{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:02:46Z","timestamp":1743026566736,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":27,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400763586"},{"type":"electronic","value":"9789400763593"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-6359-3_14","type":"book-chapter","created":{"date-parts":[[2013,5,31]],"date-time":"2013-05-31T17:58:17Z","timestamp":1370023097000},"page":"267-283","source":"Crossref","is-referenced-by-count":3,"title":["Estimating the Importance of Terrorists in a Terror Network"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Elhajj","sequence":"first","affiliation":[]},{"given":"Abdallah","family":"Elsheikh","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Addam","sequence":"additional","affiliation":[]},{"given":"Mohamad","family":"Alzohbi","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Zarour","sequence":"additional","affiliation":[]},{"given":"Alper","family":"Aksa\u00e7","sequence":"additional","affiliation":[]},{"given":"Orkun","family":"\u00d6zt\u00fcrk","sequence":"additional","affiliation":[]},{"given":"Tansel","family":"\u00d6zyer","sequence":"additional","affiliation":[]},{"given":"Mick","family":"Ridley","sequence":"additional","affiliation":[]},{"given":"Reda","family":"Alhajj","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","volume-title":"ACM SIGMOD international conference on management of data","author":"R Agarwal","year":"1993","unstructured":"Agarwal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. In: ACM SIGMOD international conference on management of data"},{"key":"14_CR2","volume-title":"The summary of the NRC workshop on social network modeling and analysis","author":"KM Carley","year":"2003","unstructured":"Carley KM (2003) Dynamic network analysis. In: Breiger R, Carely KM (eds) The summary of the NRC workshop on social network modeling and analysis. National research council"},{"key":"14_CR3","volume-title":"NAACSOS conference proceedings","author":"KM Carley","year":"2003","unstructured":"Carley KM, Reminga J, Kamneva N (2003) Destabilizing terrorist networks. In: NAACSOS conference proceedings, Pittsburgh, PA"},{"key":"14_CR4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811395","volume-title":"Models and methods in social network analysis","author":"PJ Carrington","year":"2005","unstructured":"Carrington PJ, Scott J, Wasserman S (2005) Models and methods in social network analysis. Cambridge University Press, Cambridge"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1080\/10576100390242857","volume":"26","author":"DJ Farely","year":"2003","unstructured":"Farely DJ (2003) Breaking Al Qaeda cells: a mathematical analysis of counterterrorism operations. Stud Confl Terror 26:399\u2013411","journal-title":"Stud Confl Terror"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1977","unstructured":"Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40:35\u201341","journal-title":"Sociometry"},{"issue":"4","key":"14_CR7","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/BF00184720","volume":"14","author":"LC Freeman","year":"1980","unstructured":"Freeman LC (1980) The gatekeeper, pair-dependency and structural centrality. Qual Quant 14(4):585\u2013592","journal-title":"Qual Quant"},{"key":"14_CR8","volume-title":"Research methods in social network analysis","author":"LC Freeman","year":"1992","unstructured":"Freeman LC, White DR, Romney AK (1992) Research methods in social network analysis. Transaction Publishers, New Brunswick"},{"key":"14_CR9","volume-title":"ACM SIGMOD international conference on management of data","author":"J Han","year":"2000","unstructured":"Han J, Pei J, Yin Y (2000) Mining Frequent patterns without candidate generation. In: ACM SIGMOD international conference on management of data"},{"issue":"4","key":"14_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1023\/A:1006504901164","volume":"12","author":"F Herrera","year":"1998","unstructured":"Herrera F, Lozano M, Verdegay JL (1998) Tackling real-coded genetic algorithms: operators and tools for behavioural analysis. Artif Intell Rev 12(4):265\u2013319","journal-title":"Artif Intell Rev"},{"key":"14_CR11","first-page":"287","volume-title":"Proceedings of IEEE international conference on intelligence and security informatics","author":"Q Jialun","year":"2005","unstructured":"Jialun Q, Xu JJ, Daning H, Sageman M, Chen H (2005) Analyzing terrorist networks: a case study of the global Salafi Jihad network. In: Proceedings of IEEE international conference on intelligence and security informatics, Atlanta GA, pp 287\u2013304"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10844-007-0044-1","volume":"31","author":"M Kaya","year":"2008","unstructured":"Kaya M, Alhajj R (2008) Multi-objective genetic algorithms based automated clustering for fuzzy association rules mining. J Intell Inf Syst 31(3):243\u2013264","journal-title":"J Intell Inf Syst"},{"key":"14_CR13","first-page":"668","volume-title":"Proceedings of the ninth annual ACM-SIAM symposium on discrete algorithms","author":"JM Kleinberg","year":"1998","unstructured":"Kleinberg JM (1998) Authoritative sources in a hyperlinked environment. In: Proceedings of the ninth annual ACM-SIAM symposium on discrete algorithms, pp 668\u2013677"},{"key":"14_CR14","unstructured":"Klerks P (2001) The network paradigm applied to criminal organizations. Connections 24(3)"},{"key":"14_CR15","doi-asserted-by":"crossref","DOI":"10.4135\/9781412985864","volume-title":"Social network analysis, series: quantitative applications in social sciences","author":"D Knoke","year":"2008","unstructured":"Knoke D, Yang S (2008) Social network analysis, series: quantitative applications in social sciences. Sage, Thousand Oaks"},{"issue":"3","key":"14_CR16","first-page":"43","volume":"24","author":"V Krebs","year":"2002","unstructured":"Krebs V (2002) Mapping networks of terrorist cells. Connections 24(3):43\u201352","journal-title":"Connections"},{"key":"14_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-02830-8","volume-title":"Genetic algorithms + data structures = evolution programs","author":"Z Michalewicz","year":"1992","unstructured":"Michalewicz Z (1992) Genetic algorithms + data structures = evolution programs. Springer, Berlin"},{"key":"14_CR18","first-page":"488","volume-title":"Proc. of IEEE international conference on intelligent systems","author":"T \u00d6zyer","year":"2006","unstructured":"\u00d6zyer T, Alhajj R (2006) Achieving natural clustering by validating results of iterative evolutionary clustering approach. In: Proc. of IEEE international conference on intelligent systems, pp 488\u2013493"},{"key":"14_CR19","series-title":"LNCS","volume-title":"Proc. of IDEAL","author":"P Peng","year":"2011","unstructured":"Peng P Nagi M et al. (2011) From alternative clustering to robust clustering and its application to gene expression data. In: Proc. of IDEAL, LNCS. Springer, Norwich"},{"issue":"4","key":"14_CR20","first-page":"287","volume":"20","author":"R Puzis","year":"2007","unstructured":"Puzis R, Elovici Y, Dolev S (2007) Finding the most prominent group in complex networks. AI Commun 20(4):287\u2013296. 2007","journal-title":"AI Commun"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Scott J (1998) Trend report: social network analysis. Sociology 109\u2013127","DOI":"10.1177\/0038038588022001007"},{"key":"14_CR22","first-page":"238","volume-title":"Proceedings of the international conference on emerging technologies","author":"MA Shaikh","year":"2006","unstructured":"Shaikh MA, Wang J (2006) Discovering hierarchical structure in terrorist networks. In: Proceedings of the international conference on emerging technologies, pp 238\u2013244"},{"issue":"3","key":"14_CR23","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","volume":"13","author":"MK Sparrow","year":"1991","unstructured":"Sparrow MK (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Soc Netw 13(3):251\u2013274","journal-title":"Soc Netw"},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1038\/35065725","volume":"410","author":"SH Strogatz","year":"2002","unstructured":"Strogatz SH (2002) Exploring complex networks. Nature 410:268\u2013276","journal-title":"Nature"},{"key":"14_CR25","unstructured":"Tsvetovat M, Carley KM (2005) Structural knowledge and success of anti-terrorist activity: the downside of structural equivalence. J Soc Struct 6(2)"},{"key":"14_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge"},{"issue":"2","key":"14_CR27","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/1059981.1059984","volume":"23","author":"J Xu","year":"2005","unstructured":"Xu J, Chen H (2005) CrimeNet explorer: a framework for criminal network knowledge discovery. ACM Trans Inf Syst 23(2):201\u2013226","journal-title":"ACM Trans Inf Syst"}],"container-title":["Lecture Notes in Social Networks","Mining Social Networks and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-6359-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T21:10:36Z","timestamp":1675113036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-6359-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9789400763586","9789400763593"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-6359-3_14","relation":{},"ISSN":["2190-5428","2190-5436"],"issn-type":[{"type":"print","value":"2190-5428"},{"type":"electronic","value":"2190-5436"}],"subject":[],"published":{"date-parts":[[2013]]}}}