An innovative approach for identification of pivotal node in terrorist network using promethee method (an anti-terrorism approach)
暂无分享,去创建一个
Saurabh Singh | Akhilesh Tiwari | Shashikant Verma | Akhilesh Tiwari | Shashikant Verma | Saurabh Singh
[1] W. D. Keyser,et al. A note on the use of PROMETHEE multicriteria methods , 1996 .
[2] Arvind Gupta,et al. A Quantitative Assessment on 26/11 Mumbai Attack using Social Network Analysis , 2011 .
[3] David L. Hicks,et al. Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies , 2008, ISI Workshops.
[4] Hsinchun Chen,et al. Criminal network analysis and visualization , 2005, CACM.
[5] David L. Hicks,et al. How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks , 2007, ADMA.
[6] Gilles D'Avignon,et al. Specialization of hospital services in Quebec: An application of the promethee and GAIA methods , 1989 .
[7] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[9] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[10] Ahmed Rezine,et al. Detecting Key Players in Terrorist Networks , 2012, 2012 European Intelligence and Security Informatics Conference.
[11] William P. Fox,et al. Using Mathematical Models in Decision Making Methodologies to Find Key Nodes in the Noordin Dark Network , 2014 .