VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki

< Home < Alle < Nm < 64 Quellen

QuelleAutorHrsg.TitelVerlagJahrLit.-V.FNFrags.
Nm/Arquilla Ronfeldt 2001John Arquilla, David Ronfeldt-Networks and Netwars: The future of crime, terror, and militancyRAND2000yesyes0
Nm/Aviv et al 2003Aviv, Reuven; Erlich, Zippy; Ravid, Gilad; Geva, Aviva-Network Analysis of Knowledge Construction in Asynchronous Learning NetworksThe Sloan Consortium2000nono2
Nm/Balasundaram et al 2006B. Balasundaram, S. Butenko, I. V. Hicks, S. Sachdeva-Clique Relaxations in Social Network Analysis: The Maximum k-plex Problem-2010nono5
Nm/Bedi 2005Rohan BediInternational Centre for Political Violence and Terrorism Research - IDSS SingaporeTelecom - The Terrorism Risk-2010yesyes3
Nm/Berry etal 2004Nina Berry, Teresa Ko, Tim Moy, Julienne Smrcka, Jessica Turnley, Ben Wu-Emergent Clique Formation in Terrorist Recruitment-2000yesyes (in text)2
Nm/Borgatti 2002Stephen P. Borgatti-Graph Theory-2000nono5
Nm/Brandes Erlebach 2005Ulrik Brandes, Thomas ErlebachUlrik Brandes, Thomas ErlebachChapter 2 FundamentalsSpringer2010nono3
Nm/CNS 2002-Center for Nonproliferation StudiesLITERATURE REVIEW OF EXISTING TERRORIST BEHAVIOR MODELING Final Report to the Defense Threat Reduction Agency-2000nono5
Nm/Carley 2006Kathleen M. Carley-Destabilization of covert networks-2010nono2
Nm/Chen 2006Hsinchun Chen-Intelligence and Security Informatics for International Security: Information Sharing and Data MiningSpringer-Verlag2010yesyes5
Nm/Clark etal 2005Clinton R. Clark, Richard F. Deckro, Jeffrey D. Weir, Marcus B. Perry-Modeling and Analysis of Clandestine Networks-2010nono1
Nm/Clauset Young 2005Aaron Clauset, Maxwell Young-Scale Invariance in Global Terrorism-2010neinja1
Nm/Combating Terrorism Center 2006-Combating Terrorism Center, Department of Social Sciences, United States Military AcademyHarmony and Disharmony - Exploiting al-Qa’ida’s Organizational Vulnerabilities-2010nono2
Nm/DCSINT 2005-US Army Training and Doctrine CommandTRADOC DCSINT Handbook No. 1. A Military Guide to Terrorism in the Twenty-First Century-2010noyes0
Nm/DeRosa 2004Mary DeRosaCenter for Strategic and International StudiesData Mining and Data Analysis for CounterterrorismThe CSIS Press2000yesyes6
Nm/Dombroski Carley 2002Matthew J. Dombroski, Kathleen M. Carley-NETEST: Estimating a Terrorist Network’s Structure-2000yesno2
Nm/Dugan etal 2006Laura Dugan, Gary LaFree, Heather FoggSharad Mehrotra, Daniel D. Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue WangA First Look at Domestic and International Global Terrorism Events, 1970–1997Springer-Verlag2010nono2
Nm/Freeman 1980Linton C. Freeman-The gatekeeper, Pair-dependency and Structural CentralityElsevier1980nono3
Nm/Frost 1982R.A. Frost-Binary-Relational Storage StructuresHeyden & Son Ltd1980yesyes3
Nm/Hamill 2006Jonathan T. Hamill-Analysis of layered social networks-2010nono11
Nm/Han Kamber 2006Jiawei Han, Micheline Kamber-Data Mining: Concepts and Techniques (second edition)Morgan Kaufmann, Elsevier2010nono2
Nm/Heer et al 2005Jeffrey Heer, Stuart K. Card, James A. LandayACMprefuse: a toolkit for interactive information visualization-2010noyes11
Nm/Holmgren 2006Åke J. Holmgren-Using Graph Models to Analyze the Vulnerability of Electric Power NetworksWiley2010nono3
Nm/Jensen et al 2003David Jensen, Matthew Rattigan, Hannah Blau-Information Awareness: A Prospective Technical Assessment-2000nono2
Nm/Katz et al 2004Nancy Katz, David Lazer, Holly Arrow, Noshir Contractor-Network Theory and Small Groups-2000yesyes4
Nm/Koelle et al 2006David Koelle, Jonathan Pfautz, Michael Farry, Zach Cox, Geoffrey Catto, Joseph Campolongo-Applications of Bayesian Belief Networks in Social Network Analysis-2010nono3
Nm/Koschade 2005Stuart A. KoschadeC. Bailey, Laurie R. BuysA Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia-2010nono3
Nm/Koschuetzki etal 2005D. Koschützki, K.A. Lehmann, L. Peeters, S. Richter, D. Tenfelde- Podehl, O. ZlotowskiUlrik Brandes, Thomas ErlebachChapter 3 Centrality IndicesSpringer2010nono3
Nm/Krebs 2002Krebs, Valdis E.-Mapping Networks of Terrorist Cells-2000yesno1
Nm/Krebs 2004Valdis Krebs-Organizational Hierarchy - Adapting Old Structures to New Challenges-2000yesyes2
Nm/Latora and Marchiori 2004Vito Latora, Massimo Marchiori-How the science of complex networks can help developing strategies against terrorismElsevier2000yesyes2
Nm/Lemieux 2003Vincent Lemieux-Criminal Networks-2000nono0
Nm/Malin etal 2005Bradley Malin, Edoardo Airoldi, Kathleen M. Carley-A Network Analysis Model for Disambiguation of Names in ListsSpringer2010nono1
Nm/Padhy 2006Prafullah Padhy-Organised CrimeIsha Books2010--1
Nm/Penzar etal 2005Dražen Penzar, Armano Srbljinović-About Modelling of complex networks with applications to terrorist group modelling-2010nono4
Nm/Perer Shneiderman 2006Adam Perer, Ben Shneiderman-Balancing Systematic and FlexibleExploration of Social NetworksIEEE Computer Society2010nono0
Nm/Popp and Poindexter 2006Robert Popp, John PoindexterIEEE Computer SocietyCountering Terrorism through Information and Privacy Protection Technologies-2010janein1
Nm/Qin et al 2005Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman, Hsinchun ChenKantor, P et al.Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad NetworkSpringer-Verlag2010yesyes1
Nm/Ressler 2006Steve ResslerNaval Postgraduate School Center for Homeland Defense and SecuritySocial Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research-2010yesyes12
Nm/Saxena et al. 2004Sudhir Saxena, K. Santhanam, Aparna BasuInstitute for Defence Studies and AnalysesApplication of Social Network Analysis (SNA) to Terrorist Networks in Jammu & Kashmir-2000nono3
Nm/Scott 1987John Scott-Social network analysis, a HandbookSage Publications1990yesyes2
Nm/Shelley 2002Louise I. ShelleyInternational Society for Criminology (ISC)The Nexus of Organized International Criminals and Terrorism-2000noyes7
Nm/Shelley Picarelli 2002Shelley, Louise I. and Picarelli, John T.-Methods Not Motives: Implications of the Convergence of International Organized Crime and Terrorism-2000noyes3
Nm/Smith and King 2002M.N. Smith, P.J.H. KingSchool of Computer Science and Information Systems, Birbeck College, University of LondonThe Exploratory Construction of Database Views-2000nono4
Nm/Stephenson and Zelen 1989Stephenson, Karen and Zelen, Marvin-Rethinking Centrality: Methods and Examples-1990janein6
Nm/Stokman 2004Frans N. Stokman-What Binds Us When With Whom? Content and Structure in Social Network Analysis-2000nono2
Nm/The Dark Web Project 2010University of ArizonaUniversity of ArizonaDark Web Terrorism ResearchUniversity of Arizona2010neinnein1
Nm/TrackingTheThreat.com 2006--About this site-2010noyes3
Nm/TrackingTheThreat.com 2006a--About TrackingTheThreat.com-2010noyes1
Nm/Tsvetovat et al. 2005Maksim Tsvetovat, Jana Diesner, Kathleen M. Carley-NetIntel: A Database for Manipulation of Rich Social Network Data-2010nono2
Nm/Visualcomplexity 2006-www.visualcomplexity.comTrackingTheThreat.com-2010nono2
Nm/Westphal and Blaxton 1998Christopher Westphal, Teresa Blaxton-Data Mining Solutions: Methods and Tools for Solving Real-World ProblemsJohn Wiley & Sons, Inc2000nono2
Nm/Wikipedia - Adnan Gulshair el Shukrijumah - 2006--Adnan Gulshair el Shukrijumah-2010noyes2
Nm/Wikipedia - World Trade Center bombing (1993) - 2006--World Trade Center bombing (1993)-2010noyes2
Nm/Wikipedia Riyadh compound bombings 2007--Riyadh compound bombings-2010noyes2
Nm/Wikipedia-Bojinka-plot 2006--Bojinka plot-2010nono1
Nm/WorldNetDaily - Wheeler 2003Scott L. Wheeler-'Dirty-bomb' plot under way in U.S.? - Fears over elusive al-Qaida suspect, missing reactor materials-2000neinnein1
Nm/Xu and Chen 2003Jennifer Xu, Hsinchun ChenChen, H et al.Untangling Criminal Networks: A Case StudySpringer-Verlag2000yesyes6
Nm/Xu and Chen 2005aJennifer Xu, Hsinchun Chen-Criminal Network Analysis and Visualization: A Data Mining Perspective-2010nono9
Nm/Xu and Chen 2005bJennifer J. Xu, Hsinchun Chen-CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery-2010yesyes1
Nm/Xu etal 2004Jennifer Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen-Analyzing and Visualizing Criminal Network Dynamics: A Case Study-2000nono10
Nm/Yang etal 2005Huijie Yang, Wenxu Wang, Tao Zhou, Binghong Wang, Fangcui Zhao-Reconstruct the Hierarchical Structure in a Complex Network-2010--1
Nm/Zhao et al 2006Bin Zhao, Prithviraj Sen, Lise Getoor-Entity and Relationship Labeling in Affiliation Networks-2010nono2
Nm/terrorism research 2005--terrorism research-2010nono2