Hu Xiao-Feng. A brief survey on war complex networks studies. Complex System and Complexity Science, 2010, 7(2): 24-28(胡晓峰. 战争复杂网络研究概述. 复杂系统与复杂性科学, 2010, 7(2): 24-28)
[2]
Carley K M. Destabilization of covert networks. Computational and Mathematical Organization Theory, 2006, 12(1): 51-56
[3]
Bohannon J. Counterterrorism's new tool: "metanetwork" analysis. Science, 2009, 325(5939): 409-411
[4]
Weinberger S. Web of war. Nature, 2011, 471: 566-568
[5]
Morselli C, Giguére C, Petit K. The efficiency/security trade-off in criminal networks. Social Networks, 2007, 29(1): 143-153
[6]
Sageman M. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press, 2004. 1-147
[7]
Gong Kai, Tang Ming, Shang Ming-Sheng, Zhou Tao. Empirical study on spatiotemporal evolution of online public opinion. Acta Physica Sinica, 2012, 61(9): 526-532(龚凯, 唐明, 尚明生, 周涛. 在线热点事件的时空演变规律. 物理学报, 2012, 61(9): 526-532)
[8]
Liu Xu, Yi Dong-Yun. Complex network community detection by local similarity. Acta Automatica Sinica, 2011, 37(12): 1520-1529(刘旭, 易东云. 基于局部相似性的复杂网络社区发现方法. 自动化学报, 2011, 37(12): 1520-1529)
[9]
Leweling T A, Nissen M E. Defining and exploring the terrorism field: toward an intertheoretic, agent-based approach. Technological Forecasting and Social Change, 2007, 74(2): 165-192
[10]
Deng Bi-Bo. Terrorism organization elements, activity and prevention. Journal of PLA Nanjing Institute of Politics, 2009, 25(5): 78-80(邓碧波. 恐怖主义组织的要素、活动及其预防. 南京政治学院学报, 2009, 25(5): 78-80)
[11]
Crutchfield J P. Between order and chaos. Nature Physics, 2002, 8: 17-24
[12]
Albert R, Barabási A L. Topology of evolving networks: local events and universality. Physical Review Letters, 2000, 85(24): 5234-5237
[13]
Albert R, Barabási A L. Statistical mechanics of complex networks. Reviews of Modern Physics, 2002, 74(1): 76-85
[14]
Fenstermacher L, Kuznar C L, Rieger T. Protecting the homeland from international and domestic terrorism threats: individual and group mechanisms. RAND, 2010: 82-91
[15]
Kossinets G, Watts D J. Empirical analysis of an evolving social network. Science, 2006, 311(5757): 88-90
[16]
Zawodny J K. Infrastructure of Terrorist Organizations. In: Freedman L Z, Alexander Y. Perspectives on Terrorism. Delaware, Wilmington: Scholarly Resources, 1983
[17]
Krebs V E. Uncloaking terrorist network. First Monday, 2002, 7(4): 1-4
[18]
Krebs V E. Mapping networks of terrorist cells. Connections, 2002, 24(3): 43-52
[19]
Xu Xiao-Ke, Fang Jin-Qing. Applications of complex network theory in war on terrorism. Complex System and Complexity Science, 2010, 7(2): 116-119(许小可, 方锦清. 复杂网络理论在反恐战争中的应用. 复杂系统与复杂性科学, 2010, 7(2): 116-119)
[20]
Borgatti S P, Mehra A, Brass D J, Labianca G. Network analysis in the social sciences. Science, 2009, 323(5916): 892-895
[21]
Carpenter T, Karakostas G, Shallcross D. Practical issues and algorithms for analyzing terrorist networks. In: Proceedings of the 2nd International Workshop on Mobile Commerce (WMC). New York, USA: ACM, 2002. 49
[22]
Carley K M, Dombroski M, Tsvetovat M, Reminga J, Kamneva N. Destabilizing dynamic covert networks. In: Proceedings of the 8th International Command and Control Defense Research and Technology Symposium. Washington, DC, 2003. 45-89
[23]
Barabasi A L. Linked: The New Science of Networks. Cambridge: Perseus Press, 2002. 222-224
[24]
Chen Peng, Yuan Hong-Yong. Social network analysis of crime organization structures. Journal of Tsinghua University (Science and Technology), 2011, 51(8): 15-25 (陈鹏, 袁宏永. 犯罪组织结构的社会网络分析. 清华大学学报(自然科学版), 2011, 51(8): 15-25)
[25]
Zhu J F, Han X P, Wang B H. Statistical property and model for the inter-event time of terrorism attacks. Chinese Physics Letters, 2010, 27(6): 273-276
[26]
Jin Di, Liu Jie, Yang Bo, He Dong-Xiao, Liu Da-You. Genetic algorithm with local search for community detection in large-scale complex networks. Acta Automatica Sinica, 2011, 37(7): 873-882(金弟, 刘杰, 杨博, 何东晓, 刘大有. 局部搜索与遗传算法结合的大规模复杂网络社区探测. 自动化学报, 2011, 37(7): 873-882)