The “six-element” analysis method for the research on the characteristics of terrorist activities
暂无分享,去创建一个
Jian Chai | Shouyang Wang | Duoyong Sun | Jin Xiao | Julei Fu | Shouyang Wang | Jian Chai | Jin Xiao | Duoyong Sun | Julei Fu
[1] S. Wasserman,et al. Models and Methods in Social Network Analysis , 2005 .
[2] John Bohannon. Investigating networks: the dark side. , 2009, Science.
[3] Edoardo M. Airoldi,et al. Network sampling and classification: An investigation of network model representations , 2011, Decis. Support Syst..
[4] John Bohannon,et al. Counterterrorism's new tool: 'metanetwork' analysis. , 2009, Science.
[5] Daniel J. Brass,et al. Network Analysis in the Social Sciences , 2009, Science.
[6] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[7] Kathleen M. Carley,et al. Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..
[8] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[9] Hsinchun Chen,et al. Uncovering the dark Web: A case study of Jihad on the Web , 2008 .
[10] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[11] David L. Hicks,et al. Notice of Violation of IEEE Publication PrinciplesDetecting high-value individuals in covert networks: 7/7 London bombing case study , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[12] Kathleen M. Carley,et al. Destabilizing Terrorist Networks , 1998 .
[13] Jukka-Pekka Onnela,et al. Community Structure in Time-Dependent, Multiscale, and Multiplex Networks , 2009, Science.
[14] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[15] Alexander H. Levis,et al. Vulnerability Assessment on Adversarial Organization: Unifying Command and Control Structure Analysis and Social Network Analysis , 2008, SDM 2008.
[16] John Arquilla,et al. COUNTERING NEW TERRORISM , 1998 .
[17] Eva K. Lee,et al. Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks , 2006, Ann. Oper. Res..
[18] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994 .
[19] Carlo Morselli,et al. The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.
[20] Martha Saboyá,et al. The cohesiveness of subgroups in social networks: A view from game theory , 2008, Ann. Oper. Res..
[21] Kathleen M. Carley,et al. On the robustness of centrality measures under conditions of imperfect data , 2006, Soc. Networks.
[22] Kathleen M. Carley,et al. Clearing the FOG: Fuzzy, overlapping groups for social networks , 2008, Soc. Networks.
[23] Kathleen M. Carley,et al. Toward an interoperable dynamic network analysis toolkit , 2007, Decis. Support Syst..
[24] Kjell Hausken,et al. Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures , 2011, Ann. Oper. Res..
[25] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.