Showing 1 - 10 of 14
Persistent link: https://www.econbiz.de/10003907319
Persistent link: https://www.econbiz.de/10003987175
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10009308025
Persistent link: https://www.econbiz.de/10009759689
Persistent link: https://www.econbiz.de/10009562859
Persistent link: https://www.econbiz.de/10003736604
Persistent link: https://www.econbiz.de/10010395521
Persistent link: https://www.econbiz.de/10003752309
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10014177191
Covert organizations are constantly faced with a tradeoff between secrecy and operational effciency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to determine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this...
Persistent link: https://www.econbiz.de/10014218001