Publication | Closed Access
Reshaping terrorist networks
16
Citations
15
References
2014
Year
Network ScienceTerrorist OrganizationsEngineeringTerrorist NetworksInformation SecuritySurvivable NetworkThreat HuntingNetwork AnalysisEducationHomeland SecurityComputer ScienceCommunicationTerrorism FinancingInformation WarfareNetwork SegmentationSocial Network Analysis
To destabilize terrorist organizations, the <code>STONE</code> algorithms identify a set of operatives whose removal would maximally reduce lethality.
| Year | Citations | |
|---|---|---|
Page 1
Page 1