{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:11:51Z","timestamp":1742998311513,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":16,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461461692"},{"type":"electronic","value":"9781461461708"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-6170-8_281","type":"book-chapter","created":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T14:46:42Z","timestamp":1412434002000},"page":"285-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Counterterrorism, Social Network Analysis In"],"prefix":"10.1007","author":[{"given":"Charu C.","family":"Aggarwal","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"key":"281_CR3565","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8462-3","volume-title":"Social network data analytics","author":"CC Aggarwal","year":"2011","unstructured":"Aggarwal CC (2011) Social network data analytics. Springer, New York"},{"key":"281_CR3566","volume-title":"ICDM conference","author":"CC Aggarwal","year":"2011","unstructured":"Aggarwal CC, Li Y, Yu P (2011) On the hardness of graph anonymization. In: ICDM conference. Vancouver, Canada"},{"key":"281_CR3567","volume-title":"ACM KDD conference","author":"R Al-Zaidy","year":"2011","unstructured":"Al-Zaidy R, Fung BCM, Yousseff AM (2011) Towards discovering criminal communities from textual data. In: ACM KDD conference. San Diego, CA"},{"key":"281_CR3568","first-page":"209","volume-title":"Handbooks in information systems","author":"J Baumes","year":"2007","unstructured":"Baumes J, Goldberg M, Magdon-Ismail M, Wallace W (2007) Identification of hidden groups in communications. In: Handbooks in information systems. Elsevier, Amsterdam, pp 209\u2013242"},{"key":"281_CR3569","volume-title":"Proceedings of the 8th international command and control research and technology symposium","author":"K Carley","year":"2003","unstructured":"Carley K, Dombroski M, Tsvetovat A, Reminga J, Kamneva N (2003) Destabilizing dynamic covert networks. In: Proceedings of the 8th international command and control research and technology symposium. Washington DC"},{"key":"281_CR3570","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1020723730930","volume":"8","author":"M Dombroski","year":"2002","unstructured":"Dombroski M, Carley KM (2002) Netest: estimating a terrorist network's structure. Comput Math Organ Theory 8:235\u2013241","journal-title":"Comput Math Organ Theory"},{"key":"281_CR3571","unstructured":"Dryer A (2006) How the NSA does \u201cSocial network analysis\u201d. Slate. \n                  http:\/\/www.slate.com\/articles\/news_and_politics\/explainer\/2006\/05\/how_the_nsa_does_soci%20al_network_analysis.html"},{"key":"281_CR3572","volume-title":"Social network analysis: methods and applications (structural analysis in the social sciences)","author":"K Faust","year":"1994","unstructured":"Faust K, Wasserman S (1994) Social network analysis: methods and applications (structural analysis in the social sciences). Cambridge University Press, Cambridge"},{"key":"281_CR3573","volume-title":"Technical Report CMU\u2013ISRI\u201305\u2013109","author":"T Franz","year":"2005","unstructured":"Franz T, Carley K (2005) A formal characterization of cellular networks. Technical Report CMU\u2013ISRI\u201305\u2013109, School of Computer Science, Carnegie Mellon University"},{"key":"281_CR3574","volume-title":"VLDB","author":"M Hay","year":"2008","unstructured":"Hay M, Miklau G, Jensen D, Towsley D, Weis P (2008) Resisting Structural Re-identification in Social Networks. In: VLDB. Auckland, New Zealand"},{"key":"281_CR3575","unstructured":"Krebs V (2002a) Social network analysis of the 9\u201311 terror network. \n                  http:\/\/www.orgnet.com\/hijackers.html"},{"issue":"3","key":"281_CR3576","first-page":"43","volume":"24","author":"V Krebs","year":"2002","unstructured":"Krebs V (2002b) Mapping networks of terrorist cells. Connect 24(3):43\u201352","journal-title":"Connect"},{"issue":"6","key":"281_CR3577","first-page":"101","volume":"48","author":"J Xu","year":"2005","unstructured":"Xu J, Chen H (2005a) Criminal network analysis and visualization. Commun ACM 48(6) 101\u2013107","journal-title":"Commun ACM"},{"issue":"2","key":"281_CR3578","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/1059981.1059984","volume":"23","author":"J Xu","year":"2005","unstructured":"Xu J, Chen H (2005b) Crimenet explorer: a framework for criminal network knowledge discovery. ACM Trans Inf Syst 23(2) 201\u2013226","journal-title":"ACM Trans Inf Syst"},{"key":"281_CR3579","volume-title":"Proceedings of the 2nd NSF\/NIJ symposium on intelligence and security informatics (ISI\u201904)","author":"J Xu","year":"2004","unstructured":"Xu J, Marshall B, Kaza S, Chen H (2004) Analyzing and visualizing criminal network dynamics: a case study. In: Proceedings of the 2nd NSF\/NIJ symposium on intelligence and security informatics (ISI\u201904), Tucson, 10\u201311 June 2004"},{"issue":"1","key":"281_CR3580","first-page":"1","volume":"6","author":"J Xu","year":"2009","unstructured":"Xu J, Hu D, Chen H (2009) Dynamics of terrorist networks: understanding the survival mechanisms of global salafi jihad. J Homel Secur Emerg Manag 6(1):1\u201333","journal-title":"J Homel Secur Emerg Manag"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-6170-8_281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:55:32Z","timestamp":1591052132000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-6170-8_281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9781461461692","9781461461708"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-6170-8_281","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"5 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}