One-Mode Projection Analysis and Design of Covert Affiliation Networks

Subject classifications: Terrorism; Counterinsurgency; Intelligence; Defense; Covert networks; Affiliation networks.

[1]  Gordon H. McCormick,et al.  Security and coordination in a clandestine organization , 2000 .

[2]  Joel Levine THE SPHERE OF INFLUENCE , 1972 .

[3]  Gerald G. Brown,et al.  Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..

[4]  Michael Schwartz,et al.  Interlocking Directorates and Interest Group Formation , 1981 .

[5]  Victor W. Marek,et al.  Book review: Combinatorics, Set Systems, Hypergraphs, Families of Vectors and Combinatorial Probability by B. Bollobas (Cambridge University Press) , 1987, SGAR.

[6]  Malcolm W. Nance Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities , 2013 .

[7]  Michael Schwartz,et al.  The Structure of Intercorporate Unity in American Business , 1981 .

[8]  Herbert Hamers,et al.  The influence of secrecy on the communication structure of covert networks , 2009, Soc. Networks.

[9]  Ofer Zwikael Al Qaeda's Operations: Project Management Analysis , 2007 .

[10]  Terrill L. Frantz,et al.  A Formal Characterization of Cellular Networks , 2005 .

[11]  Paul Cruickshank,et al.  Abu Musab Al Suri: Architect of the New Al Qaeda , 2007 .

[12]  Kathleen M. Carley Destabilization of covert networks , 2006, Comput. Math. Organ. Theory.

[13]  Victor Asal,et al.  Terrorism as Transnational Advocacy: An Organizational and Tactical Examination , 2007 .

[14]  R. Breiger The Duality of Persons and Groups , 1974 .

[15]  Michael Patrick Allen,et al.  The identification of interlock groups in large corporate networks: convergent validation using divergent techniques , 1982 .

[16]  Shaul Mishal,et al.  Al Qaeda as a Dune Organization: Toward a Typology of Islamic Terrorist Organizations , 2005 .

[17]  John Arquilla,et al.  Networks And Netwars , 2000 .

[18]  Robert A. Shumsky,et al.  Safe At Home? An Experiment in Domestic Airline Security , 2001, Operational Research.

[19]  Roberto Szechtman,et al.  Scheduling policies for an antiterrorist surveillance system , 2009 .

[20]  C Symes,et al.  SPHERE OF INFLUENCE , 2001 .

[21]  Sarah Sewall,et al.  The U.S. Army/Marine Corps Counterinsurgency Field Manual , 2007 .

[22]  Intercorporate Relations: The structure of class cohesion: the corporate network and its dual , 1988 .

[23]  Lawrence M. Wein,et al.  Analyzing Bioterror Response Logistics: The Case of Anthrax , 2005, Manag. Sci..

[24]  Geoffrey D. Gosling,et al.  Safe At Home? An Experiment in Domestic Airline Security , 2001, Oper. Res..

[25]  Stephen B. Seidman,et al.  Structures induced by collections of subsets: a hypergraph approach , 1981, Math. Soc. Sci..

[26]  Alexander Gutfraind,et al.  Optimizing Topological Cascade Resilience Based on the Structure of Terrorist Networks , 2009, PloS one.

[27]  Robin Wilson,et al.  Modern Graph Theory , 2013 .

[28]  B. McAllister Al Qaeda and the Innovative Firm: Demythologizing the Network , 2004 .

[29]  Martin G. Everett,et al.  Network analysis of 2-mode data , 1997 .

[30]  David Tucker,et al.  What is New about the New Terrorism and How Dangerous is It? , 2001 .

[31]  Mark S. Mizruchi,et al.  Intercorporate Relations: The Structural Analysis of Business , 1992 .

[32]  Walter Enders,et al.  Rational Terrorists and Optimal Network Structure , 2007 .

[33]  Herbert Hamers,et al.  The Influence of Secrecy on the Communication Structure of Covert Networks , 2008, Soc. Networks.

[34]  W. Baker,et al.  THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .

[35]  Katherine Faust Centrality in affiliation networks , 1997 .

[36]  Saul I. Gass,et al.  Stigler's Diet Problem Revisited , 2001, Oper. Res..

[37]  Phillip Bonacich,et al.  Using Boolean Algebra to Analyze Overlapping Memberships , 1978 .