< Home < Alle < Nm < 64 Quellen
Quelle | Autor | Hrsg. | Titel | Verlag | Jahr | Lit.-V. | FN | Frags. |
---|---|---|---|---|---|---|---|---|
Nm/Arquilla Ronfeldt 2001 | John Arquilla, David Ronfeldt | - | Networks and Netwars: The future of crime, terror, and militancy | RAND | 2001 | yes | yes | 0 |
Nm/Aviv et al 2003 | Aviv, Reuven; Erlich, Zippy; Ravid, Gilad; Geva, Aviva | - | Network Analysis of Knowledge Construction in Asynchronous Learning Networks | The Sloan Consortium | 2003 | no | no | 2 |
Nm/Balasundaram et al 2006 | B. Balasundaram, S. Butenko, I. V. Hicks, S. Sachdeva | - | Clique Relaxations in Social Network Analysis: The Maximum k-plex Problem | - | 2006 | no | no | 5 |
Nm/Bedi 2005 | Rohan Bedi | International Centre for Political Violence and Terrorism Research - IDSS Singapore | Telecom - The Terrorism Risk | - | 2005 | yes | yes | 3 |
Nm/Berry etal 2004 | Nina Berry, Teresa Ko, Tim Moy, Julienne Smrcka, Jessica Turnley, Ben Wu | - | Emergent Clique Formation in Terrorist Recruitment | - | 2004 | yes | yes (in text) | 2 |
Nm/Borgatti 2002 | Stephen P. Borgatti | - | Graph Theory | - | 2002 | no | no | 5 |
Nm/Brandes Erlebach 2005 | Ulrik Brandes, Thomas Erlebach | Ulrik Brandes, Thomas Erlebach | Chapter 2 Fundamentals | Springer | 2005 | no | no | 3 |
Nm/CNS 2002 | - | Center for Nonproliferation Studies | LITERATURE REVIEW OF EXISTING TERRORIST BEHAVIOR MODELING Final Report to the Defense Threat Reduction Agency | - | 2002 | no | no | 5 |
Nm/Carley 2006 | Kathleen M. Carley | - | Destabilization of covert networks | - | 2006 | no | no | 2 |
Nm/Chen 2006 | Hsinchun Chen | - | Intelligence and Security Informatics for International Security: Information Sharing and Data Mining | Springer-Verlag | 2006 | yes | yes | 5 |
Nm/Clark etal 2005 | Clinton R. Clark, Richard F. Deckro, Jeffrey D. Weir, Marcus B. Perry | - | Modeling and Analysis of Clandestine Networks | - | 2005 | no | no | 1 |
Nm/Clauset Young 2005 | Aaron Clauset, Maxwell Young | - | Scale Invariance in Global Terrorism | - | 2005 | nein | ja | 1 |
Nm/Combating Terrorism Center 2006 | - | Combating Terrorism Center, Department of Social Sciences, United States Military Academy | Harmony and Disharmony - Exploiting al-Qa’ida’s Organizational Vulnerabilities | - | 2006 | no | no | 2 |
Nm/DCSINT 2005 | - | US Army Training and Doctrine Command | TRADOC DCSINT Handbook No. 1. A Military Guide to Terrorism in the Twenty-First Century | - | 2005 | no | yes | 0 |
Nm/DeRosa 2004 | Mary DeRosa | Center for Strategic and International Studies | Data Mining and Data Analysis for Counterterrorism | The CSIS Press | 2004 | yes | yes | 6 |
Nm/Dombroski Carley 2002 | Matthew J. Dombroski, Kathleen M. Carley | - | NETEST: Estimating a Terrorist Network’s Structure | - | 2002 | yes | no | 2 |
Nm/Dugan etal 2006 | Laura Dugan, Gary LaFree, Heather Fogg | Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang | A First Look at Domestic and International Global Terrorism Events, 1970–1997 | Springer-Verlag | 2006 | no | no | 2 |
Nm/Freeman 1980 | Linton C. Freeman | - | The gatekeeper, Pair-dependency and Structural Centrality | Elsevier | 1980 | no | no | 3 |
Nm/Frost 1982 | R.A. Frost | - | Binary-Relational Storage Structures | Heyden & Son Ltd | 1982 | yes | yes | 3 |
Nm/Hamill 2006 | Jonathan T. Hamill | - | Analysis of layered social networks | - | 2006 | no | no | 11 |
Nm/Han Kamber 2006 | Jiawei Han, Micheline Kamber | - | Data Mining: Concepts and Techniques (second edition) | Morgan Kaufmann, Elsevier | 2006 | no | no | 2 |
Nm/Heer et al 2005 | Jeffrey Heer, Stuart K. Card, James A. Landay | ACM | prefuse: a toolkit for interactive information visualization | - | 2005 | no | yes | 11 |
Nm/Holmgren 2006 | Åke J. Holmgren | - | Using Graph Models to Analyze the Vulnerability of Electric Power Networks | Wiley | 2006 | no | no | 3 |
Nm/Jensen et al 2003 | David Jensen, Matthew Rattigan, Hannah Blau | - | Information Awareness: A Prospective Technical Assessment | - | 2003 | no | no | 2 |
Nm/Katz et al 2004 | Nancy Katz, David Lazer, Holly Arrow, Noshir Contractor | - | Network Theory and Small Groups | - | 2004 | yes | yes | 4 |
Nm/Koelle et al 2006 | David Koelle, Jonathan Pfautz, Michael Farry, Zach Cox, Geoffrey Catto, Joseph Campolongo | - | Applications of Bayesian Belief Networks in Social Network Analysis | - | 2006 | no | no | 3 |
Nm/Koschade 2005 | Stuart A. Koschade | C. Bailey, Laurie R. Buys | A Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia | - | 2005 | no | no | 3 |
Nm/Koschuetzki etal 2005 | D. Koschützki, K.A. Lehmann, L. Peeters, S. Richter, D. Tenfelde- Podehl, O. Zlotowski | Ulrik Brandes, Thomas Erlebach | Chapter 3 Centrality Indices | Springer | 2005 | no | no | 3 |
Nm/Krebs 2002 | Krebs, Valdis E. | - | Mapping Networks of Terrorist Cells | - | 2002 | yes | no | 1 |
Nm/Krebs 2004 | Valdis Krebs | - | Organizational Hierarchy - Adapting Old Structures to New Challenges | - | 2004 | yes | yes | 2 |
Nm/Latora and Marchiori 2004 | Vito Latora, Massimo Marchiori | - | How the science of complex networks can help developing strategies against terrorism | Elsevier | 2004 | yes | yes | 2 |
Nm/Lemieux 2003 | Vincent Lemieux | - | Criminal Networks | - | 2003 | no | no | 0 |
Nm/Malin etal 2005 | Bradley Malin, Edoardo Airoldi, Kathleen M. Carley | - | A Network Analysis Model for Disambiguation of Names in Lists | Springer | 2005 | no | no | 1 |
Nm/Padhy 2006 | Prafullah Padhy | - | Organised Crime | Isha Books | 2006 | - | - | 1 |
Nm/Penzar etal 2005 | Dražen Penzar, Armano Srbljinović | - | About Modelling of complex networks with applications to terrorist group modelling | - | 2005 | no | no | 4 |
Nm/Perer Shneiderman 2006 | Adam Perer, Ben Shneiderman | - | Balancing Systematic and FlexibleExploration of Social Networks | IEEE Computer Society | 2006 | no | no | 0 |
Nm/Popp and Poindexter 2006 | Robert Popp, John Poindexter | IEEE Computer Society | Countering Terrorism through Information and Privacy Protection Technologies | - | 2006 | ja | nein | 1 |
Nm/Qin et al 2005 | Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman, Hsinchun Chen | Kantor, P et al. | Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network | Springer-Verlag | 2005 | yes | yes | 1 |
Nm/Ressler 2006 | Steve Ressler | Naval Postgraduate School Center for Homeland Defense and Security | Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research | - | 2006 | yes | yes | 12 |
Nm/Saxena et al. 2004 | Sudhir Saxena, K. Santhanam, Aparna Basu | Institute for Defence Studies and Analyses | Application of Social Network Analysis (SNA) to Terrorist Networks in Jammu & Kashmir | - | 2004 | no | no | 3 |
Nm/Scott 1987 | John Scott | - | Social network analysis, a Handbook | Sage Publications | 1987 | yes | yes | 2 |
Nm/Shelley 2002 | Louise I. Shelley | International Society for Criminology (ISC) | The Nexus of Organized International Criminals and Terrorism | - | 2002 | no | yes | 7 |
Nm/Shelley Picarelli 2002 | Shelley, Louise I. and Picarelli, John T. | - | Methods Not Motives: Implications of the Convergence of International Organized Crime and Terrorism | - | 2002 | no | yes | 3 |
Nm/Smith and King 2002 | M.N. Smith, P.J.H. King | School of Computer Science and Information Systems, Birbeck College, University of London | The Exploratory Construction of Database Views | - | 2002 | no | no | 4 |
Nm/Stephenson and Zelen 1989 | Stephenson, Karen and Zelen, Marvin | - | Rethinking Centrality: Methods and Examples | - | 1989 | ja | nein | 6 |
Nm/Stokman 2004 | Frans N. Stokman | - | What Binds Us When With Whom? Content and Structure in Social Network Analysis | - | 2004 | no | no | 2 |
Nm/The Dark Web Project 2010 | University of Arizona | University of Arizona | Dark Web Terrorism Research | University of Arizona | 2010 | nein | nein | 1 |
Nm/TrackingTheThreat.com 2006 | - | - | About this site | - | 2006 | no | yes | 3 |
Nm/TrackingTheThreat.com 2006a | - | - | About TrackingTheThreat.com | - | 2006 | no | yes | 1 |
Nm/Tsvetovat et al. 2005 | Maksim Tsvetovat, Jana Diesner, Kathleen M. Carley | - | NetIntel: A Database for Manipulation of Rich Social Network Data | - | 2005 | no | no | 2 |
Nm/Visualcomplexity 2006 | - | www.visualcomplexity.com | TrackingTheThreat.com | - | 2006 | no | no | 2 |
Nm/Westphal and Blaxton 1998 | Christopher Westphal, Teresa Blaxton | - | Data Mining Solutions: Methods and Tools for Solving Real-World Problems | John Wiley & Sons, Inc | 1998 | no | no | 2 |
Nm/Wikipedia - Adnan Gulshair el Shukrijumah - 2006 | - | - | Adnan Gulshair el Shukrijumah | - | 2006 | no | yes | 2 |
Nm/Wikipedia - World Trade Center bombing (1993) - 2006 | - | - | World Trade Center bombing (1993) | - | 2006 | no | yes | 2 |
Nm/Wikipedia Riyadh compound bombings 2007 | - | - | Riyadh compound bombings | - | 2007 | no | yes | 2 |
Nm/Wikipedia-Bojinka-plot 2006 | - | - | Bojinka plot | - | 2006 | no | no | 1 |
Nm/WorldNetDaily - Wheeler 2003 | Scott L. Wheeler | - | 'Dirty-bomb' plot under way in U.S.? - Fears over elusive al-Qaida suspect, missing reactor materials | - | 2003 | nein | nein | 1 |
Nm/Xu and Chen 2003 | Jennifer Xu, Hsinchun Chen | Chen, H et al. | Untangling Criminal Networks: A Case Study | Springer-Verlag | 2003 | yes | yes | 6 |
Nm/Xu and Chen 2005a | Jennifer Xu, Hsinchun Chen | - | Criminal Network Analysis and Visualization: A Data Mining Perspective | - | 2005 | no | no | 9 |
Nm/Xu and Chen 2005b | Jennifer J. Xu, Hsinchun Chen | - | CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery | - | 2005 | yes | yes | 1 |
Nm/Xu etal 2004 | Jennifer Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen | - | Analyzing and Visualizing Criminal Network Dynamics: A Case Study | - | 2004 | no | no | 10 |
Nm/Yang etal 2005 | Huijie Yang, Wenxu Wang, Tao Zhou, Binghong Wang, Fangcui Zhao | - | Reconstruct the Hierarchical Structure in a Complex Network | - | 2005 | - | - | 1 |
Nm/Zhao et al 2006 | Bin Zhao, Prithviraj Sen, Lise Getoor | - | Entity and Relationship Labeling in Affiliation Networks | - | 2006 | no | no | 2 |
Nm/terrorism research 2005 | - | - | terrorism research | - | 2005 | no | no | 2 |