-
1
-
-
0038589165
-
The anatomy of a large-scale hypertextual Web search engine
-
Apr.
-
Brin, S. and Page, L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks 30, 1-7 (Apr. 1998), 107-117.
-
(1998)
Computer Networks
, vol.30
, Issue.1-7
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
3
-
-
0242549048
-
Destabilizing networks
-
Carley, K.M., Lee, J.-S., and Krackhardt, D. Destabilizing networks. Connections 24, 3 (2002), 79-92.
-
(2002)
Connections
, vol.24
, Issue.3
, pp. 79-92
-
-
Carley, K.M.1
Lee, J.-S.2
Krackhardt, D.3
-
7
-
-
0038401985
-
Mapping networks of terrorist cells
-
Krebs, V.E. Mapping networks of terrorist cells. Connections 24, 3 (2002), 43-52.
-
(2002)
Connections
, vol.24
, Issue.3
, pp. 43-52
-
-
Krebs, V.E.1
-
8
-
-
0002719797
-
The Hungarian method for the assignment problem
-
Mar.
-
Kuhn, H.W. The Hungarian method for the assignment problem. Naval Research Logistics Quarterly 2, 1-2 (Mar. 1955), 83-97.
-
(1955)
Naval Research Logistics Quarterly
, vol.2
, Issue.1-2
, pp. 83-97
-
-
Kuhn, H.W.1
-
9
-
-
0141990841
-
How the science of complex networks can help developing strategies against terrorism
-
Apr.
-
Latora, V. and Marchiori, M. How the science of complex networks can help developing strategies against terrorism. Chaos, Solitons & Fractals 20, 1 (Apr. 2004), 69-75.
-
(2004)
Chaos, Solitons & Fractals
, vol.20
, Issue.1
, pp. 69-75
-
-
Latora, V.1
Marchiori, M.2
-
10
-
-
62549142647
-
The influence of secrecy on the communication structure of covert networks
-
May
-
Lindelauf, R., Borm, P., and Hamers, H. The influence of secrecy on the communication structure of covert networks. Social Networks 31, 2 (May 2009), 126-137.
-
(2009)
Social Networks
, vol.31
, Issue.2
, pp. 126-137
-
-
Lindelauf, R.1
Borm, P.2
Hamers, H.3
-
11
-
-
84905281250
-
Is counterterrorism good value for money?
-
Apr.
-
Lomborg, B. Is counterterrorism good value for money? NATO Review Magazine (Apr. 2008).
-
(2008)
NATO Review Magazine
-
-
Lomborg, B.1
-
13
-
-
84868534941
-
Identifying important nodes in weighted covert networks using generalized centrality measures
-
Odense, Denmark, Aug. 22-24). IEEE Computer Society
-
Memon, B.R. Identifying important nodes in weighted covert networks using generalized centrality measures. In Proceedings of the European Intelligence and Security Informatics Conference (Odense, Denmark, Aug. 22-24). IEEE Computer Society, 2012, 131-140.
-
(2012)
Proceedings of the European Intelligence and Security Informatics Conference
, pp. 131-140
-
-
Memon, B.R.1
-
14
-
-
33745922062
-
Practical algorithms for destabilizing terrorist networks
-
(San Diego, CA, May 23-24). Springer
-
Memon, N. and Larsen, H.L. Practical algorithms for destabilizing terrorist networks. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (San Diego, CA, May 23-24). Springer, 2006, 389-400.
-
(2006)
Proceedings of the IEEE International Conference on Intelligence and Security Informatics
, pp. 389-400
-
-
Memon, N.1
Larsen, H.L.2
-
16
-
-
0000849368
-
An algorithm for ranking all the assignments in order of increasing cost
-
May-June
-
Murty, K.G. An algorithm for ranking all the assignments in order of increasing cost. Operations Research 16, 3 (May-June 1968), 682-687.
-
(1968)
Operations Research
, vol.16
, Issue.3
, pp. 682-687
-
-
Murty, K.G.1
-
17
-
-
84870513436
-
Mining for offender group detection and story of a police operation
-
(Gold Coast, Australia, Dec. 3-4). Australian Computer Society, Sydney
-
Ozgul, F., Bondy, J., and Aksoy, H. Mining for offender group detection and story of a police operation. In Proceedings of the Sixth Australasian Conference on Data Mining and Analytics (Gold Coast, Australia, Dec. 3-4). Australian Computer Society, Sydney, 2007, 189-193.
-
(2007)
Proceedings of the Sixth Australasian Conference on Data Mining and Analytics
, pp. 189-193
-
-
Ozgul, F.1
Bondy, J.2
Aksoy, H.3
-
18
-
-
84903667395
-
-
University of Pennsylvania Press, Philadelphia
-
Sageman, M. Understanding Terror Networks. University of Pennsylvania Press, Philadelphia, 2004.
-
(2004)
Understanding Terror Networks
-
-
Sageman, M.1
-
19
-
-
84929918525
-
-
SpringerLink : Bücher. Springer London, Ltd.
-
Subrahmanian, V., Mannes, A., Sliva, A., Shakarian, J., and Dickerson, J. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba. SpringerLink : Bücher. Springer London, Ltd., 2012.
-
(2012)
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
-
-
Subrahmanian, V.1
Mannes, A.2
Sliva, A.3
Shakarian, J.4
Dickerson, J.5
-
21
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
June 4
-
Watts, D.J. and Strogatz, S.H. Collective dynamics of 'small-world' networks. Nature 393, 6684 (June 4, 1998), 440-442.
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
|