-
5
-
-
84876409138
-
-
UCINET 6
-
Analytic Technologies, 2010. UCINET 6. < www.analytictech.com/ucinet >.
-
(2010)
Analytic Technologies
-
-
-
6
-
-
33746192198
-
A graph-theoretic framework for classifying centrality measures
-
S.P. Borgatti, and M.G. Everett A graph-theoretic framework for classifying centrality measures Social Networks 28 2006 466 484
-
(2006)
Social Networks
, vol.28
, pp. 466-484
-
-
Borgatti, S.P.1
Everett, M.G.2
-
9
-
-
34248045384
-
Breaking Al Qaeda cells: A mathematical analysis of counterterrorism operations
-
J.D. Farley Breaking Al Qaeda cells: a mathematical analysis of counterterrorism operations Studies in Conflict and Terrorism 26 2003 399 411
-
(2003)
Studies in Conflict and Terrorism
, vol.26
, pp. 399-411
-
-
Farley, J.D.1
-
10
-
-
84865730611
-
A set of measures of centrality based on betweenness
-
L.C. Freeman A set of measures of centrality based on betweenness Sociometry 40 1977 35 41
-
(1977)
Sociometry
, vol.40
, pp. 35-41
-
-
Freeman, L.C.1
-
11
-
-
0037908982
-
Centrality and power in social networks: A game theoretic approach
-
D. Gomez, E. González-Arangúena, C. Manuel, G. Owen, M. del Pozo, and J. Tejada Centrality and power in social networks: a game theoretic approach Mathematical Social Sciences 46 2003 27 54
-
(2003)
Mathematical Social Sciences
, vol.46
, pp. 27-54
-
-
Gomez, D.1
González-Arangúena, E.2
Manuel, C.3
Owen, G.4
Del Pozo, M.5
Tejada, J.6
-
14
-
-
77951685570
-
When heads roll: Assessing the effectiveness of leadership decapitation
-
J. Jordan When heads roll: assessing the effectiveness of leadership decapitation Security Studies 18 2009 719 755
-
(2009)
Security Studies
, vol.18
, pp. 719-755
-
-
Jordan, J.1
-
16
-
-
0242465495
-
The network paradigm applied to criminal organizations
-
P. Klerks The network paradigm applied to criminal organizations Connections 24 2001 53 65
-
(2001)
Connections
, vol.24
, pp. 53-65
-
-
Klerks, P.1
-
17
-
-
33748497129
-
A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence
-
S. Koschade A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence Studies in Conflict and Terrorism 29 2006 559 575
-
(2006)
Studies in Conflict and Terrorism
, vol.29
, pp. 559-575
-
-
Koschade, S.1
-
18
-
-
7644224668
-
Uncloaking terrorist networks
-
V.E. Krebs Uncloaking terrorist networks First Monday 7 2002 1 10
-
(2002)
First Monday
, vol.7
, pp. 1-10
-
-
Krebs, V.E.1
-
19
-
-
62549142647
-
The influence of secrecy on the communication structure of covert networks
-
R.H.A. Lindelauf, P. Borm, and H. Hamers The influence of secrecy on the communication structure of covert networks Social Networks 31 2009 126 137
-
(2009)
Social Networks
, vol.31
, pp. 126-137
-
-
Lindelauf, R.H.A.1
Borm, P.2
Hamers, H.3
-
20
-
-
84868551819
-
Understanding terrorist network topologies and their resilience against disruption
-
Uffe Kock, W.; (Ed.) Springer Vienna
-
Lindelauf, R.H.A.; Borm, P.; Hamers, H.; 2011. Understanding terrorist network topologies and their resilience against disruption. In: Uffe Kock, W.; (Ed.), Counterterrorism and Open Source Intelligence, Lecture Notes in Social Networks. Springer Vienna, pp. 61-72.
-
(2011)
Counterterrorism and Open Source Intelligence, Lecture Notes in Social Networks
, pp. 61-72
-
-
Lindelauf, H.R.A.1
Borm, P.2
Hamers, H.3
-
21
-
-
84876407467
-
-
Los Angeles Times 9/11-plotter. September 27, 2002
-
Los Angeles Times, 2002. Document Links al Qaeda Paymaster, 9/11-plotter. September 27, 2002.
-
(2002)
Document Links Al Qaeda Paymaster
-
-
-
22
-
-
20344393500
-
The structural analysis of criminal networks
-
Canter, D.; Alison, L. (Eds.) III. Aldershot: Dartmouth
-
McAndrew, D.; 1999. The structural analysis of criminal networks. In: Canter, D.; Alison, L. (Eds.), The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. Aldershot: Dartmouth.
-
(1999)
The Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series
-
-
McAndrew, D.1
-
23
-
-
41349096036
-
Analysis of weighted networks
-
M.E.J. Newman Analysis of weighted networks Physical Review E 70 2004 56 131
-
(2004)
Physical Review e
, vol.70
, pp. 56-131
-
-
Newman, M.E.J.1
-
25
-
-
0347513792
-
Analysis of sociometric data
-
P.W. Holland, S. Leinhardt, Dryden Press New York
-
C.H. Proctor, and C.P. Loomis Analysis of sociometric data P.W. Holland, S. Leinhardt, Research Methods in Social Relations 1951 Dryden Press New York 561 586
-
(1951)
Research Methods in Social Relations
, pp. 561-586
-
-
Proctor, C.H.1
Loomis, C.P.2
-
26
-
-
36348994955
-
Social network analysis as an approach to combat terrorism: Past, present and future research
-
S. Ressler Social network analysis as an approach to combat terrorism: past, present and future research Homeland Security Affairs 2 2006 1 10
-
(2006)
Homeland Security Affairs
, vol.2
, pp. 1-10
-
-
Ressler, S.1
-
28
-
-
0012254042
-
The application of network analysis to criminal intelligence: An assessment of the prospects
-
M. Sparrow The application of network analysis to criminal intelligence: an assessment of the prospects Social Networks 13 1991 251 274
-
(1991)
Social Networks
, vol.13
, pp. 251-274
-
-
Sparrow, M.1
-
30
-
-
84876409626
-
-
The Washington Post U.S. intends to keep adding names to kill lists. October 24, 2012
-
The Washington Post (2012). Plan for hunting terrorists signals, U.S. intends to keep adding names to kill lists. October 24, 2012.
-
(2012)
Plan for Hunting Terrorists Signals
-
-
-
31
-
-
85044913143
-
Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence
-
M. Tsvetovat, and K.M. Carley Structural knowledge and success of anti-terrorist activity: the downside of structural equivalence Journal of Social Structure 6 2005 268 276
-
(2005)
Journal of Social Structure
, vol.6
, pp. 268-276
-
-
Tsvetovat, M.1
Carley, K.M.2
-
34
-
-
20344376408
-
Criminal network analysis and visualization: A data mining perspective
-
J. Xu, and H. Chen Criminal network analysis and visualization: a data mining perspective Communications of the ACM 48 6 2005 101 107
-
(2005)
Communications of the ACM
, vol.48
, Issue.6
, pp. 101-107
-
-
Xu, J.1
Chen, H.2
|