Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks
von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 165 01 - Diskussion Zuletzt bearbeitet: 2012-05-01 09:29:56 Hindemith | Fragment, Gesichtet, Latora and Marchiori 2004, Nm, SMWFragment, Schutzlevel sysop, Verschleierung |
|
|
Untersuchte Arbeit: Seite: 165, Zeilen: 1, 3-6 |
Quelle: Latora and Marchiori 2004 Seite(n): 73, Zeilen: 16, 17-18 |
---|---|
In this case study we consider the connections network of terrorists involved in the Bali Night Club Bombing and their directed or undirected relationships with other entities. Of course mapping networks after an event is relatively easy, while the real problem in this case is to map the covert networks to prevent terrorist activity, a task that can be more difficult. | As a second example we consider the connections network of the hijackers and related terrorists of the September 2001 attacks. Of course mapping networks after an event is relatively easy, while the real problem in this case is to map covert networks to prevent criminal activity, a task that can be much more difficult. |
Nearly identical at the end but nothing is marked as a citation; the reference is not given. |
|
vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120501093231
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120501093231