[1]
|
Hu Xiao-Feng. A brief survey on war complex networks studies. Complex System and Complexity Science, 2010, 7(2): 24-28(胡晓峰. 战争复杂网络研究概述. 复杂系统与复杂性科学, 2010, 7(2): 24-28)
|
[2]
|
Krebs V E. Mapping networks of terrorist cells. Connections, 2002, 24(3): 43-52
|
[3]
|
Carley K M. Destabilization of covert networks. Computational and Mathematical Organization Theory, 2006, 12(1): 51-56
|
[4]
|
Xu Xiao-Ke, Fang Jin-Qing. Applications of complex network theory in war on terrorism. Complex System and Complexity Science, 2010, 7(2): 116-119(许小可, 方锦清. 复杂网络理论在反恐战争中的应用. 复杂系统与复杂性科学, 2010, 7(2): 116-119)
|
[5]
|
Borgatti S P, Mehra A, Brass D J, Labianca G. Network analysis in the social sciences. Science, 2009, 323(5916): 892-895
|
[6]
|
Bohannon J. Counterterrorism's new tool: "metanetwork" analysis. Science, 2009, 325(5939): 409-411
|
[7]
|
Weinberger S. Web of war. Nature, 2011, 471: 566-568
|
[8]
|
Carpenter T, Karakostas G, Shallcross D. Practical issues and algorithms for analyzing terrorist networks. In: Proceedings of the 2nd International Workshop on Mobile Commerce (WMC). New York, USA: ACM, 2002. 49
|
[9]
|
Carley K M, Dombroski M, Tsvetovat M, Reminga J, Kamneva N. Destabilizing dynamic covert networks. In: Proceedings of the 8th International Command and Control Defense Research and Technology Symposium. Washington, DC, 2003. 45-89
|
[10]
|
Morselli C, Giguére C, Petit K. The efficiency/security trade-off in criminal networks. Social Networks, 2007, 29(1): 143-153
|
[11]
|
Barabasi A L. Linked: The New Science of Networks. Cambridge: Perseus Press, 2002. 222-224
|
[12]
|
Sageman M. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press, 2004. 1-147
|
[13]
|
Chen Peng, Yuan Hong-Yong. Social network analysis of crime organization structures. Journal of Tsinghua University (Science and Technology), 2011, 51(8): 15-25 (陈鹏, 袁宏永. 犯罪组织结构的社会网络分析. 清华大学学报(自然科学版), 2011, 51(8): 15-25)
|
[14]
|
Gong Kai, Tang Ming, Shang Ming-Sheng, Zhou Tao. Empirical study on spatiotemporal evolution of online public opinion. Acta Physica Sinica, 2012, 61(9): 526-532(龚凯, 唐明, 尚明生, 周涛. 在线热点事件的时空演变规律. 物理学报, 2012, 61(9): 526-532)
|
[15]
|
Zhu J F, Han X P, Wang B H. Statistical property and model for the inter-event time of terrorism attacks. Chinese Physics Letters, 2010, 27(6): 273-276
|
[16]
|
Jin Di, Liu Jie, Yang Bo, He Dong-Xiao, Liu Da-You. Genetic algorithm with local search for community detection in large-scale complex networks. Acta Automatica Sinica, 2011, 37(7): 873-882(金弟, 刘杰, 杨博, 何东晓, 刘大有. 局部搜索与遗传算法结合的大规模复杂网络社区探测. 自动化学报, 2011, 37(7): 873-882)
|
[17]
|
Liu Xu, Yi Dong-Yun. Complex network community detection by local similarity. Acta Automatica Sinica, 2011, 37(12): 1520-1529(刘旭, 易东云. 基于局部相似性的复杂网络社区发现方法. 自动化学报, 2011, 37(12): 1520-1529)
|
[18]
|
Leweling T A, Nissen M E. Defining and exploring the terrorism field: toward an intertheoretic, agent-based approach. Technological Forecasting and Social Change, 2007, 74(2): 165-192
|
[19]
|
Deng Bi-Bo. Terrorism organization elements, activity and prevention. Journal of PLA Nanjing Institute of Politics, 2009, 25(5): 78-80(邓碧波. 恐怖主义组织的要素、活动及其预防. 南京政治学院学报, 2009, 25(5): 78-80)
|
[20]
|
Li Zhi-Hui. Counter-terrorism Study. Beijing: People's Press, 2003. 35-41(李智慧. 反恐学. 北京: 人民出版社, 2003. 35-41)
|
[21]
|
Crutchfield J P. Between order and chaos. Nature Physics, 2002, 8: 17-24
|
[22]
|
Gan Min, Peng Hui, Huang Yun-Zhi, Dong Xue-Ping. Initial distribution search algorithm for self-organizing state space model. Acta Automatica Sinica, 2012, 38(9): 1538-1543(甘敏, 彭辉, 黄云志, 董学平. 自组织状态空间模型参数初始分布搜索算法. 自动化学报, 2012, 38(9): 1538-1543)
|
[23]
|
Cui Ai-Xiang, Fu Yan, Shang Ming-Sheng, Chen Duan-Bing, Zhou Tao. Emergence of local structures in complex network: common neighborhood drives the network evolution. Acta Physica Sinica, 2011, 60(3): 803-808(崔爱香, 傅彦, 尚明生, 陈端兵, 周涛. 复杂网络局部结构的涌现: 共同邻居驱动网络演化. 物理学报, 2011, 60(3): 803-808)
|
[24]
|
Barabási A L, Albert R. Emergence of scaling in random networks. Science, 1999, 286(5439): 509-512
|
[25]
|
Albert R, Barabási A L. Topology of evolving networks: local events and universality. Physical Review Letters, 2000, 85(24): 5234-5237
|
[26]
|
Albert R, Barabási A L. Statistical mechanics of complex networks. Reviews of Modern Physics, 2002, 74(1): 76-85
|
[27]
|
Enders W, Su X J. Rational terrorists and optimal network structure. Journal of Conflict Resolution, 2007, 51(1): 33-57
|
[28]
|
Fenstermacher L, Kuznar C L, Rieger T. Protecting the homeland from international and domestic terrorism threats: individual and group mechanisms. RAND, 2010: 82-91
|
[29]
|
Kossinets G, Watts D J. Empirical analysis of an evolving social network. Science, 2006, 311(5757): 88-90
|
[30]
|
Wasserman S, Faust K. Social Network Analysis: Methods and Applications. England: Cambridge University Press, 1994. 178-179
|
[31]
|
White J R. Terrorism: An Introduction. White Californian: Wadsworth Thomson Learning, 2002. 21-135
|
[32]
|
Mei Jian-Ming. Counterterrorism Intelligence and Crisis Management. Beijing: Qunzhong Press, 2007. 66-67(梅建明. 反恐情报与危机管理. 北京: 群众出版社, 2007. 66-67)
|
[33]
|
Zawodny J K. Infrastructure of Terrorist Organizations. In: Freedman L Z, Alexander Y. Perspectives on Terrorism. Delaware, Wilmington: Scholarly Resources, 1983
|
[34]
|
Krebs V E. Uncloaking terrorist network. First Monday, 2002, 7(4): 1-4
|