{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:25:46Z","timestamp":1774941946755,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540221258","type":"print"},{"value":"9783540259527","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_10","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"125-145","source":"Crossref","is-referenced-by-count":25,"title":["Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism"],"prefix":"10.1007","author":[{"given":"Edna","family":"Reid","sequence":"first","affiliation":[]},{"given":"Jialun","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Wingyan","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yilu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Schumaker","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Sageman","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"10_CR1","doi-asserted-by":"publisher","first-page":"837","DOI":"10.2307\/2095954","volume":"58","author":"W.E. Baker","year":"1993","unstructured":"Baker, W.E., Faulkner, R.R.: Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review\u00a058(12), 837\u2013860 (1993)","journal-title":"American Sociological Review"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Boyack, K.W.: Mapping Knowledge Domains: Characterizing PNAS. PNAS Early edn. (2003)","DOI":"10.1073\/pnas.0307509100"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/0022-2496(75)90028-0","volume":"12","author":"R.L. Breiger","year":"1975","unstructured":"Breiger, R.L., Boorman, S., Arabie, P.: An Algorithm for Clustering Relational Data, with Applications to Social Network Analysis and Comparison with Multidimensional Scaling. Journal of Mathematical Psychology\u00a012, 328\u2013383 (1975)","journal-title":"Journal of Mathematical Psychology"},{"issue":"3","key":"10_CR4","first-page":"31","volume":"24","author":"K.M. Carley","year":"2001","unstructured":"Carley, K.M., Lee, J.S.: Destabilizing Networks. Connections\u00a024(3), 31\u201334 (2001)","journal-title":"Connections"},{"key":"10_CR5","unstructured":"Carnegie Mellon University: Web Portal and Portal Taxonomies. Final Report of Consequence Management Program Integration Office (2001)"},{"key":"10_CR6","unstructured":"Cateriniccha, D.: Data Mining Aims at National Security. Federal Computer Week (2002)"},{"key":"10_CR7","unstructured":"Center, T.R.: About the Terrorism Research Center (2003)"},{"issue":"4","key":"10_CR8","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1002\/1532-2890(2000)9999:9999<::AID-ASI1074>3.0.CO;2-2","volume":"52","author":"C. Chen","year":"2001","unstructured":"Chen, C., Paul, R.J., O\u2019Keefe, B.: Fitting the jigsaw of Citation: Information Visualization in Domain Analysis. Journal of American Society of Information Science and Technology\u00a052(4), 315\u2013330 (2001)","journal-title":"Journal of American Society of Information Science and Technology"},{"issue":"5","key":"10_CR9","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/21.179830","volume":"22","author":"H. Chen","year":"1992","unstructured":"Chen, H., Lynch, K.J.: Automatic Construction of Networks of Concepts Characterizing Document Databases. IEEE Transactions on Systems, Man, and Cybernetics\u00a022(5), 885\u2013902 (1992)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Chung, W., Zhang, Y., Huang, Z., Wang, G., Ong, T.H., Chen, H.: Internet Searching and Browsing in a Multilingual World: An Experiment on the Chinese Business Intelligence Portal (CBizPort). Journal of the American Society for Information and Science and Technology, Accepted for publication (forthcoming)","DOI":"10.1002\/asi.20025"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0004-3702(71)90002-6","volume":"2","author":"K.M.W. Colby","year":"1971","unstructured":"Colby, K.M.W., Sylvia, H., Dennis, F.: Artificial Paranoia. Artificial Intelligence\u00a02, 1\u201325 (1971)","journal-title":"Artificial Intelligence"},{"key":"10_CR12","unstructured":"Council, N.R.: Making the Nation Safer: the Role of Science and Technology in Countering Terrorism, Washington, D.C., p. 339 (2002)"},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1111\/0162-895X.00195","volume":"21","author":"M. Crenshaw","year":"2000","unstructured":"Crenshaw, M.: Psychology of Terrorism: An Agenda for the 21st Century. Political Psychology\u00a021(2), 405\u2013420 (2000)","journal-title":"Political Psychology"},{"key":"10_CR14","volume-title":"Geographical Dimensions of Terrorism","year":"2003","unstructured":"Cutter, S., Wilbank, T.J. (eds.): Geographical Dimensions of Terrorism. Taylor & Francis, Inc., Abington (2003)"},{"key":"10_CR15","unstructured":"DARPA: Terrorism Knowledge Base Proposal (2002)"},{"key":"10_CR16","volume-title":"Proceedings of The International Conference on Affective Human Factors Design","author":"A.J. Angeli De","year":"2001","unstructured":"De Angeli, A.J., Graham, I., Coventry, L.: The Unfriendly User: Exploring Social Reactions to Chatterbots. In: Proceedings of The International Conference on Affective Human Factors Design, Asean Academic Press. Han, S. K., YounGi, London (2001)"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"E. Dijkstra","year":"1959","unstructured":"Dijkstra, E.: A Note on Two Problems in Connection with Graphs. Numerische Mathematik\u00a01, 269\u2013271 (1959)","journal-title":"Numerische Mathematik"},{"issue":"6","key":"10_CR18","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1145\/367766.368168","volume":"5","author":"R.W. Floyd","year":"1962","unstructured":"Floyd, R.W.: Algorithm 97: Shortest Path. Communications of the ACM\u00a05(6), 345\u2013370 (1962)","journal-title":"Communications of the ACM"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L.C. Freeman","year":"1979","unstructured":"Freeman, L.C.: Centrality in Social Networks: Conceptual Clarification. Social Networks\u00a01, 215\u2013240 (1979)","journal-title":"Social Networks"},{"key":"10_CR20","volume-title":"Algorithms for Clustering Data","author":"A.K. Jain","year":"1988","unstructured":"Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice-Hall, Upper Saddle River (1988)"},{"key":"10_CR21","unstructured":"Kennedy, L.W., Lunn, C.M.: Developing a Foundation for Policy Relevant Terrorism Research in Criminology (2003)"},{"key":"10_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97610-0","volume-title":"Self-organizing maps","author":"T. Kohonen","year":"1995","unstructured":"Kohonen, T.: Self-organizing maps. Springer, Berlin (1995)"},{"issue":"3","key":"10_CR23","first-page":"43","volume":"24","author":"V.E. Krebs","year":"2001","unstructured":"Krebs, V.E.: Mapping networks of terrorist cells. Connections\u00a024(3), 43\u201352 (2001)","journal-title":"Connections"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1038\/21987","volume":"400","author":"S. Lawrence","year":"1999","unstructured":"Lawrence, S., Giles, C.L.: Accessibility of Information on the Web. Nature\u00a0400, 107\u2013109 (1999)","journal-title":"Nature"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/0022250X.1971.9989788","volume":"1","author":"F.P. Lorrain","year":"1971","unstructured":"Lorrain, F.P., White, H.C.: Structural Equivalence of Individuals in Social Networks. Journal of Mathematical Sociology\u00a01, 49\u201380 (1971)","journal-title":"Journal of Mathematical Sociology"},{"key":"10_CR26","unstructured":"McAndrew, D.: Structural Analysis of Criminal Networks. Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. L. Allison. Dartmouth, Aldershot (1999)"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"McBryan, O.: GENVL and WWW: Tools for Taming the Web. In: Proceedings of the First International Conference on the World Wide Web, Geneva, Switzerland (1994)","DOI":"10.1016\/S0169-7552(94)90149-X"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"McDonald, D., Chen, H.: Using Sentence-selection Heuristics to Rank Text Segments in TXTRACTOR. In: Proceedings of Second ACM\/IEEE-CS joint conference on Digital libraries, Portland, Oregon, USA (2002)","DOI":"10.1145\/544220.544226"},{"key":"10_CR29","unstructured":"Moore, R.G.: Graham: Emile: Using a Chatbot Conversation to Enhance the Learning of Social Theory. Huddersfield, England, Univ. of Huddersfield (2002)"},{"key":"10_CR30","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1093\/comjnl\/26.4.354","volume":"26","author":"F. Murtagh","year":"1984","unstructured":"Murtagh, F.: A Survey of Recent Advances in Hierarchical Clustering Algorithms Which Use Cluster Centers. Computer Journal\u00a026, 354\u2013359 (1984)","journal-title":"Computer Journal"},{"key":"10_CR31","unstructured":"National Science Foundation: Data Mining and Homeland Security Applications (2003)"},{"key":"10_CR32","unstructured":"Reid, E.O.F.: An Analysis of Terrorism Literature: A Bibliometric and Content Analysis Study. School of Library and Information Management. Los Angeles, University of Southern California, p. 357 (1983)"},{"key":"10_CR33","unstructured":"Reid, E.O.F.: Using Online Databases to Analyze the Development of a Specialty: Case Study of Terrorism. In: 13th National Online Meeting Proceedings, New York, NY, Learning Information (1992)"},{"issue":"1","key":"10_CR34","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/S0306-4573(96)00052-0","volume":"33","author":"E.O.F. Reid","year":"1997","unstructured":"Reid, E.O.F.: Evolution of a Body of Knowledge: an Analysis of Terrorism Research. Information Processing & Management\u00a033(1), 91\u2013106 (1997)","journal-title":"Information Processing & Management"},{"key":"10_CR35","doi-asserted-by":"crossref","DOI":"10.9783\/9780812206791","volume-title":"Understanding Terror Networks","author":"M. Sageman","year":"2004","unstructured":"Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Pennsylvania (2004)"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Salton, G.: Recent Trends in Automatic Information Retrieval. In: Proceedings of the 9th Annual International ACM SIGIR, Pisa, Italy (1986)","DOI":"10.1145\/253168.253171"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Selberg, E., Etzioni, O.: Multi-service Search and Comparison Using the MetaCrawler. In: Proceedings of the 4th International World-Wide Web Conference (1995)","DOI":"10.1145\/3592626.3592641"},{"issue":"4","key":"10_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/09546550109609697","volume":"13","author":"A. Silke","year":"2001","unstructured":"Silke, A.: Devil You Know: Continuing Problems with Research on Terrorism. Terrorism and Political Violence\u00a013(4), 1\u201314 (2001)","journal-title":"Terrorism and Political Violence"},{"key":"10_CR39","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","volume":"13","author":"M.K. Sparrow","year":"1991","unstructured":"Sparrow, M.K.: Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks\u00a013, 251\u2013274 (1991)","journal-title":"Social Networks"},{"issue":"4","key":"10_CR40","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1002\/(SICI)1097-4571(2000)51:4<352::AID-ASI5>3.0.CO;2-8","volume":"51","author":"K.M. Tolle","year":"2000","unstructured":"Tolle, K.M., Chen, H.: Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science (Special Issue on Digital Libraries)\u00a051(4), 352\u2013370 (2000)","journal-title":"Journal of the American Society for Information Science (Special Issue on Digital Libraries)"},{"key":"10_CR41","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)"},{"issue":"1","key":"10_CR42","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/365153.365168","volume":"9","author":"J. Weizenbaum","year":"1966","unstructured":"Weizenbaum, J.: Eliza - A Computer Program for the Study of Natural Language Communication between Man and Machine. Communications of the ACM\u00a09(1), 36\u201345 (1966)","journal-title":"Communications of the ACM"},{"key":"10_CR43","first-page":"730","volume":"81","author":"H.C. White","year":"1976","unstructured":"White, H.C., Boorman, S.A., Breiger, R.L.: Social Structure from Multiple Networks: I. Blockmodels of Roles and Positions. American Journal of Sociology\u00a081, 730\u2013780 (1976)","journal-title":"Blockmodels of Roles and Positions. American Journal of Sociology"},{"key":"10_CR44","series-title":"Lecture Notes in Computer Science","volume-title":"Genetic and Evolutionary Computation - GECCO 2003","author":"D. Vrajitoru","year":"2003","unstructured":"Vrajitoru, D.: Evolutionary Sentence Building for Chatterbots. In: Cant\u00fa-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O\u2019Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol.\u00a02723, Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T06:06:53Z","timestamp":1711692413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}