Author:
Elhajj Ahmed,Elsheikh Abdallah,Addam Omar,Alzohbi Mohamad,Zarour Omar,Aksaç Alper,Öztürk Orkun,Özyer Tansel,Ridley Mick,Alhajj Reda
Reference27 articles.
1. Agarwal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. In: ACM SIGMOD international conference on management of data
2. Carley KM (2003) Dynamic network analysis. In: Breiger R, Carely KM (eds) The summary of the NRC workshop on social network modeling and analysis. National research council
3. Carley KM, Reminga J, Kamneva N (2003) Destabilizing terrorist networks. In: NAACSOS conference proceedings, Pittsburgh, PA
4. Carrington PJ, Scott J, Wasserman S (2005) Models and methods in social network analysis. Cambridge University Press, Cambridge
5. Farely DJ (2003) Breaking Al Qaeda cells: a mathematical analysis of counterterrorism operations. Stud Confl Terror 26:399–411
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献