen P. Borgatti. Identifying Sets of Key Players in a Network [C]//Proceedings of the Conference on Integration of Knowledge Intensive Multi--Agent Systems. NY: IEEE, 2003:127- 131.
7Dombroski, M. J. & K. M. Carley. Netest: Estimating a Terrorist Network's Structure [J]. Computational & Mathematical Organization Theory, 2002, 8: 235- 241.
8Valdis E. Krebs. Mapping Networks of Terrorist Cells [J]. Connections, 2002, 24(3): 43 -52.