VroniPlag Wiki


31.200Seiten in
diesem Wiki
Add New Page
Add New Page Diskussion0

< Home < Alle < Nm < 65 Quellen

Quelle Autor Hrsg. Titel Verlag Jahr Lit.-V. FN Frags.
Nm/Arquilla Ronfeldt 2001 John Arquilla, David Ronfeldt - Networks and Netwars: The future of crime, terror, and militancy RAND 2001 yes yes
Nm/Aviv et al 2003 Aviv, Reuven; Erlich, Zippy; Ravid, Gilad; Geva, Aviva - Network Analysis of Knowledge Construction in Asynchronous Learning Networks The Sloan Consortium 2003 no no
Nm/Balasundaram et al 2006 B. Balasundaram, S. Butenko, I. V. Hicks, S. Sachdeva - Clique Relaxations in Social Network Analysis: The Maximum k-plex Problem - 2006 no no
Nm/Bedi 2005 Rohan Bedi International Centre for Political Violence and Terrorism Research - IDSS Singapore Telecom - The Terrorism Risk - 2005 yes yes
Nm/Berry etal 2004 Nina Berry, Teresa Ko, Tim Moy, Julienne Smrcka, Jessica Turnley, Ben Wu - Emergent Clique Formation in Terrorist Recruitment - 2004 yes yes (in text)
Nm/Borgatti 2002 Stephen P. Borgatti - Graph Theory - 2002 no no
Nm/Brandes Erlebach 2005 Ulrik Brandes, Thomas Erlebach Ulrik Brandes, Thomas Erlebach Chapter 2 Fundamentals Springer 2005 no no
Nm/CNS 2002 - Center for Nonproliferation Studies LITERATURE REVIEW OF EXISTING TERRORIST BEHAVIOR MODELING Final Report to the Defense Threat Reduction Agency - 2002 no no
Nm/Carley 2006 Kathleen M. Carley - Destabilization of covert networks - 2006 no no
Nm/Chen 2006 Hsinchun Chen - Intelligence and Security Informatics for International Security: Information Sharing and Data Mining Springer-Verlag 2006 yes yes
Nm/Clark etal 2005 Clinton R. Clark, Richard F. Deckro, Jeffrey D. Weir, Marcus B. Perry - Modeling and Analysis of Clandestine Networks - 2005 no no
Nm/Clauset Young 2005 Aaron Clauset, Maxwell Young - Scale Invariance in Global Terrorism - 2005 nein ja
Nm/Combating Terrorism Center 2006 - Combating Terrorism Center, Department of Social Sciences, United States Military Academy Harmony and Disharmony - Exploiting al-Qa’ida’s Organizational Vulnerabilities - 2006 no no
Nm/DCSINT 2005 - US Army Training and Doctrine Command TRADOC DCSINT Handbook No. 1. A Military Guide to Terrorism in the Twenty-First Century - 2005 no yes
Nm/DeRosa 2004 Mary DeRosa Center for Strategic and International Studies Data Mining and Data Analysis for Counterterrorism The CSIS Press 2004 yes yes
Nm/Dombroski Carley 2002 Matthew J. Dombroski, Kathleen M. Carley - NETEST: Estimating a Terrorist Network’s Structure - 2002 yes no
Nm/Dugan etal 2006 Laura Dugan, Gary LaFree, Heather Fogg Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang A First Look at Domestic and International Global Terrorism Events, 1970–1997 Springer-Verlag 2006 no no
Nm/Freeman 1980 Linton C. Freeman - The gatekeeper, Pair-dependency and Structural Centrality Elsevier 1980 no no
Nm/Frost 1982 R.A. Frost - Binary-Relational Storage Structures Heyden & Son Ltd 1982 yes yes
Nm/Hamill 2006 Jonathan T. Hamill - Analysis of layered social networks - 2006 no no
Nm/Han Kamber 2006 Jiawei Han, Micheline Kamber - Data Mining: Concepts and Techniques (second edition) Morgan Kaufmann, Elsevier 2006 no no
Nm/Heer et al 2005 Jeffrey Heer, Stuart K. Card, James A. Landay ACM prefuse: a toolkit for interactive information visualization - 2005 no yes
Nm/Holmgren 2006 Åke J. Holmgren - Using Graph Models to Analyze the Vulnerability of Electric Power Networks Wiley 2006 no no
Nm/Jensen et al 2003 David Jensen, Matthew Rattigan, Hannah Blau - Information Awareness: A Prospective Technical Assessment - 2003 no no
Nm/Katz et al 2004 Nancy Katz, David Lazer, Holly Arrow, Noshir Contractor - Network Theory and Small Groups - 2004 yes yes
Nm/Koelle et al 2006 David Koelle, Jonathan Pfautz, Michael Farry, Zach Cox, Geoffrey Catto, Joseph Campolongo - Applications of Bayesian Belief Networks in Social Network Analysis - 2006 no no
Nm/Koschade 2005 Stuart A. Koschade C. Bailey, Laurie R. Buys A Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia - 2005 no no
Nm/Koschuetzki etal 2005 D. Koschützki, K.A. Lehmann, L. Peeters, S. Richter, D. Tenfelde- Podehl, O. Zlotowski Ulrik Brandes, Thomas Erlebach Chapter 3 Centrality Indices Springer 2005 no no
Nm/Krebs 2002 Krebs, Valdis E. - Mapping Networks of Terrorist Cells - 2002 yes no
Nm/Krebs 2004 Valdis Krebs - Organizational Hierarchy - Adapting Old Structures to New Challenges - 2004 yes yes
Nm/Latora and Marchiori 2004 Vito Latora, Massimo Marchiori - How the science of complex networks can help developing strategies against terrorism Elsevier 2004 yes yes
Nm/Lemieux 2003 Vincent Lemieux - Criminal Networks - 2003 no no
Nm/Malin etal 2005 Bradley Malin, Edoardo Airoldi, Kathleen M. Carley - A Network Analysis Model for Disambiguation of Names in Lists Springer 2005 no no
Nm/Padhy 2006 Prafullah Padhy - Organised Crime Isha Books 2006 - -
Nm/Penzar etal 2005 Dražen Penzar, Armano Srbljinović - About Modelling of complex networks with applications to terrorist group modelling - 2005 no no
Nm/Perer Shneiderman 2006 Adam Perer, Ben Shneiderman - Balancing Systematic and FlexibleExploration of Social Networks IEEE Computer Society 2006 no no
Nm/Popp and Poindexter 2006 Robert Popp, John Poindexter IEEE Computer Society Countering Terrorism through Information and Privacy Protection Technologies - 2006 ja nein
Nm/Qin et al 2005 Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman, Hsinchun Chen Kantor, P et al. Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network Springer-Verlag 2005 yes yes
Nm/Ressler 2006 Steve Ressler Naval Postgraduate School Center for Homeland Defense and Security Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research - 2006 yes yes
Nm/Saxena et al. 2004 Sudhir Saxena, K. Santhanam, Aparna Basu Institute for Defence Studies and Analyses Application of Social Network Analysis (SNA) to Terrorist Networks in Jammu & Kashmir - 2004 no no
Nm/Scott 1987 John Scott - Social network analysis, a Handbook Sage Publications 1987 yes yes
Nm/Shelley 2002 Louise I. Shelley International Society for Criminology (ISC) The Nexus of Organized International Criminals and Terrorism - 2002 no yes
Nm/Shelley Picarelli 2002 Shelley, Louise I. and Picarelli, John T. - Methods Not Motives: Implications of the Convergence of International Organized Crime and Terrorism - 2002 no yes
Nm/Smith and King 2002 M.N. Smith, P.J.H. King School of Computer Science and Information Systems, Birbeck College, University of London The Exploratory Construction of Database Views - 2002 no no
Nm/Stephenson and Zelen 1989 Stephenson, Karen and Zelen, Marvin - Rethinking Centrality: Methods and Examples - 1989 ja nein
Nm/Stokman 2004 Frans N. Stokman - What Binds Us When With Whom? Content and Structure in Social Network Analysis - 2004 no no
Nm/The Dark Web Project 2010 University of Arizona University of Arizona Dark Web Terrorism Research University of Arizona 2010 nein nein
Nm/ 2006 - - About this site - 2006 no yes
Nm/ 2006a - - About - 2006 no yes
Nm/Tsvetovat et al. 2005 Maksim Tsvetovat, Jana Diesner, Kathleen M. Carley - NetIntel: A Database for Manipulation of Rich Social Network Data - 2005 no no
Nm/Visualcomplexity 2006 - - 2006 no no
Nm/Westphal and Blaxton 1998 Christopher Westphal, Teresa Blaxton - Data Mining Solutions: Methods and Tools for Solving Real-World Problems John Wiley & Sons, Inc 1998 no no
Nm/Wikipedia - Adnan Gulshair el Shukrijumah - 2006 - - Adnan Gulshair el Shukrijumah - 2006 no yes
Nm/Wikipedia - World Trade Center bombing (1993) - 2006 - - World Trade Center bombing (1993) - 2006 no yes
Nm/Wikipedia Riyadh compound bombings 2007 - - Riyadh compound bombings - 2007 no yes
Nm/Wikipedia-Bojinka-plot 2006 - - Bojinka plot - 2006 no no
Nm/WorldNetDaily - Wheeler 2003 Scott L. Wheeler - 'Dirty-bomb' plot under way in U.S.? - Fears over elusive al-Qaida suspect, missing reactor materials - 2003 nein nein
Nm/Xu and Chen 2003 Jennifer Xu, Hsinchun Chen Chen, H et al. Untangling Criminal Networks: A Case Study Springer-Verlag 2003 yes yes
Nm/Xu and Chen 2005a Jennifer Xu, Hsinchun Chen - Criminal Network Analysis and Visualization: A Data Mining Perspective - 2005 no no
Nm/Xu and Chen 2005b Jennifer J. Xu, Hsinchun Chen - CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery - 2005 yes yes
Nm/Xu etal 2004 Jennifer Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen - Analyzing and Visualizing Criminal Network Dynamics: A Case Study - 2004 no no
Nm/Yang etal 2005 Huijie Yang, Wenxu Wang, Tao Zhou, Binghong Wang, Fangcui Zhao - Reconstruct the Hierarchical Structure in a Complex Network - 2005 - -
Nm/Zhao et al 2006 Bin Zhao, Prithviraj Sen, Lise Getoor - Entity and Relationship Labeling in Affiliation Networks - 2006 no no
Nm/terrorism research 2005 - - terrorism research - 2005 no no

Auch bei Fandom

Zufälliges Wiki