VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Registrieren

< Home < Alle < Nm2 < 12 Quellen

QuelleAutorHrsg.TitelVerlagJahrLit.-V.FNFrags.
Nm2/Arquilla Ronfeldt 2001John Arquilla, David Ronfeldt-Networks and Netwars: The future of crime, terror, and militancyRAND2001yesyes0
Nm2/Brandes Erlebach 2005Ulrik Brandes, Thomas ErlebachUlrik Brandes, Thomas ErlebachChapter 2 FundamentalsSpringer2005nono1
Nm2/DeRosa 2004Mary DeRosaCenter for Strategic and International StudiesData Mining and Data Analysis for CounterterrorismThe CSIS Press2004yesyes1
Nm2/Freeman 1980Linton C. Freeman-The gatekeeper, Pair-dependency and Structural CentralityElsevier1980nono3
Nm2/Katz et al 2004Nancy Katz, David Lazer, Holly Arrow, Noshir Contractor-Network Theory and Small Groups-2004nono2
Nm2/Koelle et al 2006David Koelle, Jonathan Pfautz, Michael Farry, Zach Cox, Geoffrey Catto, Joseph Campolongo-Applications of Bayesian Belief Networks in Social Network Analysis-2006nono1
Nm2/Koschade 2005Stuart A. KoschadeC. Bailey, Laurie R. BuysA Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia-2005nono2
Nm2/Koschuetzki et al 2005D. Koschützki, K.A. Lehmann, L. Peeters, S. Richter, D. Tenfelde- Podehl, O. ZlotowskiUlrik Brandes, Thomas ErlebachChapter 3 Centrality IndicesSpringer2005nono3
Nm2/Popp and Poindexter 2006Robert Popp, John PoindexterIEEE Computer SocietyCountering Terrorism through Information and Privacy Protection Technologies-2006nono2
Nm2/Stephenson and Zelen 1989Karen Stephenson, Marvin Zelen-Rethinking Centrality: Methods and Examples-1989nono3
Nm2/Thuraisingham 2003Bhavani Thuraisingham-Chapter 3: Data Mining for Counter-Terrorism-2003nono1
Nm2/Xu and Chen 2003Jennifer Xu, Hsinchun ChenChen, H et al.Untangling Criminal Networks: A Case StudySpringer2003nono2