1. Krebs, V.E.: Uncloacking Terrorist Networks. First Monday 7, 4–1 (2002)
2. Borgatti, S.P., Everett, M.G., Freeman, L.C.: UCINET 6 for Windows, Analytic Technologies. Harvard University Press, Cambridge (2002)
3. Fellman, P.V., Wright, R.: Modeling Terrorist Networks - Complex Systems at the Mid-Range. In: Proceedings of Complexity, Ethics and Creativity Conference, LSE (2003)
4. Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O.: Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. Proceedings of Journal of Information Warfare (2004)
5. Tube, V.G.: Measuring the Social Capital of Brokerage Roles, Connections. International Network for Social Network Analysis 36(1), 29–52 (2004)