Emerging Trends in Social Network Analysis of Terrorism and Counterterrorism
暂无分享,去创建一个
[1] Sean F. Everton. Disrupting Dark Networks , 2012 .
[2] G. Curtis,et al. The Nexus Among Terrorists, Narcotics Traffickers, Weapons Proliferators, and Organized Crime Networks in Western Europe , 2002 .
[3] Nicola Horsburgh,et al. Strengths and Weaknesses of Grassroot Jihadist Networks: The Madrid Bombings , 2008 .
[4] Doug Bond,et al. Using Hidden Markov Models to Predict Terror Before it Hits (Again) , 2013 .
[5] Brian A. Jackson. Groups, Networks, or Movements: A Command-and-Control-Driven Approach to Classifying Terrorist Organizations and Its Application to Al Qaeda , 2006 .
[6] Jonathan David Farley,et al. Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .
[7] Kathleen M. Carley. A Dynamic Network Approach to the Assessment of Terrorist Groups and the Impact of Alternative Courses of Action , 2006 .
[8] A. Perliger,et al. The Changing Nature of Suicide Attacks - A Social Network Perspective , 2006, Social Forces.
[9] Brian Delaney,et al. Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition , 2009, 2009 IEEE Aerospace conference.
[10] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[12] S. Koschade. A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .
[13] Shandon Harris-Hogan. Australian Neo-Jihadist Terrorism: Mapping the Network and Cell Analysis Using Wiretap Evidence , 2012 .
[14] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.
[15] Sam Mullins. Social network analysis and terrorism: an introduction to the special issue , 2013 .
[16] Lauren McGough. Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes , 2009 .
[17] Herbert Hamers,et al. The Influence of Secrecy on the Communication Structure of Covert Networks , 2008, Soc. Networks.
[18] Kevin C. Desouza,et al. Dismantling terrorist networks: Evaluating strategic options using agent-based modeling , 2010 .
[19] V. S. Subrahmanian,et al. A Computationally-Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu and Kashmir , 2011, 2011 European Intelligence and Security Informatics Conference.
[20] Naim Kapucu,et al. Anatomy of a dark network: the case of the Turkish Ergenekon terrorist organization , 2012 .
[21] V. S. Subrahmanian,et al. Handbook of Computational Approaches to Counterterrorism , 2013, Springer New York.
[22] S Mahesh. USING DATA MINING TECHNIQUES FOR DETECTING TERROR- RELATED ACTIVITIES ON THE WEB , 2010 .
[23] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[24] David C. Rapoport. The Fourth Wave: September 11 in the History of Terrorism , 2001 .
[25] E. Chadwick. It's War, Jim, But Not As We Know It: A ``Reality-Check'' for International Laws of War? , 2013 .
[26] Marc Sageman,et al. Connecting Terrorist Networks , 2008 .
[27] Ersun N. Kurtulus. The New Counterterrorism: Contemporary Counterterrorism Trends in the United States and Israel , 2012 .
[28] C. Sterling. The terror network : the secret war of international terrorism , 1981 .
[29] Bruce A. Desmarais,et al. Forecasting the locational dynamics of transnational terrorism: a network analytic approach , 2011, 2011 European Intelligence and Security Informatics Conference.
[30] V. S. Subrahmanian,et al. The SOMA Terror Organization Portal (STOP): social network and analytic tools for the real-time analysis of terror groups , 2008 .
[31] Herbert Hamers,et al. One-Mode Projection Analysis and Design of Covert Affiliation Networks , 2010, Soc. Networks.
[32] David L. Hicks,et al. Mathematical Methods in Counterterrorism , 2009 .
[33] Nisha Chaurasia,et al. A Survey on Terrorist Network Mining: Current Trends and Opportunities , 2012 .
[34] Magnus Ranstorp. Mapping Terrorism Research : State of the art, gaps and future direction , 2006 .
[35] Richard M. Medina,et al. Social Network Analysis: A case study of the Islamist terrorist network , 2012, Security Journal.
[36] Kathleen M. Carley. Dynamic Network Analysis , 2003 .
[37] J. Horgan,et al. Methodological Triangulation in the Analysis of Terrorist Networks , 2012 .
[38] Helen Armstrong,et al. Social Network Analysis with Applications , 2013 .
[39] A. Perliger,et al. Jewish Terrorism in Israel , 2009 .
[40] Jonathan David Farley,et al. Toward a Mathematical Theory of Counterterrorism: Building the Perfect Terrorist Cell , 2007 .
[41] Chris Dishman,et al. Terrorism, Crime, and Transformation , 2001 .
[42] Herbert Hamers,et al. On Heterogeneous Covert Networks , 2008 .
[43] R. Borum,et al. A dimensional approach to analyzing lone offender terrorism , 2012 .