One-Mode Projection Analysis and Design of Covert Affiliation Networks
暂无分享,去创建一个
[1] Gordon H. McCormick,et al. Security and coordination in a clandestine organization , 2000 .
[2] Joel Levine. THE SPHERE OF INFLUENCE , 1972 .
[3] Gerald G. Brown,et al. Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..
[4] Michael Schwartz,et al. Interlocking Directorates and Interest Group Formation , 1981 .
[5] Victor W. Marek,et al. Book review: Combinatorics, Set Systems, Hypergraphs, Families of Vectors and Combinatorial Probability by B. Bollobas (Cambridge University Press) , 1987, SGAR.
[6] Malcolm W. Nance. Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities , 2013 .
[7] Michael Schwartz,et al. The Structure of Intercorporate Unity in American Business , 1981 .
[8] Herbert Hamers,et al. The influence of secrecy on the communication structure of covert networks , 2009, Soc. Networks.
[9] Ofer Zwikael. Al Qaeda's Operations: Project Management Analysis , 2007 .
[10] Terrill L. Frantz,et al. A Formal Characterization of Cellular Networks , 2005 .
[11] Paul Cruickshank,et al. Abu Musab Al Suri: Architect of the New Al Qaeda , 2007 .
[12] Kathleen M. Carley. Destabilization of covert networks , 2006, Comput. Math. Organ. Theory.
[13] Victor Asal,et al. Terrorism as Transnational Advocacy: An Organizational and Tactical Examination , 2007 .
[14] R. Breiger. The Duality of Persons and Groups , 1974 .
[15] Michael Patrick Allen,et al. The identification of interlock groups in large corporate networks: convergent validation using divergent techniques , 1982 .
[16] Shaul Mishal,et al. Al Qaeda as a Dune Organization: Toward a Typology of Islamic Terrorist Organizations , 2005 .
[17] John Arquilla,et al. Networks And Netwars , 2000 .
[18] Robert A. Shumsky,et al. Safe At Home? An Experiment in Domestic Airline Security , 2001, Operational Research.
[19] Roberto Szechtman,et al. Scheduling policies for an antiterrorist surveillance system , 2009 .
[20] C Symes,et al. SPHERE OF INFLUENCE , 2001 .
[21] Sarah Sewall,et al. The U.S. Army/Marine Corps Counterinsurgency Field Manual , 2007 .
[22] Intercorporate Relations: The structure of class cohesion: the corporate network and its dual , 1988 .
[23] Lawrence M. Wein,et al. Analyzing Bioterror Response Logistics: The Case of Anthrax , 2005, Manag. Sci..
[24] Geoffrey D. Gosling,et al. Safe At Home? An Experiment in Domestic Airline Security , 2001, Oper. Res..
[25] Stephen B. Seidman,et al. Structures induced by collections of subsets: a hypergraph approach , 1981, Math. Soc. Sci..
[26] Alexander Gutfraind,et al. Optimizing Topological Cascade Resilience Based on the Structure of Terrorist Networks , 2009, PloS one.
[27] Robin Wilson,et al. Modern Graph Theory , 2013 .
[28] B. McAllister. Al Qaeda and the Innovative Firm: Demythologizing the Network , 2004 .
[29] Martin G. Everett,et al. Network analysis of 2-mode data , 1997 .
[30] David Tucker,et al. What is New about the New Terrorism and How Dangerous is It? , 2001 .
[31] Mark S. Mizruchi,et al. Intercorporate Relations: The Structural Analysis of Business , 1992 .
[32] Walter Enders,et al. Rational Terrorists and Optimal Network Structure , 2007 .
[33] Herbert Hamers,et al. The Influence of Secrecy on the Communication Structure of Covert Networks , 2008, Soc. Networks.
[34] W. Baker,et al. THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .
[35] Katherine Faust. Centrality in affiliation networks , 1997 .
[36] Saul I. Gass,et al. Stigler's Diet Problem Revisited , 2001, Oper. Res..
[37] Phillip Bonacich,et al. Using Boolean Algebra to Analyze Overlapping Memberships , 1978 .