{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:37:32Z","timestamp":1725669452657},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642290466"},{"type":"electronic","value":"9783642290473"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29047-3_29","type":"book-chapter","created":{"date-parts":[[2012,3,20]],"date-time":"2012-03-20T03:05:59Z","timestamp":1332212759000},"page":"239-247","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic, Covert Network Simulation"],"prefix":"10.1007","author":[{"given":"Patrick","family":"O\u2019Neil","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Erdos, P., Renyi, A.: On the Evolution of Random Graphs. Publication of Mathematics Institute of Hungian Academy of Sciences\u00a05(1761) (1960)"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Tsvetovat, M., Carley, K.M.: Generation of Realistic Social Network Datasets for Testing of Analysis and Simulation Tools. CMU-ISRI-05-130 (2005)","DOI":"10.2139\/ssrn.2729296"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Albert, R., Barabasi, A.-L.: Statistical Mechanics of Complex Networks. Reviews of Modern Physics\u00a074 (2002)","DOI":"10.1103\/RevModPhys.74.47"},{"key":"29_CR4","unstructured":"Atran, S.: John Jay & ARTIS Transnational Terrorism Database. Technical report, John Jay College of Criminal Justice (2009)"},{"issue":"2","key":"29_CR5","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1177\/0022002709355439","volume":"54","author":"W. Enders","year":"2009","unstructured":"Enders, W., Jindapon, P.: Network Externalities and Terrorist Network Structure. Journal of Conflict Resolution\u00a054(2), 262\u2013280 (2009)","journal-title":"Journal of Conflict Resolution"},{"issue":"3","key":"29_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1162\/01636600260046262","volume":"25","author":"R. Takeyh","year":"2002","unstructured":"Takeyh, R., Gvosdev, N.: Do Terrorist Networks Need a Home. The Washington Quarterly\u00a025(3), 97\u2013108 (2002)","journal-title":"The Washington Quarterly"},{"key":"29_CR7","unstructured":"Henke, M.G.A.: How Terrorist Groups Survive: A Dynamic Network Analysis Approach to the Resilience of Terrorist Organizations. School of Advanced Military Studies Monographs (2009)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Borm, P., Lindelauf, R., Hamers, H.: The Influence of Secrecy on the Communication Structure of Covert Networks. CentER Discussion Paper No. 2008-23 (2008)","DOI":"10.2139\/ssrn.1096057"},{"issue":"1","key":"29_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1177\/0022002706296155","volume":"51","author":"W. Enders","year":"2006","unstructured":"Enders, W., Su, X.: Rational Terrorists and Optimal Network Structure. Journal of Conflict Resolution\u00a051(1), 33\u201357 (2006)","journal-title":"Journal of Conflict Resolution"},{"key":"29_CR10","unstructured":"Hussain, S.E.: Impact of Terrorist Arrest on Terrorism: Defiance, Deterrence, or Irrelevance. PhD thesis, University of Pennsylvania (2010)"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1177\/0022427893030004006","volume":"30","author":"L.W. Sherman","year":"1993","unstructured":"Sherman, L.W.: Defiance, Deterrence, and Irrelevance: A Theory of the Criminal Sanction. Journal of Research in Crime and Delinquency\u00a030, 445\u2013473 (1993)","journal-title":"Journal of Research in Crime and Delinquency"},{"key":"29_CR12","unstructured":"Don, B.W., et al.: Network Technologies for Networked Terrorists. Technical report, RAND Corperation (2007)"},{"key":"29_CR13","unstructured":"Fighel, J.: Al Qaeda - Mombassa Attacks November 28, 2002. Technical report, The Meir Amit Intelligence and Terrorism Information Center (2011)"}],"container-title":["Lecture Notes in Computer Science","Social Computing, Behavioral - Cultural Modeling and Prediction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29047-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:52:33Z","timestamp":1558313553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29047-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290466","9783642290473"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29047-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}