MAPPing dark networks: A data transformation method to study clandestine organizations 1
暂无分享,去创建一个
[1] Philip H. Ramsey. Critical Values for Spearman’s Rank Order Correlation , 1989 .
[2] M. Zelen,et al. Rethinking centrality: Methods and examples☆ , 1989 .
[3] Carlo Morselli,et al. Inside Criminal Networks , 2008 .
[4] Nancy Roberts,et al. Strategies for Combating Dark Networks , 2011, J. Soc. Struct..
[5] M. Newman. Analysis of weighted networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[7] Burleigh B. Gardner,et al. Deep South: A Social Anthropological Study of Caste and Class , 1942 .
[8] G. Berlusconi. Do all the pieces matter? Assessing the reliability of law enforcement data sources for the network analysis of wire taps , 2013 .
[9] H. Milward,et al. Dark Networks as Problems , 2003 .
[10] Tore Opsahl. Triadic closure in two-mode networks: Redefining the global and local clustering coefficients , 2013, Soc. Networks.
[11] John Skvoretz,et al. Node centrality in weighted networks: Generalizing degree and shortest paths , 2010, Soc. Networks.
[12] Stephen P. Borgatti,et al. Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.
[13] Charles Tilly,et al. Trust and Rule: Contents , 2005 .
[14] John Scott,et al. The SAGE Handbook of Social Network Analysis , 2011 .
[15] Anna Traveset,et al. Alternative approaches of transforming bimodal into unimodal mutualistic networks. The usefulness of preserving weighted information , 2011 .
[16] J. Bolland,et al. Sorting out centrality: An analysis of the performance of four centrality models in real and simulated networks , 1988 .
[17] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[18] Sean F. Everton. Disrupting Dark Networks , 2012 .
[19] Yi-Cheng Zhang,et al. Bipartite network projection and personal recommendation. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.
[20] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[21] A. Vespignani,et al. The architecture of complex weighted networks. , 2003, Proceedings of the National Academy of Sciences of the United States of America.
[22] Marc Sageman,et al. Leaderless Jihad , 2011 .
[23] Gábor Csárdi,et al. The igraph software package for complex network research , 2006 .
[24] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[25] Hsinchun Chen,et al. The topology of dark networks , 2008, Commun. ACM.
[26] M. Newman,et al. Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[27] Katherine Faust. Centrality in affiliation networks , 1997 .
[28] Sean F. Everton. Network Topography, Key Players and Terrorist Networks , 2009 .
[29] Cynthia M. Lakon,et al. How Correlated Are Network Centrality Measures? , 2008, Connections.
[30] Charles Tilly,et al. Trust and rule , 2004 .
[31] Thomas W. Valente,et al. Social Networks and Health: Models, Methods, and Applications , 2010 .
[32] Kathleen M. Carley,et al. Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..
[33] Thomas W. Valente,et al. Social Networks and Health , 2010 .