Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
IJBIDM
2010
80views more  IJBIDM 2010»
12 years 10 days ago
Practical algorithms for subgroup detection in covert networks
: In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrat...
Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qure...
EOR
2007
98views more  EOR 2007»
12 years 1 months ago
Location of terror response facilities: A game between state and terrorist
We study a leader follower game with two players: a terrorist and a state where the later one installs facilities that provide support in case of a terrorist attack. While the Ter...
Oded Berman, Arieh Gavious
ISI
2006
Springer
12 years 1 months ago
On the Topology of the Dark Web of Terrorist Groups
In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand ...
Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun ...
books