Dismantling terrorist networks: Evaluating strategic options using agent-based modeling
暂无分享,去创建一个
[1] Maciej Latek,et al. Dynamics of Agent Organizations: Application to Modeling Irregular Warfare , 2009, MABS.
[2] Scott Gerwehr,et al. Al-Qaida: Terrorist Selection and Recruitment , 2006 .
[3] Eric Bonabeau,et al. Agent-based modeling: Methods and techniques for simulating human systems , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[4] H. Milward,et al. Dark Networks as Problems , 2003 .
[5] Richard A. Falkenrath,et al. Analytic Models and Policy Prescription: Understanding Recent Innovation in U.S. Counterterrorism , 2001 .
[6] Joshua M. Epstein. Agent-based computational models and generative social science , 1999 .
[7] Douglas H. Walker,et al. Developing Metrics in the Global War on Terrorism , 2005 .
[8] Hsinchun Chen,et al. The topology of dark networks , 2008, Commun. ACM.
[9] David J. Kilcullen. Countering global insurgency , 2005 .
[10] B. Bollobás. The evolution of random graphs , 1984 .
[11] César A. Hidalgo,et al. Scale-free networks , 2008, Scholarpedia.
[12] Kevin C. Desouza,et al. Impeding insurgent attacks: The information management agenda , 2007 .
[13] Martin Suter,et al. Small World , 2002 .
[14] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[15] M. Macy,et al. FROM FACTORS TO ACTORS: Computational Sociology and Agent-Based Modeling , 2002 .
[16] J. Holland,et al. Artificial Adaptive Agents in Economic Theory , 1991 .
[17] Martin C. Libicki,et al. How Terrorist Groups End , 2008 .
[18] D. Watts. Networks, Dynamics, and the Small‐World Phenomenon1 , 1999, American Journal of Sociology.
[19] Kathleen M. Carley,et al. Modeling Complex Socio-technical Systems using Multi-Agent Simulation Methods , 2004, Künstliche Intell..
[20] M. Emiliani,et al. Terrorism in Indonesia: Noordin's Networks , 2009 .
[21] P. Doreian. Causality in Social Network Analysis , 2001 .
[22] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[23] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[24] Kevin C. Desouza,et al. Managing the Proliferation of Weapons of Mass Destruction: An Information Management Perspective , 2008 .
[25] Aidan Kirby,et al. The London Bombers as “Self-Starters”: A Case Study in Indigenous Radicalization and the Emergence of Autonomous Cliques , 2007 .
[26] Carlos M. Del Rio,et al. What You Need to Know , 2012 .
[27] Eliot R. Smith,et al. Agent-Based Modeling: A New Approach for Theory Building in Social Psychology , 2007, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[28] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[29] Albert,et al. Topology of evolving networks: local events and universality , 2000, Physical review letters.
[30] Ray Takeyh,et al. Do terrorist networks need a home? , 2002 .
[31] Kevin C. Desouza,et al. Connectivity among Terrorist Groups: A Two Models Business Maturity Approach , 2007 .
[32] Kevin C. Desouza,et al. Information and Knowledge Management in Public Sector Networks: The Case of the US Intelligence Community , 2009 .