1. Abbasi, A., & Chen, H. (2005). Applying authorship analysis to extremist-group [Web forum messages]. Retrieved from http://www.ieee.org.
2. Ahmed, S. T., Bhindwale, R., & Davulcu, H. (2009). Tracking terrorism news threads by extracting event signatures. In Proceedings of Intelligence and Security Informatics (ISI 2009), (pp. 182-184). Richardson, TX: IEEE Press.
3. Terrorist Signalling and the Value of Intelligence
4. Army, U. S. (2007). A military guide to terrorism in the twenty-first century. In US Army TRADOC G2 Handbook No. 1, (pp. 1-182). Retrieved Nov. 7, 2010, from http://www.fas.org/irp/threat/terrorism/guide.pdf.