We assume that limited information that captured the dyadic interactions between terrorists was available. The models presented in this dissertation offer an [investigative data mining tool that lends itself to data-sparse environment initially confronted by law enforcement and intelligence agencies.]
The study begins with the assumption that limited information that captured
the dyadic interactions between individuals was available. The methodology offers a screening tool that lends itself to the data-sparse environment initially confronted by analysts.
The finding is quite short and has been adapted, but still, some text clearly has been copied without proper attribution.