VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki

< Home < Alle < Nm < 64 Quellen

QuelleAutorHrsg.TitelVerlagJahrLit.-V.FNFrags.
Nm/Arquilla Ronfeldt 2001John Arquilla, David Ronfeldt-Networks and Netwars: The future of crime, terror, and militancyRAND2001yesyes0
Nm/Aviv et al 2003Aviv, Reuven; Erlich, Zippy; Ravid, Gilad; Geva, Aviva-Network Analysis of Knowledge Construction in Asynchronous Learning NetworksThe Sloan Consortium2003nono2
Nm/Balasundaram et al 2006B. Balasundaram, S. Butenko, I. V. Hicks, S. Sachdeva-Clique Relaxations in Social Network Analysis: The Maximum k-plex Problem-2006nono5
Nm/Bedi 2005Rohan BediInternational Centre for Political Violence and Terrorism Research - IDSS SingaporeTelecom - The Terrorism Risk-2005yesyes3
Nm/Berry etal 2004Nina Berry, Teresa Ko, Tim Moy, Julienne Smrcka, Jessica Turnley, Ben Wu-Emergent Clique Formation in Terrorist Recruitment-2004yesyes (in text)2
Nm/Borgatti 2002Stephen P. Borgatti-Graph Theory-2002nono5
Nm/Brandes Erlebach 2005Ulrik Brandes, Thomas ErlebachUlrik Brandes, Thomas ErlebachChapter 2 FundamentalsSpringer2005nono3
Nm/CNS 2002-Center for Nonproliferation StudiesLITERATURE REVIEW OF EXISTING TERRORIST BEHAVIOR MODELING Final Report to the Defense Threat Reduction Agency-2002nono5
Nm/Carley 2006Kathleen M. Carley-Destabilization of covert networks-2006nono2
Nm/Chen 2006Hsinchun Chen-Intelligence and Security Informatics for International Security: Information Sharing and Data MiningSpringer-Verlag2006yesyes5
Nm/Clark etal 2005Clinton R. Clark, Richard F. Deckro, Jeffrey D. Weir, Marcus B. Perry-Modeling and Analysis of Clandestine Networks-2005nono1
Nm/Clauset Young 2005Aaron Clauset, Maxwell Young-Scale Invariance in Global Terrorism-2005neinja1
Nm/Combating Terrorism Center 2006-Combating Terrorism Center, Department of Social Sciences, United States Military AcademyHarmony and Disharmony - Exploiting al-Qa’ida’s Organizational Vulnerabilities-2006nono2
Nm/DCSINT 2005-US Army Training and Doctrine CommandTRADOC DCSINT Handbook No. 1. A Military Guide to Terrorism in the Twenty-First Century-2005noyes0
Nm/DeRosa 2004Mary DeRosaCenter for Strategic and International StudiesData Mining and Data Analysis for CounterterrorismThe CSIS Press2004yesyes6
Nm/Dombroski Carley 2002Matthew J. Dombroski, Kathleen M. Carley-NETEST: Estimating a Terrorist Network’s Structure-2002yesno2
Nm/Dugan etal 2006Laura Dugan, Gary LaFree, Heather FoggSharad Mehrotra, Daniel D. Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue WangA First Look at Domestic and International Global Terrorism Events, 1970–1997Springer-Verlag2006nono2
Nm/Freeman 1980Linton C. Freeman-The gatekeeper, Pair-dependency and Structural CentralityElsevier1980nono3
Nm/Frost 1982R.A. Frost-Binary-Relational Storage StructuresHeyden & Son Ltd1982yesyes3
Nm/Hamill 2006Jonathan T. Hamill-Analysis of layered social networks-2006nono11
Nm/Han Kamber 2006Jiawei Han, Micheline Kamber-Data Mining: Concepts and Techniques (second edition)Morgan Kaufmann, Elsevier2006nono2
Nm/Heer et al 2005Jeffrey Heer, Stuart K. Card, James A. LandayACMprefuse: a toolkit for interactive information visualization-2005noyes11
Nm/Holmgren 2006Åke J. Holmgren-Using Graph Models to Analyze the Vulnerability of Electric Power NetworksWiley2006nono3
Nm/Jensen et al 2003David Jensen, Matthew Rattigan, Hannah Blau-Information Awareness: A Prospective Technical Assessment-2003nono2
Nm/Katz et al 2004Nancy Katz, David Lazer, Holly Arrow, Noshir Contractor-Network Theory and Small Groups-2004yesyes4
Nm/Koelle et al 2006David Koelle, Jonathan Pfautz, Michael Farry, Zach Cox, Geoffrey Catto, Joseph Campolongo-Applications of Bayesian Belief Networks in Social Network Analysis-2006nono3
Nm/Koschade 2005Stuart A. KoschadeC. Bailey, Laurie R. BuysA Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia-2005nono3
Nm/Koschuetzki etal 2005D. Koschützki, K.A. Lehmann, L. Peeters, S. Richter, D. Tenfelde- Podehl, O. ZlotowskiUlrik Brandes, Thomas ErlebachChapter 3 Centrality IndicesSpringer2005nono3
Nm/Krebs 2002Krebs, Valdis E.-Mapping Networks of Terrorist Cells-2002yesno1
Nm/Krebs 2004Valdis Krebs-Organizational Hierarchy - Adapting Old Structures to New Challenges-2004yesyes2
Nm/Latora and Marchiori 2004Vito Latora, Massimo Marchiori-How the science of complex networks can help developing strategies against terrorismElsevier2004yesyes2
Nm/Lemieux 2003Vincent Lemieux-Criminal Networks-2003nono0
Nm/Malin etal 2005Bradley Malin, Edoardo Airoldi, Kathleen M. Carley-A Network Analysis Model for Disambiguation of Names in ListsSpringer2005nono1
Nm/Padhy 2006Prafullah Padhy-Organised CrimeIsha Books2006--1
Nm/Penzar etal 2005Dražen Penzar, Armano Srbljinović-About Modelling of complex networks with applications to terrorist group modelling-2005nono4
Nm/Perer Shneiderman 2006Adam Perer, Ben Shneiderman-Balancing Systematic and FlexibleExploration of Social NetworksIEEE Computer Society2006nono0
Nm/Popp and Poindexter 2006Robert Popp, John PoindexterIEEE Computer SocietyCountering Terrorism through Information and Privacy Protection Technologies-2006janein1
Nm/Qin et al 2005Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman, Hsinchun ChenKantor, P et al.Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad NetworkSpringer-Verlag2005yesyes1
Nm/Ressler 2006Steve ResslerNaval Postgraduate School Center for Homeland Defense and SecuritySocial Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research-2006yesyes12
Nm/Saxena et al. 2004Sudhir Saxena, K. Santhanam, Aparna BasuInstitute for Defence Studies and AnalysesApplication of Social Network Analysis (SNA) to Terrorist Networks in Jammu & Kashmir-2004nono3
Nm/Scott 1987John Scott-Social network analysis, a HandbookSage Publications1987yesyes2
Nm/Shelley 2002Louise I. ShelleyInternational Society for Criminology (ISC)The Nexus of Organized International Criminals and Terrorism-2002noyes7
Nm/Shelley Picarelli 2002Shelley, Louise I. and Picarelli, John T.-Methods Not Motives: Implications of the Convergence of International Organized Crime and Terrorism-2002noyes3
Nm/Smith and King 2002M.N. Smith, P.J.H. KingSchool of Computer Science and Information Systems, Birbeck College, University of LondonThe Exploratory Construction of Database Views-2002nono4
Nm/Stephenson and Zelen 1989Stephenson, Karen and Zelen, Marvin-Rethinking Centrality: Methods and Examples-1989janein6
Nm/Stokman 2004Frans N. Stokman-What Binds Us When With Whom? Content and Structure in Social Network Analysis-2004nono2
Nm/The Dark Web Project 2010University of ArizonaUniversity of ArizonaDark Web Terrorism ResearchUniversity of Arizona2010neinnein1
Nm/TrackingTheThreat.com 2006--About this site-2006noyes3
Nm/TrackingTheThreat.com 2006a--About TrackingTheThreat.com-2006noyes1
Nm/Tsvetovat et al. 2005Maksim Tsvetovat, Jana Diesner, Kathleen M. Carley-NetIntel: A Database for Manipulation of Rich Social Network Data-2005nono2
Nm/Visualcomplexity 2006-www.visualcomplexity.comTrackingTheThreat.com-2006nono2
Nm/Westphal and Blaxton 1998Christopher Westphal, Teresa Blaxton-Data Mining Solutions: Methods and Tools for Solving Real-World ProblemsJohn Wiley & Sons, Inc1998nono2
Nm/Wikipedia - Adnan Gulshair el Shukrijumah - 2006--Adnan Gulshair el Shukrijumah-2006noyes2
Nm/Wikipedia - World Trade Center bombing (1993) - 2006--World Trade Center bombing (1993)-2006noyes2
Nm/Wikipedia Riyadh compound bombings 2007--Riyadh compound bombings-2007noyes2
Nm/Wikipedia-Bojinka-plot 2006--Bojinka plot-2006nono1
Nm/WorldNetDaily - Wheeler 2003Scott L. Wheeler-'Dirty-bomb' plot under way in U.S.? - Fears over elusive al-Qaida suspect, missing reactor materials-2003neinnein1
Nm/Xu and Chen 2003Jennifer Xu, Hsinchun ChenChen, H et al.Untangling Criminal Networks: A Case StudySpringer-Verlag2003yesyes6
Nm/Xu and Chen 2005aJennifer Xu, Hsinchun Chen-Criminal Network Analysis and Visualization: A Data Mining Perspective-2005nono9
Nm/Xu and Chen 2005bJennifer J. Xu, Hsinchun Chen-CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery-2005yesyes1
Nm/Xu etal 2004Jennifer Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen-Analyzing and Visualizing Criminal Network Dynamics: A Case Study-2004nono10
Nm/Yang etal 2005Huijie Yang, Wenxu Wang, Tao Zhou, Binghong Wang, Fangcui Zhao-Reconstruct the Hierarchical Structure in a Complex Network-2005--1
Nm/Zhao et al 2006Bin Zhao, Prithviraj Sen, Lise Getoor-Entity and Relationship Labeling in Affiliation Networks-2006nono2
Nm/terrorism research 2005--terrorism research-2005nono2