References
- Abram PJ and Smith JD (2004). Modelling and analysis of terrorist network disruption. MSc thesis, Cranfield University, Shrivenham.
- Borgatti SP, Everett MG and Freeman LC (2002). UCINET 6.29 for Windows: Software for Social Network Analysis. Analytic Technologies: Harvard.
- BorgattiSPCarleyKMKrackhardtDOn the robustness of centrality measures under conditions of imperfect dataSoc Networks20062812413610.1016/j.socnet.2005.05.001
- CarleyKMLeeJKrackhardtDDestabilising networksConnections20012433134
- FarleyJDBreaking Al Qaeda Cells: A mathematical analysis of counter-terrorism operationsStud in Confl Terrorism20032639941110.1080/10576100390242857
- Fellman PV and Wright R (2004). Modeling terrorist networks: Complex systems at the mid-range. Available online at http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf.
- Irwin C, Roberts C and Mee N (2002). Counter terrorism overseas. Dstl Report, Dstl/CD053271/1.1.
- Krebs V (2002). Uncloaking terrorist networks. First Monday 7 (4).
- NewmanMEJThe structure and function of complex networksSIAM Rev200345216725610.1137/S003614450342480
- RhodesCJKeefeEMJSocial network topology: A Bayesian approachJ Opl Res Soc200758121605161110.1057/palgrave.jors.2602352
- ScottJSocial Network Analysis: A Handbook2000
- SiviaDSData Analysis: A Bayesian Tutorial2004
- WassermanSFaustKSocial Network Analysis: Methods and Applications1994