Fandom

VroniPlag Wiki

Quelle:Nm

31.380Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

< Home < Alle < Nm < 64 Quellen

QuelleAutorHrsg.TitelVerlagJahrLit.-V.FNFrags.
Nm/Arquilla Ronfeldt 2001John Arquilla, David Ronfeldt-Networks and Netwars: The future of crime, terror, and militancyRAND2001yesyes8
Nm/Aviv et al 2003Aviv, Reuven; Erlich, Zippy; Ravid, Gilad; Geva, Aviva-Network Analysis of Knowledge Construction in Asynchronous Learning NetworksThe Sloan Consortium2003nono2
Nm/Balasundaram et al 2006B. Balasundaram, S. Butenko, I. V. Hicks, S. Sachdeva-Clique Relaxations in Social Network Analysis: The Maximum k-plex Problem-2006nono5
Nm/Bedi 2005Rohan BediInternational Centre for Political Violence and Terrorism Research - IDSS SingaporeTelecom - The Terrorism Risk-2005yesyes3
Nm/Berry etal 2004Nina Berry, Teresa Ko, Tim Moy, Julienne Smrcka, Jessica Turnley, Ben Wu-Emergent Clique Formation in Terrorist Recruitment-2004yesyes (in text)2
Nm/Borgatti 2002Stephen P. Borgatti-Graph Theory-2002nono5
Nm/Brandes Erlebach 2005Ulrik Brandes, Thomas ErlebachUlrik Brandes, Thomas ErlebachChapter 2 FundamentalsSpringer2005nono3
Nm/CNS 2002-Center for Nonproliferation StudiesLITERATURE REVIEW OF EXISTING TERRORIST BEHAVIOR MODELING Final Report to the Defense Threat Reduction Agency-2002nono5
Nm/Carley 2006Kathleen M. Carley-Destabilization of covert networks-2006nono2
Nm/Chen 2006Hsinchun Chen-Intelligence and Security Informatics for International Security: Information Sharing and Data MiningSpringer-Verlag2006yesyes5
Nm/Clark etal 2005Clinton R. Clark, Richard F. Deckro, Jeffrey D. Weir, Marcus B. Perry-Modeling and Analysis of Clandestine Networks-2005nono1
Nm/Clauset Young 2005Aaron Clauset, Maxwell Young-Scale Invariance in Global Terrorism-2005neinja1
Nm/Combating Terrorism Center 2006-Combating Terrorism Center, Department of Social Sciences, United States Military AcademyHarmony and Disharmony - Exploiting al-Qa’ida’s Organizational Vulnerabilities-2006nono2
Nm/DCSINT 2005-US Army Training and Doctrine CommandTRADOC DCSINT Handbook No. 1. A Military Guide to Terrorism in the Twenty-First Century-2005noyes21
Nm/DeRosa 2004Mary DeRosaCenter for Strategic and International StudiesData Mining and Data Analysis for CounterterrorismThe CSIS Press2004yesyes6
Nm/Dombroski Carley 2002Matthew J. Dombroski, Kathleen M. Carley-NETEST: Estimating a Terrorist Network’s Structure-2002yesno2
Nm/Dugan etal 2006Laura Dugan, Gary LaFree, Heather FoggSharad Mehrotra, Daniel D. Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue WangA First Look at Domestic and International Global Terrorism Events, 1970–1997Springer-Verlag2006nono2
Nm/Freeman 1980Linton C. Freeman-The gatekeeper, Pair-dependency and Structural CentralityElsevier1980nono3
Nm/Frost 1982R.A. Frost-Binary-Relational Storage StructuresHeyden & Son Ltd1982yesyes3
Nm/Hamill 2006Jonathan T. Hamill-Analysis of layered social networks-2006nono11
Nm/Han Kamber 2006Jiawei Han, Micheline Kamber-Data Mining: Concepts and Techniques (second edition)Morgan Kaufmann, Elsevier2006nono2
Nm/Heer et al 2005Jeffrey Heer, Stuart K. Card, James A. LandayACMprefuse: a toolkit for interactive information visualization-2005noyes11
Nm/Holmgren 2006Åke J. Holmgren-Using Graph Models to Analyze the Vulnerability of Electric Power NetworksWiley2006nono3
Nm/Jensen et al 2003David Jensen, Matthew Rattigan, Hannah Blau-Information Awareness: A Prospective Technical Assessment-2003nono2
Nm/Katz et al 2004Nancy Katz, David Lazer, Holly Arrow, Noshir Contractor-Network Theory and Small Groups-2004yesyes4
Nm/Koelle et al 2006David Koelle, Jonathan Pfautz, Michael Farry, Zach Cox, Geoffrey Catto, Joseph Campolongo-Applications of Bayesian Belief Networks in Social Network Analysis-2006nono3
Nm/Koschade 2005Stuart A. KoschadeC. Bailey, Laurie R. BuysA Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia-2005nono3
Nm/Koschuetzki etal 2005D. Koschützki, K.A. Lehmann, L. Peeters, S. Richter, D. Tenfelde- Podehl, O. ZlotowskiUlrik Brandes, Thomas ErlebachChapter 3 Centrality IndicesSpringer2005nono3
Nm/Krebs 2002Krebs, Valdis E.-Mapping Networks of Terrorist Cells-2002yesno1
Nm/Krebs 2004Valdis Krebs-Organizational Hierarchy - Adapting Old Structures to New Challenges-2004yesyes2
Nm/Latora and Marchiori 2004Vito Latora, Massimo Marchiori-How the science of complex networks can help developing strategies against terrorismElsevier2004yesyes2
Nm/Lemieux 2003Vincent Lemieux-Criminal Networks-2003nono4
Nm/Malin etal 2005Bradley Malin, Edoardo Airoldi, Kathleen M. Carley-A Network Analysis Model for Disambiguation of Names in ListsSpringer2005nono1
Nm/Padhy 2006Prafullah Padhy-Organised CrimeIsha Books2006--1
Nm/Penzar etal 2005Dražen Penzar, Armano Srbljinović-About Modelling of complex networks with applications to terrorist group modelling-2005nono4
Nm/Perer Shneiderman 2006Adam Perer, Ben Shneiderman-Balancing Systematic and FlexibleExploration of Social NetworksIEEE Computer Society2006nono6
Nm/Popp and Poindexter 2006Robert Popp, John PoindexterIEEE Computer SocietyCountering Terrorism through Information and Privacy Protection Technologies-2006janein1
Nm/Qin et al 2005Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman, Hsinchun ChenKantor, P et al.Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad NetworkSpringer-Verlag2005yesyes1
Nm/Ressler 2006Steve ResslerNaval Postgraduate School Center for Homeland Defense and SecuritySocial Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research-2006yesyes12
Nm/Saxena et al. 2004Sudhir Saxena, K. Santhanam, Aparna BasuInstitute for Defence Studies and AnalysesApplication of Social Network Analysis (SNA) to Terrorist Networks in Jammu & Kashmir-2004nono3
Nm/Scott 1987John Scott-Social network analysis, a HandbookSage Publications1987yesyes2
Nm/Shelley 2002Louise I. ShelleyInternational Society for Criminology (ISC)The Nexus of Organized International Criminals and Terrorism-2002noyes7
Nm/Shelley Picarelli 2002Shelley, Louise I. and Picarelli, John T.-Methods Not Motives: Implications of the Convergence of International Organized Crime and Terrorism-2002noyes3
Nm/Smith and King 2002M.N. Smith, P.J.H. KingSchool of Computer Science and Information Systems, Birbeck College, University of LondonThe Exploratory Construction of Database Views-2002nono4
Nm/Stephenson and Zelen 1989Stephenson, Karen and Zelen, Marvin-Rethinking Centrality: Methods and Examples-1989janein6
Nm/Stokman 2004Frans N. Stokman-What Binds Us When With Whom? Content and Structure in Social Network Analysis-2004nono2
Nm/The Dark Web Project 2010University of ArizonaUniversity of ArizonaDark Web Terrorism ResearchUniversity of Arizona2010neinnein1
Nm/TrackingTheThreat.com 2006--About this site-2006noyes3
Nm/TrackingTheThreat.com 2006a--About TrackingTheThreat.com-2006noyes1
Nm/Tsvetovat et al. 2005Maksim Tsvetovat, Jana Diesner, Kathleen M. Carley-NetIntel: A Database for Manipulation of Rich Social Network Data-2005nono2
Nm/Visualcomplexity 2006-www.visualcomplexity.comTrackingTheThreat.com-2006nono2
Nm/Westphal and Blaxton 1998Christopher Westphal, Teresa Blaxton-Data Mining Solutions: Methods and Tools for Solving Real-World ProblemsJohn Wiley & Sons, Inc1998nono2
Nm/Wikipedia - Adnan Gulshair el Shukrijumah - 2006--Adnan Gulshair el Shukrijumah-2006noyes2
Nm/Wikipedia - World Trade Center bombing (1993) - 2006--World Trade Center bombing (1993)-2006noyes2
Nm/Wikipedia Riyadh compound bombings 2007--Riyadh compound bombings-2007noyes2
Nm/Wikipedia-Bojinka-plot 2006--Bojinka plot-2006nono1
Nm/WorldNetDaily - Wheeler 2003Scott L. Wheeler-'Dirty-bomb' plot under way in U.S.? - Fears over elusive al-Qaida suspect, missing reactor materials-2003neinnein1
Nm/Xu and Chen 2003Jennifer Xu, Hsinchun ChenChen, H et al.Untangling Criminal Networks: A Case StudySpringer-Verlag2003yesyes6
Nm/Xu and Chen 2005aJennifer Xu, Hsinchun Chen-Criminal Network Analysis and Visualization: A Data Mining Perspective-2005nono9
Nm/Xu and Chen 2005bJennifer J. Xu, Hsinchun Chen-CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery-2005yesyes1
Nm/Xu etal 2004Jennifer Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen-Analyzing and Visualizing Criminal Network Dynamics: A Case Study-2004nono10
Nm/Yang etal 2005Huijie Yang, Wenxu Wang, Tao Zhou, Binghong Wang, Fangcui Zhao-Reconstruct the Hierarchical Structure in a Complex Network-2005--1
Nm/Zhao et al 2006Bin Zhao, Prithviraj Sen, Lise Getoor-Entity and Relationship Labeling in Affiliation Networks-2006nono2
Nm/terrorism research 2005--terrorism research-2005nono2

Auch bei Fandom

Zufälliges Wiki