1. Borgatti SP (2002) The key player problem. In: Proceedings from National Academy of Sciences Workshop on Terrorism, Washington DC
2. Butts C (2001) Network inference, error, and informant (In)accuracy: A bayesian approach. To appear in social networks
3. Carley KM, Krackhardt D (1999) A typology for C$^2$ Measures. In: Proceedings of the 1999 International Symposium on Command and Control Research and Technology. June, Newport, RI
4. Carley KM, Reminga J (2004) ORA: Organization risk analyzer. Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Technical Report CMU-ISRI-04–101
5. Carley KM, Ren Y (2001) Tradeoffs between performance and adaptability for C3I architectures. In: Proceedings of the 2000 International Symposium on Command and Control Research and Technology