{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T10:44:38Z","timestamp":1759229078037,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319933719"},{"type":"electronic","value":"9783319933726"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93372-6_37","type":"book-chapter","created":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T11:08:26Z","timestamp":1528888106000},"page":"340-347","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Implicit Terrorist Networks: A Two-Mode Social Network Analysis of Terrorism in India"],"prefix":"10.1007","author":[{"given":"Rithvik","family":"Yarlagadda","sequence":"first","affiliation":[]},{"given":"Diane","family":"Felmlee","sequence":"additional","affiliation":[]},{"given":"Dinesh","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Scott","family":"Gartner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"issue":"1","key":"37_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10967494.2015.1027431","volume":"19","author":"VH Asal","year":"2016","unstructured":"Asal, V.H., Park, H.H., Rethemeyer, R.K., Ackerman, G.: With friends like these... Why terrorist organizations ally. Int. Public Manag. J. 19(1), 1\u201330 (2016)","journal-title":"Int. Public Manag. J."},{"key":"37_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-36921-X_16","volume-title":"Handbook of Social Psychology. Handbooks of Sociology and Social Research","author":"DH Felmlee","year":"2006","unstructured":"Felmlee, D.H.: Interaction in social networks. In: Delamater, J. (ed.) Handbook of Social Psychology. Handbooks of Sociology and Social Research. Springer, Boston (2006). https:\/\/doi.org\/10.1007\/0-387-36921-X_16"},{"key":"37_CR3","unstructured":"Felmlee, D.H., Lungeanu, A., Kreager, D.: Online Dating Preferences: Two-Mode versus One-Mode ERGM Network Analysis. Presented at the meetings of the Population Association of America, Chicago, IL (2017)"},{"issue":"2","key":"37_CR4","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/10242690600863935","volume":"18","author":"C Berrebi","year":"2007","unstructured":"Berrebi, C., Lakdawalla, D.: How does terrorism risk vary across space and time? An analysis based on the Israeli experience. Def. Peace Econ. 18(2), 113\u2013131 (2007)","journal-title":"Def. Peace Econ."},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"McCauley, C.: Jujitsu politics: Terrorism and response to terrorism. In: Collateral Damage: The Psychological Consequences of America\u2019s War on Terrorism. Greenwood Publishing Group (2006)","DOI":"10.5040\/9798400628306.ch-003"},{"key":"37_CR6","first-page":"24","volume":"24","author":"M Crenshaw","year":"2007","unstructured":"Crenshaw, M.: The logic of terrorism. Terror. Perspect. 24, 24\u201333 (2007)","journal-title":"Terror. Perspect."},{"issue":"2","key":"37_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/09546559808427457","volume":"10","author":"CJ Drake","year":"1998","unstructured":"Drake, C.J.: The role of ideology in terrorists\u2019 target selection. Terror. Polit. Violence 10(2), 53\u201385 (1998)","journal-title":"Terror. Polit. Violence"},{"key":"37_CR8","unstructured":"National Consortium for the Study of Terrorism and Responses to Terrorism (START) Homepage. https:\/\/www.start.umd.edu\/gtd . Accessed 26 Apr 2018"},{"key":"37_CR9","unstructured":"South Asian Terrorism Portal. India: Terrorist, Insurgent, and Extremist Groups. http:\/\/www.satp.org\/satporgtp\/countries\/india\/terroristoutfits\/index.html . Accessed 26 Apr 2018"},{"key":"37_CR10","unstructured":"Basu, A.: Social network analysis of terrorist organizations in India. In: North American Association for Computational Social and Organizational Science (NAACSOS) Conference, pp. 26\u201328 (2005)"},{"issue":"1","key":"37_CR11","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1080\/09700160408450119","volume":"28","author":"S Saxena","year":"2004","unstructured":"Saxena, S., Santhanam, K., Basu, A.: Application of social network analysis (SNA) to terrorist networks in Jammu & Kashmir. Strateg. Anal. 28(1), 84\u2013101 (2004)","journal-title":"Strateg. Anal."},{"key":"37_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications, 1st edn. Cambridge University Press, Cambridge (1994)","edition":"1"},{"issue":"2","key":"37_CR13","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1093\/sf\/53.2.181","volume":"53","author":"RL Breiger","year":"1974","unstructured":"Breiger, R.L.: The duality of persons and groups. Soc. Forces 53(2), 181\u2013190 (1974)","journal-title":"Soc. Forces"},{"issue":"4","key":"37_CR14","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/0378-8733(82)90001-6","volume":"3","author":"JM McPherson","year":"1982","unstructured":"McPherson, J.M.: Hypernetwork sampling: Duality and differentiation among voluntary organizations. Soc. Netw. 3(4), 225\u2013249 (1982)","journal-title":"Soc. Netw."},{"key":"37_CR15","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1979","unstructured":"Freeman, L.C.: Centrality in social networks: Conceptual clarification. Soc. Netw. 1, 215\u2013239 (1979)","journal-title":"Soc. Netw."},{"key":"37_CR16","first-page":"1","volume":"2","author":"ME Newman","year":"2008","unstructured":"Newman, M.E.: The mathematics of networks. New Palgrave Encycl. Econ. 2, 1\u201312 (2008)","journal-title":"New Palgrave Encycl. Econ."},{"issue":"6","key":"37_CR17","first-page":"1","volume":"70","author":"A Clauset","year":"2004","unstructured":"Clauset, A., Newman, M.E.J., Moore, C.: Finding community structure in very large networks. Phys. Rev. 70(6), 1\u20136 (2004)","journal-title":"Phys. Rev."},{"key":"37_CR18","volume-title":"Networks and Netwars: The Future of Terror, Crime, and Militancy","author":"J Arquilla","year":"2001","unstructured":"Arquilla, J., Ronfeldt, D.: Networks and Netwars: The Future of Terror, Crime, and Militancy. Rand Corporation, Santa Monica (2001)"},{"key":"37_CR19","unstructured":"Gartner, S.S.: An Introduction to Net Assessment 2.0: Special Issue on the Net Assessment of Violent Non-State Actors. CTX: Conflict Terrorism Exchange (2015)"},{"issue":"3","key":"37_CR20","first-page":"43","volume":"24","author":"VE Krebs","year":"2002","unstructured":"Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43\u201352 (2002)","journal-title":"Connections"},{"issue":"4","key":"37_CR21","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1177\/000312240807300408","volume":"73","author":"SS Gartner","year":"2008","unstructured":"Gartner, S.S.: Ties to the dead: Connections to Iraq War and 9\/11 casualties and disapproval of the president. Am. Sociol. Rev. 73(4), 690\u2013695 (2008)","journal-title":"Am. Sociol. Rev."},{"key":"37_CR22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139136877","volume-title":"Disrupting Dark Networks","author":"SF Everton","year":"2012","unstructured":"Everton, S.F.: Disrupting Dark Networks. Cambridge University Press, Cambridge (2012)"}],"container-title":["Lecture Notes in Computer Science","Social, Cultural, and Behavioral Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93372-6_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T03:15:44Z","timestamp":1751685344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93372-6_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319933719","9783319933726"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93372-6_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}