2008 12th International Conference Information Visualisation 2008
DOI: 10.1109/iv.2008.107
|View full text |Cite
|
Sign up to set email alerts
|

The Complexity of Terrorist Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Fellman [144] examined terrorist networks through SNA, agent-based simulation, and NK-Boolean fitness landscapes. The author studied the 11 September 2001 network [83], which embodies some of the emergent properties of terrorist networks such as centrality, distance, and hierarchy.…”
Section: Node Removal In Terrorist Networkmentioning
confidence: 99%
“…Fellman [144] examined terrorist networks through SNA, agent-based simulation, and NK-Boolean fitness landscapes. The author studied the 11 September 2001 network [83], which embodies some of the emergent properties of terrorist networks such as centrality, distance, and hierarchy.…”
Section: Node Removal In Terrorist Networkmentioning
confidence: 99%
“…with respect to the Iraqi insurgency. 16 This was not so much a methodological divide, as discussed above, as a basic policy divide, as well as a basic difference over a fundamental interpretation of the facts (for example, the misconception that Saddam Hussein was responsible for the events of 9/11). Even using a very simple regression methodology to cover the quantitative aspects of the confl ict, Anthony Cordesman of the Center for Strategic and International Studies compiled an overwhelming amount of material documenting the causes, nature, and implications of this divide.…”
Section: Theoretical Versus Practical Considerationsmentioning
confidence: 99%
“…4 At the same time, military intelligence professionals were frequently confronted by inadequate intelligence in the fi eld, whether tactical intelligence at the company level or strategic intelligence at the division level. 5 To go back to our work of a decade ago, while many principles remain the same, the evolution of computational systems and computational power has given us the ability to model many aspects of terrorism with an accuracy and scope impossible 10 years ago.…”
mentioning
confidence: 99%
“…These authors all rely on modeling to prove their points. More recent modeling approaches are presented by Fellman, et al (2007) and Fellman (2011a;2011b), who use fitness landscapes to demonstrate how optimal decision-making in terrorist networks can be countered by dividing the network in separate compartments. The model presented by Ghemawat & Levinthal (2000) is used, unaltered, as the source for this.…”
Section: 5mentioning
confidence: 99%