1. Financial Action Task Force. 2004. The 40 Recommendations. Retrieved June 20, 2011, from FATF: http://www.fatf.gafi.org/document/28/0,3343,en_32250379_32236930_33658140_1_1_1_1,00.html.
2. В.Л. Макаров, А.Р. Бахтизин, Е.Д. Сушко, В.А. Васенин, В.А. Борисов, В.А. Роганов. Агент-ориентированные модели: мировой опыт и технические возможности реа- лизации на суперкомпьютерах / Вестник Российской академии наук. 2016. том 86, №3. С. 252-262.
3. Валерий Макаров, Альберт Бахтизин, Елена Сушко. Моделирование демографиче- ских процессов с использованием агент-ориентированного подхода / Федера- лизм. 2014. №4. С. 37-46.
4. Wooldridge, M. (2002). An introduction to multiagent systems, Chichester, England, John Wiley & Sons. 2002.
5. Steve Kiser. Financing Terror // An Analysis and Simulation for Affecting Al Qaeda's Financial Infrastructure. 2004.
6. Charles Koech. A multi-agent based counter terrorism system through anti-money laundering // University of Nairobi. 2016.
7. Alexandre, Claudio and Balsa, Joao. “Client Profiling for an Anti-Money Laundering System”. arXiv:1510.00878v2 [cs.LG]. 2016.
8. Nhien-An Le-Khac, Sammer Markos and M-Tahar Kechadi. A Heuristics Approach for Fast Detecting Suspicious Money Laundering Cases in an Investment Bank. International Science Index, Computer and Information Engineering Vol:3. No:12. 2009. Р. 2742-2746.
9. Nhien-An Le-Khac, Sammer Markos and M-Tahar Kechadi. A Heuristics Approach for Fast Detecting Suspicious Money Laundering Cases in an Investment Bank. International Science Index, Computer and Information Engineering Vol:3. No:12. 2009. Р. 2742-2746.
10. Andrew J Park, Herbert H Tsang, Mengting Sun and Uwe Glasser. An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligence. Security Informatics. 2012. 1:23.
11. Gao, S. and Xu, D. (2006). Conceptual Modelling and Development of an Intelligent Agent-Assisted Decision Support System for Anti-Money Laundering. In: The 11th Annual Conference of Asia Pacific Decision Sciences Institute (APDSI 2006). Kowloon. Hong Kong. (241-244). 14-18 June. 2006.
12. Z. M. Zhang, J. J. Salerno, and P. S. Yu. “Applying data mining in investigating money laundering crimes,” in Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ser. KDD ’03. New York, NY, USA: ACM, 2003. Р. 747–752.
13. Aakash Negandhi, Soham Gawas, Prem Bhatt, Priya Porwal. Detect Online Spread of Terrorism Using Data Mining. IOSR Journal of Engineering (IOSRJEN). 2016. Р. 17-19.
14. Matthew Koehler, Brian Tivnan, and Eric Bloedorn. Generating Fraud: Agent Based Financial Network Modeling (http://www.academia.edu/20634179/Generating_fraud_Agent_based_financial_network_ modeling.)
15. Hamed Tofangsaz "Rethinking terrorist financing; where does all this lead?", Journal of Money Laundering Control, 2015. Vol. 18 Issue: 1, Р. 112-130, https://doi.org/10.1108/JMLC-12- 2013-0049.
16. Nhien-An Le Khac, Sammer Markos, Michael O'Neill, Anthony Brabazon and M-Tahar Kechadi. An efficient Search Tool for an Anti-Money Laundering Application of Multinational Bank's Dataset. https://arxiv.org/abs/1609.02031
17. D.A. Novikov et al 2018 J. Phys.: Conf. Ser. 973 012041. Mathematical model of information process of protection of the social sector. doi :10.1088/1742-6596/973/1/012041. 2018. Р. 1-9.
18. С.Я. Сущий, Г.А. Угольницкий, В.К. Дьяченко. Имитационное моделирование борьбы с экстремизмом на Северном Кавказе // Социология: 4М. 2013. № 37. С. 126-150.
19. Teresa H. K., Berry N.M. Agent-Based Modeling with Social Networks for Terrorist Recruitment. Proceedings of the 19th national conference on Artificial intelligence. AAAI Press / The MIT Press, 2004.
20. Bulleit W.M., Drewek M.W. An Agent-Based Model of Terrorist Activity. North American Association for Computational Social and Organizational Science Conference 2005 Proceedings, 2005.
21. Epstein J.M. Modeling civil violence: An agent-based computational approach. PNAS, May 14, 2002, vol. 99, suppl. 3. Р. 7243–7250.
22. Weaver R., Silverman B.G., Shin H., Dubois R. Modeling and Simulating Terrorist Decision- making: A “Performance Moderator Function” Approach to Generating Virtual Opponents Center for Human Modeling and Simulation. 2001.
23. Genkin M., Gutfraind A. How Do Terrorist Cells Self-Assemble? / Insights from an Agent-Based Model. Annual meeting of the American Sociological Association, Sheraton Boston and the Boston Marriott Copley Place. Boston, MA, Jul 31. 2008.
24. Tsvetovat M. Artificial Intelligence Based Simulation of Human Systems // The Case of Terrorist Networks. The quarterly Internet-journal «Artificial societies» Volume 2, No 2, Quarter II 2007, Laboratory for artificial societies, www.artsoc.ru, 2007.
Комментарии
Сообщения не найдены