Practical Algorithms for Destabilizing Terrorist Networks
暂无分享,去创建一个
[1] Nasrullah Memon,et al. Investigative Data Mining: A General Framework , 2004, International Conference on Computational Intelligence.
[2] S. Strogatz. Exploring complex networks , 2001, Nature.
[3] Destabilizing networks , 2002 .
[4] Jonathan David Farley,et al. Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .
[5] Sergei Maslov,et al. Hierarchy measures in complex networks. , 2003, Physical review letters.
[6] Hani Hanjour,et al. Destabilizing Dynamic Covert Networks , 2003 .
[7] Albert-László Barabási,et al. Hierarchical organization in complex networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[8] Albert,et al. Dynamics of complex systems: scaling laws for the period of boolean networks , 2000, Physical review letters.
[9] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[10] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.
[11] Sergei Maslov,et al. Hierarchy and Anti-Hierarchy in Real and Scale Free networks , 2003 .
[12] Massimo Marchiori,et al. How the science of complex networks can help developing strategies against terrorism , 2004 .
[13] S. N. Dorogovtsev,et al. Evolution of networks , 2001, cond-mat/0106144.
[14] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[15] Nasrullah Memon,et al. Notice of Violation of IEEE Publication PrinciplesPractical approaches for analysis, visualization and destabilizing terrorist networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).