2Arquilla J, Ronfeldt D F. Networks and Netwars: the Future of Terror, Crime and Military [ R]. Santa Monica, California:RAND, 2001:20-24.
3Krebs V. Mapping Networks of Terrorist Cells [ J ]. Connec- tions, 2001, 24(3) :43-52.
4Chen H, Denning D, Roberts N, et al. The Dark Web Forum Portal: from Multi-lingual to Video [ C ]. Intelligence and Secur- ity Informatics, International Conference on IEEE, 2011:7-14.
5Correa C D, Ma K L. Visualizing Social Networks[ M]. Social Network Data Analytics. , Springer US, 2011 : 307-326.
6Mika P. Flink: Semantic Web Technology for the Extraction and Analysis of Social Networks. Web Semantics: Science [ J ]. Services and Agents on the World Wide Web, 2005, 3(2) : 211 -223.
7Kolda T, Brown D, Corones J, et al. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery[ R]. DHS Workshop on Data Sciences. 2004.
8Yang C C, Ng T D. Terrorism and Crime Related Weblog social Network: Link, Content Analysis and Information Visualization [ C]. Intelligence and Security Informatics, 2007 IEEE. ISI:55 -58.
9Sageman M. Understanding Terror Networks[ M]. University of Pennsylvania Press, 2004.
10Perer A, Shneiderman B. Integrating Statistics and Visualiza- tion :Case Studies of Gaining Clarity During Exploratory Data A- nalysis[ C]. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2008: 265-274.