Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda
暂无分享,去创建一个
[1] J. Frey. The 9/11 Commission Report: Final Report of the National Commission on Terrorist attacks upon the United States , 2004 .
[2] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[3] Merrick E. Krause. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States , 2004 .
[4] Michael Boss. Economic theory of democracy , 1974 .
[5] Akhilesh Chandra,et al. Challenges and constraints to the diffusion of biometrics in information systems , 2005, CACM.
[6] Guillermo Owen,et al. Centrality and power in social networks: a game theoretic approach , 2003, Math. Soc. Sci..
[7] Rafael Amer,et al. A connectivity game for graphs , 2004, Math. Methods Oper. Res..
[8] Zachary Abuza,et al. Militant Islam in Southeast Asia: Crucible of Terror , 2003 .
[9] Martin G. Everett,et al. A Graph-theoretic perspective on centrality , 2006, Soc. Networks.
[10] Bernadette Saunders,et al. The New Zealand Herald , 2014 .
[11] Herbert Hamers,et al. The influence of secrecy on the communication structure of covert networks , 2009, Soc. Networks.
[12] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.
[13] J M Smith,et al. Evolution and the theory of games , 1976 .
[14] Stephen J. Ressler. Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .
[15] Jonathan David Farley,et al. Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .
[16] Kathleen M. Carley,et al. Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence , 2005, J. Soc. Struct..
[17] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[18] Marilyn B. Peterson. Applications in Criminal Analysis: A Sourcebook , 1994 .
[19] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[20] Kathleen M. Carley,et al. Destabilizing Terrorist Networks , 1998 .
[21] J. Neumann,et al. The Theory of Games and Economic Behaviour , 1944 .
[22] D. Mcandrew. The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.
[23] Martin Shubik,et al. Game theory models and methods in political economy , 1977 .
[24] M. Newman. Analysis of weighted networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[25] Herbert Hamers,et al. Understanding Terrorist Network Topologies and Their Resilience Against Disruption , 2011, Counterterrorism and Open Source Intelligence.
[26] Hsinchun Chen,et al. Criminal network analysis and visualization , 2005, CACM.
[27] Werner Güth. Game theory and the nuclear arms race - The strategic position of Western Europe - , 1988 .
[28] S. Koschade. A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .
[29] Jenna Jordan,et al. When Heads Roll: Assessing the Effectiveness of Leadership Decapitation , 2009 .
[30] E. Kalai. Proportional Solutions to Bargaining Situations: Interpersonal Utility Comparisons , 1977 .
[31] Angela Lewis. Hoax E-mails and Bonsai Kittens: Are You E-literate in the Docuverse? , 2002, First Monday.
[32] L. S. Shapley,et al. 17. A Value for n-Person Games , 1953 .