Showing 1 - 10 of 14
Persistent link: https://www.econbiz.de/10010395521
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation … of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game … the terrorist network, which usually reflects a communication structure, as well non-network features, which represent …
Persistent link: https://www.econbiz.de/10009308025
Persistent link: https://www.econbiz.de/10009759689
Persistent link: https://www.econbiz.de/10003907319
Persistent link: https://www.econbiz.de/10003987175
Persistent link: https://www.econbiz.de/10009562859
Persistent link: https://www.econbiz.de/10003736604
Persistent link: https://www.econbiz.de/10003752309
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation … of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game … the terrorist network, which usually reflects a communication structure, as well non-network features, which represent …
Persistent link: https://www.econbiz.de/10014177191
Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some … interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to … accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is …
Persistent link: https://www.econbiz.de/10014218001