Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Gómez, José M.
and
Perfectti, Francisco
2012.
Fitness consequences of centrality in mutualistic individual-based networks.
Proceedings of the Royal Society B: Biological Sciences,
Vol. 279,
Issue. 1734,
p.
1754.
Langhorne, Anna L.
2013.
Design, User Experience, and Usability. User Experience in Novel Technological Environments.
Vol. 8014,
Issue. ,
p.
112.
Lou, Jialin
Zhao, Jiaxin
and
Song, Yang
2013.
Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012.
Vol. 217,
Issue. ,
p.
593.
Schrodt, Philip A.
Yonamine, James
and
Bagozzi, Benjamin E.
2013.
Handbook of Computational Approaches to Counterterrorism.
p.
129.
Acosta, Benjamin
and
Childs, Steven J.
2013.
Illuminating the Global Suicide-Attack Network.
Studies in Conflict & Terrorism,
Vol. 36,
Issue. 1,
p.
49.
Swedlow, Brendon
2014.
Advancing Policy Theory with Cultural Theory: An Introduction to the Special Issue.
Policy Studies Journal,
Vol. 42,
Issue. 4,
p.
465.
McDoom, Omar Shahabudin
2014.
Antisocial Capital.
Journal of Conflict Resolution,
Vol. 58,
Issue. 5,
p.
865.
Basu, Aparna
2014.
Social Networking.
Vol. 65,
Issue. ,
p.
215.
Breiger, Ronald L.
Schoon, Eric
Melamed, David
Asal, Victor
and
Rethemeyer, R. Karl
2014.
Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade.
Social Networks,
Vol. 36,
Issue. ,
p.
23.
Kilger, Max
2015.
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios.
p.
693.
Walther, Olivier J
and
Leuprecht, Christian
2015.
Mapping and Deterring Violent Extremist Networks in North-West Africa.
SSRN Electronic Journal,
Zech, Steven T.
and
Gabbay, Michael
2016.
Social Network Analysis in the Study of Terrorism and Insurgency: From Organization to Politics.
International Studies Review,
Vol. 18,
Issue. 2,
p.
214.
del Val, E.
Martínez, C.
and
Botti, V.
2016.
Analyzing users’ activity in online social networks over time through a multi-agent framework.
Soft Computing,
Vol. 20,
Issue. 11,
p.
4331.
Ball, Leslie
2016.
Automating social network analysis: A power tool for counter-terrorism.
Security Journal,
Vol. 29,
Issue. 2,
p.
147.
Perliger, Arie
Koehler-Derrick, Gabriel
and
Pedahzur, Ami
2016.
The Gap Between Participation and Violence: Why We Need to Disaggregate Terrorist ‘Profiles’.
International Studies Quarterly,
Vol. 60,
Issue. 2,
p.
220.
Pedahzur, Ami
and
Martin, Susanne
2016.
The Handbook of the Criminology of Terrorism.
p.
339.
Ban, Vin Shen
Lega, Bradley
and
Batjer, H. Hunt
2016.
Maximizing the Potential of Social Media and Social Networks in Neurosurgery.
World Neurosurgery,
Vol. 91,
Issue. ,
p.
609.
Cenciarelli, Orlando
Mancinelli, Sandro
Ludovici, Gian Marco
and
Palombi, Leonardo
2017.
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges.
p.
277.
Cranmer, Skyler J.
Leifeld, Philip
McClurg, Scott D.
and
Rolfe, Meredith
2017.
Navigating the Range of Statistical Tools for Inferential Network Analysis.
American Journal of Political Science,
Vol. 61,
Issue. 1,
p.
237.
Leenders, Roger
2017.
Encyclopedia of Social Network Analysis and Mining.
p.
1.