메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1254-1259

Notice of Removal: Detecting key players in 11-M terrorist network: A case study

Author keywords

Covert networks; Dependence centrality; Detecting hidden hierarchy; Key players; Position role centrality; Social network analysis

Indexed keywords

SOCIAL NETWORKING (ONLINE);

EID: 49049086753     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.173     Document Type: TB
Times cited : (4)

References (19)
  • 2
    • 84923618755 scopus 로고
    • The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry
    • Baker, W.E. & R.R. Faulkner (1993). The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review, 58 (12), 837-860.
    • (1993) American Sociological Review , vol.58 , Issue.12 , pp. 837-860
    • Baker, W.E.1    Faulkner, R.R.2
  • 4
    • 0012254042 scopus 로고
    • The application of network analysis to criminal intelligence: An assessment of the prospects
    • Sparrow, M. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13, 251-274.
    • (1991) Social Networks , vol.13 , pp. 251-274
    • Sparrow, M.1
  • 5
    • 49049090221 scopus 로고    scopus 로고
    • Evan, W. M. ((1972). An organization-set model of interorganizational relations. In: M. Tuite, R. Chisholm, M. Radnor (eds.): Inter-organizational Decision-making. Aldine, Chicago 181-200.
    • Evan, W. M. ((1972). An organization-set model of interorganizational relations. In: M. Tuite, R. Chisholm, M. Radnor (eds.): Inter-organizational Decision-making. Aldine, Chicago 181-200.
  • 7
    • 33750177351 scopus 로고
    • Centrality in Social Networks: I. Conceptual clarification
    • Freeman, L.C. (1978) Centrality in Social Networks: I. Conceptual clarification. Social Networks, 1:215-39
    • (1978) Social Networks , vol.1 , pp. 215-239
    • Freeman, L.C.1
  • 8
    • 0001316531 scopus 로고
    • Factoring and weighting approaches to status scores and clique identification
    • Bonacich, P. Factoring and weighting approaches to status scores and clique identification. Journal of Mathematical Sociology. 2:113-120 (1972)
    • (1972) Journal of Mathematical Sociology , vol.2 , pp. 113-120
    • Bonacich, P.1
  • 9
    • 0141990841 scopus 로고    scopus 로고
    • How Science of Complex Networks can help in developing Strategy against Terrorism
    • Latora, V., Massimo Marchiori, How Science of Complex Networks can help in developing Strategy against Terrorism, Chaos, Solitons and Fractals 20, 69-75 (2004)
    • (2004) Chaos, Solitons and Fractals , vol.20 , pp. 69-75
    • Latora, V.1    Marchiori, M.2
  • 10
    • 85088176809 scopus 로고    scopus 로고
    • Memon Nasrullah, Hicks David Lane, Larsen Henrik Legind. (2007). How Investigative Data Mining Can Help Intelligence Agencies to Detect Dependence of Nodes in Terrorist Networks. In: R. Alhajj et al. (Eds.): ADMA 2007, LNAI 4632, pp. 430-441, 2007.
    • Memon Nasrullah, Hicks David Lane, Larsen Henrik Legind. (2007). How Investigative Data Mining Can Help Intelligence Agencies to Detect Dependence of Nodes in Terrorist Networks. In: R. Alhajj et al. (Eds.): ADMA 2007, LNAI 4632, pp. 430-441, 2007.
  • 11
    • 84930064585 scopus 로고    scopus 로고
    • Hierarchical Organization in Complex Networks
    • Ravasz, E. A. L., Barabasi, (2003). Hierarchical Organization in Complex Networks. Physical Review, E 67, 026112.
    • (2003) Physical Review, E , vol.67 , pp. 026112
    • Ravasz, E.A.L.1    Barabasi2
  • 12
    • 19544372602 scopus 로고    scopus 로고
    • Hierarchical Backbone of Complbex Networks
    • Costa, L. D. F. (2004). Hierarchical Backbone of Complbex Networks. Phys. Rev. Lett. 93, 098702.
    • (2004) Phys. Rev. Lett , vol.93 , pp. 098702
    • Costa, L.D.F.1
  • 14
    • 2942677286 scopus 로고    scopus 로고
    • Networks Dynamics and Modularity
    • Variano, E. A. et al (2004). Networks Dynamics and Modularity. Phys. Rev. Lett. 92, 188701.
    • (2004) Phys. Rev. Lett , vol.92 , pp. 188701
    • Variano, E.A.1
  • 16
    • 49049107217 scopus 로고    scopus 로고
    • Memon Nasrullah and Larsen Henrik Legind. (2006) Practical Algorithms of Destabilizing Terrorist Networks. In the proceedings of IEEE Intelligence Security Conference, San Diego, Lecture Notes in Computer Science, Springer-Verlag, 3976: pp. 398-411 (2006)
    • Memon Nasrullah and Larsen Henrik Legind. (2006) Practical Algorithms of Destabilizing Terrorist Networks. In the proceedings of IEEE Intelligence Security Conference, San Diego, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3976: pp. 398-411 (2006)
  • 17
    • 0242465495 scopus 로고    scopus 로고
    • The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands
    • Klerks, P. (2002) The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3): 53-65.
    • (2002) Connections , vol.24 , Issue.3 , pp. 53-65
    • Klerks, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.