Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Gómez, José M.
and
Perfectti, Francisco
2012.
Fitness consequences of centrality in mutualistic individual-based networks.
Proceedings of the Royal Society B: Biological Sciences,
Vol. 279,
Issue. 1734,
p.
1754.
Lou, Jialin
Zhao, Jiaxin
and
Song, Yang
2013.
Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012.
Vol. 217,
Issue. ,
p.
593.
Acosta, Benjamin
and
Childs, Steven J.
2013.
Illuminating the Global Suicide-Attack Network.
Studies in Conflict & Terrorism,
Vol. 36,
Issue. 1,
p.
49.
Schrodt, Philip A.
Yonamine, James
and
Bagozzi, Benjamin E.
2013.
Handbook of Computational Approaches to Counterterrorism.
p.
129.
Langhorne, Anna L.
2013.
Design, User Experience, and Usability. User Experience in Novel Technological Environments.
Vol. 8014,
Issue. ,
p.
112.
McDoom, Omar Shahabudin
2014.
Antisocial Capital.
Journal of Conflict Resolution,
Vol. 58,
Issue. 5,
p.
865.
Swedlow, Brendon
2014.
Advancing Policy Theory with Cultural Theory: An Introduction to the Special Issue.
Policy Studies Journal,
Vol. 42,
Issue. 4,
p.
465.
Basu, Aparna
2014.
Social Networking.
Vol. 65,
Issue. ,
p.
215.
Breiger, Ronald L.
Schoon, Eric
Melamed, David
Asal, Victor
and
Rethemeyer, R. Karl
2014.
Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade.
Social Networks,
Vol. 36,
Issue. ,
p.
23.
Walther, Olivier J
and
Leuprecht, Christian
2015.
Mapping and Deterring Violent Extremist Networks in North-West Africa.
SSRN Electronic Journal,
Kilger, Max
2015.
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios.
p.
693.
Perliger, Arie
Koehler-Derrick, Gabriel
and
Pedahzur, Ami
2016.
The Gap Between Participation and Violence: Why We Need to Disaggregate Terrorist ‘Profiles’.
International Studies Quarterly,
Vol. 60,
Issue. 2,
p.
220.
Ban, Vin Shen
Lega, Bradley
and
Batjer, H. Hunt
2016.
Maximizing the Potential of Social Media and Social Networks in Neurosurgery.
World Neurosurgery,
Vol. 91,
Issue. ,
p.
609.
Ball, Leslie
2016.
Automating social network analysis: A power tool for counter-terrorism.
Security Journal,
Vol. 29,
Issue. 2,
p.
147.
del Val, E.
Martínez, C.
and
Botti, V.
2016.
Analyzing users’ activity in online social networks over time through a multi-agent framework.
Soft Computing,
Vol. 20,
Issue. 11,
p.
4331.
Pedahzur, Ami
and
Martin, Susanne
2016.
The Handbook of the Criminology of Terrorism.
p.
339.
Zech, Steven T.
and
Gabbay, Michael
2016.
Social Network Analysis in the Study of Terrorism and Insurgency: From Organization to Politics.
International Studies Review,
Vol. 18,
Issue. 2,
p.
214.
Cranmer, Skyler J.
Leifeld, Philip
McClurg, Scott D.
and
Rolfe, Meredith
2017.
Navigating the Range of Statistical Tools for Inferential Network Analysis.
American Journal of Political Science,
Vol. 61,
Issue. 1,
p.
237.
Leenders, Roger
2017.
Encyclopedia of Social Network Analysis and Mining.
p.
1.
Cenciarelli, Orlando
Mancinelli, Sandro
Ludovici, Gian Marco
and
Palombi, Leonardo
2017.
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges.
p.
277.