-
2
-
-
77958180539
-
On heterogeneous covert networks
-
Springer
-
R. Lindelauf, P. Borm, and H. Hamers, "On heterogeneous covert networks, "Mathematical Methods in Counterterrorism, 2009, pp. 215- 228. Springer.
-
(2009)
Mathematical Methods in Counterterrorism
, pp. 215-228
-
-
Lindelauf, R.1
Borm, P.2
Hamers, H.3
-
3
-
-
62549142647
-
The influence of secrecy on the communication structure of covert networks
-
Elsevier
-
R. Lindelauf, P. Borm, and H. Hamers, "The influence of secrecy on the communication structure of covert networks, " Social Networks, 31 (2009), 126-137. Elsevier.
-
(2009)
Social Networks
, vol.31
, pp. 126-137
-
-
Lindelauf, R.1
Borm, P.2
Hamers, H.3
-
4
-
-
77955369767
-
Knowledge management processes, tools and techniques for counterterrorism
-
(Funchal, Portugal, October ), INSTICC Press
-
U. K. Wiil, N. Memon, and J. Gniadek, "Knowledge management processes, tools and techniques for counterterrorism, " Proceedings of the International Conference on Knowledge Management and Information Sharing, (Funchal, Portugal, October 2009), pp. 29-36. INSTICC Press.
-
(2009)
Proceedings of the International Conference on Knowledge Management and Information Sharing
, pp. 29-36
-
-
Wiil, U.K.1
Memon, N.2
Gniadek, J.3
-
6
-
-
77955369825
-
Harvesting covert networks: The case study of the iMiner database
-
Inderscience Publishers
-
N. Memon, U. K. Wiil, R. Alhajj, C. Atzenbeck, and N. Harkiolakis, "Harvesting covert networks: the case study of the iMiner database, " International Journal of Networking and Virtual Organizations, 2010. Inderscience Publishers.
-
(2010)
International Journal of Networking and Virtual Organizations
-
-
Memon, N.1
Wiil, U.K.2
Alhajj, R.3
Atzenbeck, C.4
Harkiolakis, N.5
-
7
-
-
45149134764
-
Analyzing actors and their discussion topics by semantic social network analysis
-
P. A. Gloor and Y. Zhao, "Analyzing actors and their discussion topics by semantic social network analysis, " Information Visualization, 2006, pp. 130-135.
-
(2006)
Information Visualization
, pp. 130-135
-
-
Gloor, P.A.1
Zhao, Y.2
-
8
-
-
7644224668
-
Uncloaking terrorist networks
-
(4-1)
-
V. E. Krebs, "Uncloaking terrorist networks, " First Monday, 7(4-1), 2002.
-
(2002)
First Monday
, vol.7
-
-
Krebs, V.E.1
-
9
-
-
33847103814
-
Rational terrorists and optimal network structure
-
W. Enders and X. Su, "Rational terrorists and optimal network structure, " Journal of Conflict Resolution, 51(1):33, 2007.
-
(2007)
Journal of Conflict Resolution
, vol.51
, Issue.1
, pp. 33
-
-
Enders, W.1
Su, X.2
-
10
-
-
0141990841
-
How the science of complex networks can help developing strategies against terrorism
-
V. Latora and M. Marchiori, "How the science of complex networks can help developing strategies against terrorism, " Chaos, Solitons and Fractals, 20(1):69-75, 2004.
-
(2004)
Chaos, Solitons and Fractals
, vol.20
, Issue.1
, pp. 69-75
-
-
Latora, V.1
Marchiori, M.2
-
11
-
-
84923618755
-
The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry
-
W.E. Baker and R.R. Faulkner, "The social organization of conspiracy: illegal networks in the heavy electrical equipment industry, " American Sociological Review, 837-860, 1993.
-
(1993)
American Sociological Review
, pp. 837-860
-
-
Baker, W.E.1
Faulkner, R.R.2
-
13
-
-
77958188318
-
Inference approaches to constructing covert social network topologies
-
Springer
-
C. J. Rhodes, "Inference approaches to constructing covert social network topologies, " Mathematical Methods in Counterterrorism, 2009, pp. 127-140. Springer.
-
(2009)
Mathematical Methods in Counterterrorism
, pp. 127-140
-
-
Rhodes, C.J.1
-
15
-
-
13944252976
-
A measure of betweenness centrality based on random walks
-
M. E. J. Newman, "A measure of betweenness centrality based on random walks, " Social networks, 27(1):39-54, 2005.
-
(2005)
Social Networks
, vol.27
, Issue.1
, pp. 39-54
-
-
Newman, M.E.J.1
-
16
-
-
0242549048
-
Destabilizing networks
-
K. M. Carley, J. S. Lee, and D. Krackhardt, "Destabilizing networks, " Connections, 24(3):31-34, 2001.
-
(2001)
Connections
, vol.24
, Issue.3
, pp. 31-34
-
-
Carley, K.M.1
Lee, J.S.2
Krackhardt, D.3
-
19
-
-
33645902544
-
Importance and exposure in road network vulnerability analysis
-
E. Jenelius, T. Petersen, and L. G. Mattsson, "Importance and exposure in road network vulnerability analysis, " Transportation Research Part A, 40(7):537-560, 2006.
-
(2006)
Transportation Research
, vol.40
, Issue.7 PART A
, pp. 537-560
-
-
Jenelius, E.1
Petersen, T.2
Mattsson, L.G.3
-
21
-
-
77958173640
-
-
Masters Thesis, Counterterrorism Research Lab, The Maersk Mc-Kinney Moller Institute, University of Southern Denmark
-
J. Gniadek, "Destabilizing terrorist networks through link importance analysis", Masters Thesis, Counterterrorism Research Lab, The Maersk Mc-Kinney Moller Institute, University of Southern Denmark, 2010.
-
(2010)
Destabilizing Terrorist Networks through Link Importance Analysis
-
-
Gniadek, J.1
|