Last update: Fri Nov 9 02:10:53 MST 2018
@Article{Marshall:2008:UIF,
author = "Byron Marshall and Hsinchun Chen and Siddharth Kaza",
title = "Using importance flooding to identify interesting
networks of criminal activity",
journal = j-J-AM-SOC-INF-SCI-TECHNOL,
volume = "59",
number = "13",
pages = "2099--2114",
month = nov,
year = "2008",
CODEN = "JASIEF",
DOI = "https://doi.org/10.1002/asi.20924",
ISSN = "1532-2882 (print), 1532-2890 (electronic)",
ISSN-L = "1532-2882",
bibdate = "Fri Sep 11 10:42:45 MDT 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jasist.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of the American Society for Information
Science and Technology: JASIST",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1532-2890",
onlinedate = "16 Jul 2008",
}