Mapping and deterring violent extremist networks in North-West Africa
暂无分享,去创建一个
[1] J. Mathews. The United States Department of State , 1919 .
[2] Roger V. Gould,et al. Structures of Mediation: A Formal Approach to Brokerage in Transaction Networks , 1989 .
[3] Armed Conflicts , 2001, Economic, Social and Cultural Rights.
[4] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[5] Sandra Gonzalez,et al. Dynamic Social Network Modelling and Analysis: Workshop Summary and Papers Edited by Ronald L. Breiger, Kathleen M. Carley and Philippa Pattison , 2003, J. Artif. Soc. Soc. Simul..
[6] T. Wilbanks,et al. Intelligent emergency response systems , 2003 .
[7] Kathleen M. Carley,et al. Destabilizing Dynamic Covert Networks , 2003 .
[8] Philippa Pattison,et al. Dynamic Social Network Modelling and Analysis , 2003 .
[9] C. Flint. Terrorism and Counterterrorism: Geographic Research Questions and Agendas , 2003, The Professional Geographer.
[10] R. Hudson. Terrorist and Organized Crime Groups in the Tri-Border Area (TBA) of South America , 2003 .
[11] Kathleen M. Carley,et al. Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers , 2004 .
[12] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[13] Claude Berrebi,et al. HOW DOES TERRORISM RISK VARY ACROSS SPACE AND TIME? AN ANALYSIS BASED ON THE ISRAELI EXPERIENCE , 2006 .
[14] Daniel J. Brass,et al. Exploring the Social Ledger: Negative Relationships and Negative Asymmetry in Social Networks in Organizations , 2006 .
[15] Kathleen M. Carley. A Dynamic Network Approach to the Assessment of Terrorist Groups and the Impact of Alternative Courses of Action , 2006 .
[16] C. Stohl,et al. Networks of Terror: Theoretical Assumptions and Pragmatic Consequences , 2007 .
[17] Colin Flint,et al. Denial of Sanctuary: Understanding Terrorist Safe Havens , 2007 .
[18] Ke Liao,et al. Visualizing Patterns in a Global Terrorism Incident Database , 2007 .
[19] Cristiana C. Brafman Kittner. The Role of Safe Havens in Islamist Terrorism , 2007 .
[20] David B. Skillicorn,et al. Knowledge Discovery for Counterterrorism and Law Enforcement , 2008 .
[21] George F. Hepner,et al. Geospatial Analysis of Dynamic Terrorist Networks , 2008 .
[22] D. H. Gray,et al. Al-Qaeda in the Islamic Maghreb: the evolution from Algerian Islamism to transnational terror , 2008 .
[23] J. Migdal. Boundaries and Belonging: States and Societies in the Struggle to Shape Identities and Local Practices , 2008 .
[24] Stephen E. Reynolds,et al. Values and violence : intangible aspects of terrorism , 2008 .
[25] Paul F. Diehl,et al. Conceptualizing ConflictSpace: Toward a Geography of Relational Power and Embeddedness in the Analysis of Interstate Conflict , 2009 .
[26] Jean-Pierre Filiu,et al. Al-Qaeda in the Islamic Maghreb , 2009 .
[27] D. H. Gray,et al. Terrorist Black Holes: Global Regions Shrouded in Lawlessness , 2010 .
[28] O. Walther,et al. Sahara or Sahel? The Fuzzy Geography of Terrorism in West Africa , 2010 .
[29] Colin Flint,et al. Spatializing Social Networks: Using Social Network Analysis to Investigate Geographies of Gang Rivalry, Territoriality, and Violence in Los Angeles , 2010 .
[30] R. Larémont. Al Qaeda in the Islamic Maghreb: Terrorism and Counterterrorism in the Sahel , 2011 .
[31] A. Perliger,et al. Social Network Analysis in the Study of Terrorism and Political Violence , 2011, PS: Political Science & Politics.
[32] Stephen A. Emerson. Desert insurgency: lessons from the third Tuareg rebellion , 2011 .
[33] Judit Pál,et al. How Negative Networks Are Forming and Changing in Time ? Theoretical Overview and Empirical Analysis in Two High-school Classes , 2011 .
[34] Todd Sandler,et al. New frontiers of terrorism research: An introduction , 2011 .
[35] Benjamin Ducol,et al. Rethinking Terrorist Safe Havens: Beyond a State-Centric Approach , 2011 .
[36] George F. Hepner,et al. Advancing the Understanding of Sociospatial Dependencies in Terrorist Networks , 2011, Trans. GIS.
[37] Sean F. Everton. Disrupting Dark Networks , 2012 .
[38] Wolfram Lacher,et al. Organized Crime and Conflict in the Sahel-Sahara Region , 2012 .
[39] Jacob Zenn. Northern Nigeria's Boko Haram: The Prize in al-Qaeda's Africa Strategy , 2012 .
[40] Henry Wilkinson. Reversal of fortune: AQIM's stalemate in Algeria and its new front in the Sahel , 2012 .
[41] Peng Wang,et al. Univariate and multivariate models of positive and negative networks: Liking, disliking, and bully-victim relationships , 2012, Soc. Networks.
[42] Richard M. Medina,et al. An Overview of Geographical Perspectives and Approaches in Terrorism Research , 2013 .
[43] George F. Hepner,et al. The Geography of International Terrorism: An Introduction to Spaces and Places of Violent Non-State Groups , 2013 .
[44] Wolfram Lacher. Mali : Beyond Counterterrorism , 2013 .
[45] Ke Liao,et al. Early Detection of Terrorism Outbreaks Using Prospective Space–Time Scan Statistics , 2013 .
[46] Katherine Zimmerman. The Al Qaeda Network: A New Framework for Defining the Enemy , 2013 .
[47] Paulo Shakarian,et al. Mining for Spatially-Near Communities in Geo-Located Social Networks , 2013, AAAI Fall Symposia.
[48] Olivier Walther,et al. Conceptualizing the Mobility of Space through the Malian Conflict , 2013 .
[49] Lawrence E. Cline,et al. Nomads, Islamists, and Soldiers: The Struggles for Northern Mali , 2013 .
[50] C. Raleigh,et al. The myth of global Islamic terrorism and local conflict in Mali and the Sahel , 2013 .
[51] Mathieu Pellerin. Re-mapping the Sahel : transnational security challenges and international responses , 2014 .
[52] O. Walther,et al. Rethinking borders in a mobile world: An alternative model , 2014 .
[53] Lotta Themnér,et al. Armed conflicts, 1946–2013 , 2014 .
[54] Martin G. Everett,et al. Networks containing negative ties , 2014, Soc. Networks.
[55] P. Duijn,et al. The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.
[56] Jacob Zenn,et al. Boko Haram: Recruitment, Financing, and Arms Trafficking in the Lake Chad Region , 2014 .
[57] O. Walther. Security issues, movement and networks in the Sahara-Sahel , 2014 .
[58] Elizabeth Grimm Arsenault,et al. Disaggregating and Defeating Terrorist Safe Havens , 2015 .
[59] Olivier Walther,et al. Islamic Terrorism and the Malian Rebellion , 2015 .
[60] Kathleen M. Carley,et al. Spatiotemporal Network Analysis and Visualization , 2015, Int. J. Appl. Geospat. Res..
[61] Andrew Wojtanik. Mokhtar Belmokhtar: One-Eyed Firebrand of North Africa and the Sahel , 2015 .
[62] 河本 志朗,et al. 米国務省Country Reports on Terrorism 2014にみる国際テロ情勢 , 2016 .
[63] Marc K. Wallack,et al. The Evolution of a Revolution , 2016 .