{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:18:54Z","timestamp":1742912334073,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642201516"},{"type":"electronic","value":"9783642201523"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20152-3_29","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T22:42:08Z","timestamp":1302302528000},"page":"388-399","source":"Crossref","is-referenced-by-count":1,"title":["Visual Analysis of Implicit Social Networks for Suspicious Behavior Detection"],"prefix":"10.1007","author":[{"given":"Amyn","family":"Bennamane","sequence":"first","affiliation":[]},{"given":"Hakim","family":"Hacid","sequence":"additional","affiliation":[]},{"given":"Arnaud","family":"Ansiaux","sequence":"additional","affiliation":[]},{"given":"Alain","family":"Cagnati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","first-page":"735","volume-title":"IEEE CSE 2009","author":"A. Agarwal","year":"2009","unstructured":"Agarwal, A., Rambow, O., Bhardwaj, N.: Predicting interests of people on online social networks. In: IEEE CSE 2009, pp. 735\u2013740. IEEE Computer Society, Washington, DC, USA (2009)"},{"issue":"2","key":"29_CR2","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/TVCG.2007.46","volume":"13","author":"D. Archambault","year":"2007","unstructured":"Archambault, D., Munzner, T., Auber, D.: Topolayout: Multilevel graph layout by topological features. IEEE Trans. Vis. Comput. Graph.\u00a013(2), 305\u2013317 (2007)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"issue":"8","key":"29_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/2.35195","volume":"22","author":"T.A. DeFanti","year":"1989","unstructured":"DeFanti, T.A., Brown, M.D., McCormick, B.H.: Visualization: Expanding scientific and engineering research opportunities. Computer\u00a022(8), 12\u201325 (1989)","journal-title":"Computer"},{"key":"29_CR4","first-page":"948","volume-title":"IEEE CSE 2009","author":"F. Giannotti","year":"2009","unstructured":"Giannotti, F., Nanni, M., Pedreschi, D., Renso, C., Trasarti, R.: Mining mobility behavior from trajectory data. In: IEEE CSE 2009, pp. 948\u2013951. IEEE Computer Society, Washington, DC, USA (2009)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Gloor, P.A., Krauss, J., Nann, S., Fischbach, K., Schoder, D.: Web science 2.0: Identifying trends through semantic social network analysis. In: IEEE CSE 2009, vol.\u00a04, pp. 215\u2013222 (2009)","DOI":"10.1109\/CSE.2009.186"},{"key":"29_CR6","first-page":"241","volume-title":"WSDM 2010","author":"A. Goyal","year":"2010","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V.: Learning influence probabilities in social networks. In: WSDM 2010, pp. 241\u2013250. ACM, New York (2010)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Heer, J., Boyd, D.: Vizster: Visualizing online social networks. In: INFOVIS, p. 5 (2005)","DOI":"10.1109\/INFOVIS.2005.39"},{"issue":"3","key":"29_CR8","first-page":"43","volume":"24","author":"V.E. Krebs","year":"2001","unstructured":"Krebs, V.E.: Mapping networks of terrorist cells. Connections\u00a024(3), 43\u201352 (2001)","journal-title":"Connections"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Lakshmanan, L.V.S., Subramanian, S.N., Goyal, N., Krishnamurthy, R.: On query spreadsheets. In: ICDE, pp. 134\u2013141 (1998)","DOI":"10.1109\/ICDE.1998.655769"},{"key":"29_CR10","first-page":"251","volume-title":"WSDM 2010","author":"A. Mislove","year":"2010","unstructured":"Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: WSDM 2010, pp. 251\u2013260. ACM, New York (2010)"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Perer, A., Shneiderman, B.: Systematic yet flexible discovery: guiding domain experts through exploratory data analysis. In: IUI, pp. 109\u2013118 (2008)","DOI":"10.1145\/1378773.1378788"},{"key":"29_CR12","first-page":"61","volume-title":"KDD 2002","author":"M. Richardson","year":"2002","unstructured":"Richardson, M., Domingos, P.: Mining knowledge-sharing sites for viral marketing. In: KDD 2002, pp. 61\u201370. ACM, New York (2002)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Roth, M., Ben-David, A., Deutscher, D., Flysher, G., Horn, I., Leichtberg, A., Leiser, N., Merom, R., Mattias, Y.: Suggesting friends using the implicit social graph. In: SIG-KDD (2010) (to appear)","DOI":"10.1145\/1835804.1835836"},{"key":"29_CR14","volume-title":"Social Network Analysis: Methods and Applications Structural Analysis in the Social Sciences","author":"W. Stanley","year":"1994","unstructured":"Stanley, W., Katherine, F.: Social Network Analysis: Methods and Applications Structural Analysis in the Social Sciences, 1st edn. Cambridge University Press, Cambridge (1994)","edition":"1"},{"key":"29_CR15","first-page":"373","volume-title":"KDD 2010","author":"Z. Wen","year":"2010","unstructured":"Wen, Z., Lin, C.-Y.: On the quality of inferring interests from social neighbors. In: KDD 2010, pp. 373\u2013382. ACM, New York (2010)"},{"issue":"6","key":"29_CR16","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/1064830.1064834","volume":"48","author":"J. Xu","year":"2005","unstructured":"Xu, J., Chen, H.: Criminal network analysis and visualization. Commun. ACM\u00a048(6), 100\u2013107 (2005)","journal-title":"Commun. ACM"},{"issue":"6","key":"29_CR17","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/1064830.1064834","volume":"48","author":"J.J. Xu","year":"2005","unstructured":"Xu, J.J., Chen, H.: Criminal network analysis and visualization. Commun. ACM\u00a048(6), 100\u2013107 (2005)","journal-title":"Commun. ACM"},{"key":"29_CR18","first-page":"18","volume-title":"IEEE CSE 2009","author":"J. Zhan","year":"2009","unstructured":"Zhan, J., Oommen, B.J., Crisostomo, J.: Anomaly detection in dynamic social systems using weak estimators. In: IEEE CSE 2009, pp. 18\u201325. IEEE Computer Society, Washington, DC, USA (2009)"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20152-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T23:57:31Z","timestamp":1741132651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20152-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642201516","9783642201523"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20152-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}