Social Network Analysis: A case study of the Islamist terrorist network
暂无分享,去创建一个
[1] Steven B. Andrews,et al. Structural Holes: The Social Structure of Competition , 1995, The SAGE Encyclopedia of Research Design.
[2] Stephen J. Ressler. Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .
[3] George F. Hepner,et al. Advancing the Understanding of Sociospatial Dependencies in Terrorist Networks , 2011, Trans. GIS.
[4] Michael Mousseau,et al. Market Civilization and Its Clash with Terror , 2003, International Security.
[5] Brynjar Lia,et al. Architect of Global Jihad: The Life of Al-Qaida Strategist Abu Mus'ab Al-Suri , 2007 .
[6] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[7] Aili Malm,et al. Comparing the ties that bind criminal networks: Is blood thicker than water? , 2010 .
[8] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[9] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[10] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[11] Albert-László Barabási,et al. Linked - how everything is connected to everything else and what it means for business, science, and everyday life , 2003 .
[12] R. Gunaratna. Inside Al Qaeda: Global Network of Terror , 2002 .
[13] Marc Sageman,et al. Connecting Terrorist Networks , 2008 .
[14] Laura K. Siebeneck,et al. A Geographic Information Systems (GIS) Analysis of Spatiotemporal Patterns of Terrorist Incidents in Iraq 2004–2009 , 2011 .
[15] Alan T. Murray,et al. Vital Nodes, Interconnected Infrastructures, and the Geographies of Network Survivability , 2006 .
[16] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[17] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[18] Stephen E. Reynolds,et al. Values and violence : intangible aspects of terrorism , 2008 .
[19] George F. Hepner,et al. Geospatial Analysis of Dynamic Terrorist Networks , 2008 .
[20] S. Koschade. A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .
[21] R. Hanneman. Introduction to Social Network Methods , 2001 .
[22] George F. Hepner,et al. A Sociospatial Approach to Understanding Terrorist Networks , 2011 .
[23] Hawoong Jeong,et al. Classification of scale-free networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[24] Aili Malm,et al. Social Network and Distance Correlates of Criminal Associates Involved in Illicit Drug Production , 2008 .
[25] Hsinchun Chen,et al. The Dynamics of Terrorist Networks: Understanding the Survival Mechanisms of Global Salafi Jihad , 2009 .
[26] John Arquilla,et al. The Advent of Netwar (Revisited) , 2001 .
[27] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[28] Mitchell Moss,et al. The Stafford Act and Priorities for Reform , 2009 .
[29] Executive Summary,et al. COUNTERING GLOBAL INSURGENCY , 2004 .
[30] Rohan Gunaratna,et al. The post‐madrid face of Al Qaeda , 2004 .
[31] Marco Gonzalez,et al. Author's Personal Copy Social Networks Tastes, Ties, and Time: a New Social Network Dataset Using Facebook.com , 2022 .
[32] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[33] Sharon L. Milgram,et al. The Small World Problem , 1967 .