{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:12:42Z","timestamp":1763640762212,"version":"3.41.2"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2002,10,1]],"date-time":"2002-10-01T00:00:00Z","timestamp":1033430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2002,10,1]],"date-time":"2002-10-01T00:00:00Z","timestamp":1033430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computational &amp;amp; Mathematical Organization Theory"],"published-print":{"date-parts":[[2002,10]]},"DOI":"10.1023\/a:1020723730930","type":"journal-article","created":{"date-parts":[[2003,3,18]],"date-time":"2003-03-18T15:53:36Z","timestamp":1048002816000},"page":"235-241","source":"Crossref","is-referenced-by-count":27,"title":["NETEST: Estimating a Terrorist Network's Structure\u2014Graduate Student Best Paper Award, CASOS 2002 Conference"],"prefix":"10.1007","volume":"8","author":[{"given":"Matthew J.","family":"Dombroski","sequence":"first","affiliation":[]},{"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5103308_CR1","doi-asserted-by":"crossref","unstructured":"Butts, C. (2002), \u201cNetwork Inference, Error, and Informant (In)Accuracy:ABayesian Approach,\u201d Social Networks, in press.","DOI":"10.1016\/S0378-8733(02)00038-2"},{"key":"5103308_CR2","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/0378-8733(87)90009-8","volume":"9","author":"D. Krackhardt","year":"1987","unstructured":"Krackhardt, D. (1987), \u201cCognitive Social Structures,\u201d Social Networks, 9, 104\u2013134.","journal-title":"Social Networks"},{"issue":"3","key":"5103308_CR3","first-page":"43","volume":"24","author":"V. Krebs","year":"2002","unstructured":"Krebs, V. (2002), \u201cMapping Networks of Terrorist Cells,\u201d Connections, 24(3), 43\u201352.","journal-title":"Connections"},{"key":"5103308_CR4","doi-asserted-by":"crossref","unstructured":"Ronfeldt, D. and J. Arquilla (September 21, 2001), \u201cNetworks, Netwars, and the Fight for the Future,\u201d First Monday, Issue 6, No. 10. Available online at http:\/\/firstmonday.org\/issues\/issue6 10\/ronfeldt\/index.htm","DOI":"10.5210\/fm.v6i10.889"},{"key":"5103308_CR5","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/0378-8733(90)90006-U","volume":"12","author":"J. Skvoretz","year":"1990","unstructured":"Skvoretz, J. (1990), \u201cBiased Net Theory: Approximations, Simulations, and Observations,\u201d Social Networks, 12, 217\u2013238.","journal-title":"Social Networks"},{"key":"5103308_CR6","unstructured":"Smith, D., M. Corbin and C. Hellman (2001), \u201cReforging the Sword: Forces for a 21st Century Security Strategy,\u201d Center for Defense Information. Available online at http:\/\/www.cdi.org\/mrp\/reforging-full.pdf"},{"key":"5103308_CR7","volume-title":"Force XXI Operations","author":"TRADOC Pam 525-5.","year":"1994","unstructured":"TRADOC Pam 525-5. (August 1, 1994), \u201cForce XXI Operations,\u201d Department of the Army, Headquarters, United States Army, Training and Doctrine Command, Fort Monroe, VA."}],"container-title":["Computational &amp; Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1020723730930.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1020723730930\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1020723730930.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,13]],"date-time":"2025-07-13T03:19:21Z","timestamp":1752376761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1020723730930"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,10]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,10]]}},"alternative-id":["5103308"],"URL":"https:\/\/doi.org\/10.1023\/a:1020723730930","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"type":"print","value":"1381-298X"},{"type":"electronic","value":"1572-9346"}],"subject":[],"published":{"date-parts":[[2002,10]]}}}