{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:22:32Z","timestamp":1741324952131,"version":"3.38.0"},"publisher-location":"Vienna","reference-count":17,"publisher":"Springer Vienna","isbn-type":[{"type":"print","value":"9783709103876"},{"type":"electronic","value":"9783709103883"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-7091-0388-3_8","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T22:29:55Z","timestamp":1309213795000},"page":"143-158","source":"Crossref","is-referenced-by-count":6,"title":["Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks"],"prefix":"10.1007","author":[{"given":"Alan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Karampelas","sequence":"additional","affiliation":[]},{"given":"Reda","family":"Alhajj","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Rokne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,26]]},"reference":[{"issue":"6","key":"8_CR1","doi-asserted-by":"publisher","first-page":"837","DOI":"10.2307\/2095954","volume":"58","author":"W Baker","year":"1993","unstructured":"Baker, W., Faulkner, R.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. Am. Sociol. Rev. 58(6), 837\u2013860 (1993)","journal-title":"Am. Sociol. Rev."},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-540-25952-7_28","volume-title":"Intelligence and Security Informatics. Lecture Notes in Computer Science","author":"J Baumes","year":"2004","unstructured":"Baumes, J., Goldberg, M., Magdon-Ismail, M., Al Wallace, W.: Discovering hidden groups in communication networks. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol. 3073, pp. 378\u2013389. Springer, Berlin\/Heidelberg (2004)"},{"issue":"6","key":"8_CR3","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1080\/10576100390242857","volume":"26","author":"D Farely","year":"2003","unstructured":"Farely, D.: Breaking al qaeda cells: A mathematical analysis of counterterrorism operations. Stud. Confl. Terrorism 26(6), 399\u2013411 (2003)","journal-title":"Stud. Confl. Terrorism"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Dawoud, K., Alhajj, R., Rokne, J.: A global measure for estimating the degree of organization of terrorist networks. In: International Conference on Advances in Social Networks Analysis and Mining, pp. 421\u2013427. 9\u201311 Aug 2010","DOI":"10.1109\/ASONAM.2010.84"},{"key":"8_CR5","first-page":"43","volume":"24","author":"V Krebs","year":"2002","unstructured":"Krebs, V.: Mapping networks of terrorist cells. Connections 24, 43\u201352 (2002)","journal-title":"Mapping networks of terrorist cells. Connections"},{"issue":"1","key":"8_CR6","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0960-0779(03)00429-6","volume":"20","author":"V Latora","year":"2004","unstructured":"Latora, V., Marchiori, M.: How the science of complex networks can help developing strategies against terrorism. Chaos Solitons Fractals 20(1), 69\u201375 (2004)","journal-title":"Chaos Solitons Fractals"},{"issue":"7","key":"8_CR7","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1002\/asi.20591","volume":"58","author":"D Liben-Nowell","year":"2007","unstructured":"Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. J. Am. Soc. Inform. Sci. Technol. 58(7), 1019\u20131031 (2007)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Shaikh, M., Wang, J.: Discovering hierarchical structure in terrorist networks. In: Proceedings of the International Conference on Emerging Technologies, pp. 238\u2013244. (2006)","DOI":"10.1109\/ICET.2006.335966"},{"key":"8_CR9","unstructured":"Magdon-Ismail, M., Goldberg, M., Wallace, W., Siebecker, D.: Locating hidden groups in communication networks using hidden markov models. In: Chen, H., Miranda, R., Zeng, D., Demchak, C., Schroeder, J., Madhusudan, T. (eds.) Intelligence and Security Informatics. Lecture Notes in Computer Science, vol.2665, pp.958. Springer, Berlin\/Heidelberg (2010)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Memon, N., Wiil, U., Qureshi, A.: Design and development of an early warning system to prevent terrorist attacks. In: Proceedings of the International Conference on Artificial Intelligence and Neural Networks, pp. 222\u2013226. (2009)","DOI":"10.1109\/ICCSIT.2009.5234424"},{"issue":"3","key":"8_CR11","first-page":"53","volume":"24","author":"P Klerks","year":"2001","unstructured":"Klerks, P.: The network paradigm applied to criminal organizations. Connections 24(3), 53\u201365 (2001)","journal-title":"Connections"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Qin, J., Xu, J., Hu, D., Sageman, M., Chen, H.: Analyzing terrorist networks: A case study of the global salafi jihad network. pp. 287\u2013304 (2005)","DOI":"10.1007\/11427995_24"},{"issue":"10","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1057\/jors.2008.110","volume":"60","author":"CJ Rhodes","year":"2009","unstructured":"Rhodes, C.J., Jones, P.: Inferring missing links in partially observed social networks. J. Oper. Res. Soc. 60(10), 1373\u20131383 (2009)","journal-title":"J. Oper. Res. Soc."},{"issue":"410","key":"8_CR14","first-page":"268","volume":"6825","author":"S Strogatz","year":"2002","unstructured":"Strogatz, S.: Exploring complex networks. Nature 6825(410), 268\u2013276 (2002)","journal-title":"Nature"},{"issue":"3","key":"8_CR15","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","volume":"13","author":"M Sparrow","year":"1991","unstructured":"Sparrow, M.: The application of network analysis to criminal intelligence: An assessment of the prospects. Soc. Networks 13(3), 251\u2013274 (1991)","journal-title":"Soc. Networks"},{"key":"8_CR16","unstructured":"Tsvetovat, M., Carley, K.: Structural knowledge and success of anti-terrorist activity: The downside of structural equivalence. J. Soc. Struct. 6(2) (2005)"},{"issue":"2","key":"8_CR17","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/1059981.1059984","volume":"23","author":"J Xu","year":"2005","unstructured":"Xu, J., Chen, H.: Crimenet explorer: A framework for criminal network knowledge discovery. CM Trans. Inform. Syst. 23(2), 201\u2013226 (2005)","journal-title":"CM Trans. Inform. Syst."}],"container-title":["Lecture Notes in Social Networks","Counterterrorism and Open Source Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-7091-0388-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:18:11Z","timestamp":1741288691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-7091-0388-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783709103876","9783709103883"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-7091-0388-3_8","relation":{},"ISSN":["2190-5428","2190-5436"],"issn-type":[{"type":"print","value":"2190-5428"},{"type":"electronic","value":"2190-5436"}],"subject":[],"published":{"date-parts":[[2011]]}}}