| [1] | Hu Xiao-Feng. A brief survey on war complex networks studies. Complex System and Complexity Science, 2010, 7(2): 24-28(胡晓峰. 战争复杂网络研究概述. 复杂系统与复杂性科学, 2010, 7(2): 24-28) | 
		
				| [2] | Krebs V E. Mapping networks of terrorist cells. Connections, 2002, 24(3): 43-52 | 
		
				| [3] | Carley K M. Destabilization of covert networks. Computational and Mathematical Organization Theory, 2006, 12(1): 51-56 | 
		
				| [4] | Xu Xiao-Ke, Fang Jin-Qing. Applications of complex network theory in war on terrorism. Complex System and Complexity Science, 2010, 7(2): 116-119(许小可, 方锦清. 复杂网络理论在反恐战争中的应用. 复杂系统与复杂性科学, 2010, 7(2): 116-119) | 
		
				| [5] | Borgatti S P, Mehra A, Brass D J, Labianca G. Network analysis in the social sciences. Science, 2009, 323(5916): 892-895 | 
		
				| [6] | Bohannon J. Counterterrorism's new tool: "metanetwork" analysis. Science, 2009, 325(5939): 409-411 | 
		
				| [7] | Weinberger S. Web of war. Nature, 2011, 471: 566-568 | 
		
				| [8] | Carpenter T, Karakostas G, Shallcross D. Practical issues and algorithms for analyzing terrorist networks. In: Proceedings of the 2nd International Workshop on Mobile Commerce (WMC). New York, USA: ACM, 2002. 49 | 
		
				| [9] | Carley K M, Dombroski M, Tsvetovat M, Reminga J, Kamneva N. Destabilizing dynamic covert networks. In: Proceedings of the 8th International Command and Control Defense Research and Technology Symposium. Washington, DC, 2003. 45-89 | 
		
				| [10] | Morselli C, Giguére C, Petit K. The efficiency/security trade-off in criminal networks. Social Networks, 2007, 29(1): 143-153 | 
		
				| [11] | Barabasi A L. Linked: The New Science of Networks. Cambridge: Perseus Press, 2002. 222-224 | 
		
				| [12] | Sageman M. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press, 2004. 1-147 | 
		
				| [13] | Chen Peng, Yuan Hong-Yong. Social network analysis of crime organization structures. Journal of Tsinghua University (Science and Technology), 2011, 51(8): 15-25 (陈鹏, 袁宏永. 犯罪组织结构的社会网络分析. 清华大学学报(自然科学版), 2011, 51(8): 15-25) | 
		
				| [14] | Gong Kai, Tang Ming, Shang Ming-Sheng, Zhou Tao. Empirical study on spatiotemporal evolution of online public opinion. Acta Physica Sinica, 2012, 61(9): 526-532(龚凯, 唐明, 尚明生, 周涛. 在线热点事件的时空演变规律. 物理学报, 2012, 61(9): 526-532) | 
		
				| [15] | Zhu J F, Han X P, Wang B H. Statistical property and model for the inter-event time of terrorism attacks. Chinese Physics Letters, 2010, 27(6): 273-276 | 
		
				| [16] | Jin Di, Liu Jie, Yang Bo, He Dong-Xiao, Liu Da-You. Genetic algorithm with local search for community detection in large-scale complex networks. Acta Automatica Sinica, 2011, 37(7): 873-882(金弟, 刘杰, 杨博, 何东晓, 刘大有. 局部搜索与遗传算法结合的大规模复杂网络社区探测. 自动化学报, 2011, 37(7): 873-882) | 
		
				| [17] | Liu Xu, Yi Dong-Yun. Complex network community detection by local similarity. Acta Automatica Sinica, 2011, 37(12): 1520-1529(刘旭, 易东云. 基于局部相似性的复杂网络社区发现方法. 自动化学报, 2011, 37(12): 1520-1529) | 
		
				| [18] | Leweling T A, Nissen M E. Defining and exploring the terrorism field: toward an intertheoretic, agent-based approach. Technological Forecasting and Social Change, 2007, 74(2): 165-192 | 
		
				| [19] | Deng Bi-Bo. Terrorism organization elements, activity and prevention. Journal of PLA Nanjing Institute of Politics, 2009, 25(5): 78-80(邓碧波. 恐怖主义组织的要素、活动及其预防. 南京政治学院学报, 2009, 25(5): 78-80) | 
		
				| [20] | Li Zhi-Hui. Counter-terrorism Study. Beijing: People's Press, 2003. 35-41(李智慧. 反恐学. 北京: 人民出版社, 2003. 35-41) | 
		
				| [21] | Crutchfield J P. Between order and chaos. Nature Physics, 2002, 8: 17-24 | 
		
				| [22] | Gan Min, Peng Hui, Huang Yun-Zhi, Dong Xue-Ping. Initial distribution search algorithm for self-organizing state space model. Acta Automatica Sinica, 2012, 38(9): 1538-1543(甘敏, 彭辉, 黄云志, 董学平. 自组织状态空间模型参数初始分布搜索算法. 自动化学报, 2012, 38(9): 1538-1543) | 
		
				| [23] | Cui Ai-Xiang, Fu Yan, Shang Ming-Sheng, Chen Duan-Bing, Zhou Tao. Emergence of local structures in complex network: common neighborhood drives the network evolution. Acta Physica Sinica, 2011, 60(3): 803-808(崔爱香, 傅彦, 尚明生, 陈端兵, 周涛. 复杂网络局部结构的涌现: 共同邻居驱动网络演化. 物理学报, 2011, 60(3): 803-808) | 
		
				| [24] | Barabási A L, Albert R. Emergence of scaling in random networks. Science, 1999, 286(5439): 509-512 | 
		
				| [25] | Albert R, Barabási A L. Topology of evolving networks: local events and universality. Physical Review Letters, 2000, 85(24): 5234-5237 | 
		
				| [26] | Albert R, Barabási A L. Statistical mechanics of complex networks. Reviews of Modern Physics, 2002, 74(1): 76-85 | 
		
				| [27] | Enders W, Su X J. Rational terrorists and optimal network structure. Journal of Conflict Resolution, 2007, 51(1): 33-57 | 
		
				| [28] | Fenstermacher L, Kuznar C L, Rieger T. Protecting the homeland from international and domestic terrorism threats: individual and group mechanisms. RAND, 2010: 82-91 | 
		
				| [29] | Kossinets G, Watts D J. Empirical analysis of an evolving social network. Science, 2006, 311(5757): 88-90 | 
		
				| [30] | Wasserman S, Faust K. Social Network Analysis: Methods and Applications. England: Cambridge University Press, 1994. 178-179 | 
		
				| [31] | White J R. Terrorism: An Introduction. White Californian: Wadsworth Thomson Learning, 2002. 21-135 | 
		
				| [32] | Mei Jian-Ming. Counterterrorism Intelligence and Crisis Management. Beijing: Qunzhong Press, 2007. 66-67(梅建明. 反恐情报与危机管理. 北京: 群众出版社, 2007. 66-67) | 
		
				| [33] | Zawodny J K. Infrastructure of Terrorist Organizations. In: Freedman L Z, Alexander Y. Perspectives on Terrorism. Delaware, Wilmington: Scholarly Resources, 1983 | 
		
				| [34] | Krebs V E. Uncloaking terrorist network. First Monday, 2002, 7(4): 1-4 |