{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:11:00Z","timestamp":1730207460792,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/cisda.2009.5356520","type":"proceedings-article","created":{"date-parts":[[2009,12,24]],"date-time":"2009-12-24T13:27:59Z","timestamp":1261661279000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Simulation analysis on destabilization of complex adaptive organizations"],"prefix":"10.1109","author":[{"given":"Il-Chul","family":"Moon","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Organizational Forms of Terrorism: Hierarchy, Network, or a Type sui generis?","author":"mayntz","year":"2004","journal-title":"Max-Planck-Institut fur Gesellschaftsforschung Koln MPIfG Discussion Paper 04\/4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/10576100490438237"},{"key":"ref12","first-page":"27","author":"rabasa","year":"2006","journal-title":"Beyond AlQaeda Part 1"},{"key":"ref13","article-title":"The Military Utility of Understanding Adversary Culture","author":"mc fate","year":"2005","journal-title":"Joint Forces Quart"},{"journal-title":"Modeling Civil Violence An Agent-Based Computational Approach","year":"2001","author":"epstein","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2.1.71"},{"key":"ref16","article-title":"Estimating the near-term changes of an organization with simulations","author":"moon","year":"2006","journal-title":"AAAI Fall Symposium"},{"key":"ref17","article-title":"Construct a multi-agent network model for the coevolution of agents and socio-cultural environments","author":"schreiber","year":"2004","journal-title":"Technical Report CMU-ISRI04&#x2013;109"},{"key":"ref18","first-page":"19","article-title":"Locating Optimal Destabilization Strategies","author":"moon","year":"2007","journal-title":"ICCRTS Newport RI"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/287831.287844"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(03)00428-4"},{"key":"ref3","first-page":"11","author":"cragrin","year":"2007","journal-title":"Sharing the Dragon's Teeth-Terrorist Groups and the Exchange of New Technologies"},{"journal-title":"(1999) The Ultimate Terrorists","year":"1999","author":"stern","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7081-0"},{"key":"ref8","article-title":"Modeling Terrorist Networks-Complex Systems and First Principles of Counter-Intelligence","author":"fellman","year":"2003","journal-title":"NATO Conference on Central Asia Enlargement Civil Military Relations and Security"},{"key":"ref7","first-page":"54","volume":"5","author":"marion","year":"2003","journal-title":"Complexity Theory and AlQaeda Examining Complex Leadership Emergence"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/0263276402019004051"},{"key":"ref9","first-page":"43","article-title":"Mapping Networks of Terrorist Cells","volume":"24","author":"krebs","year":"2002","journal-title":"Connections"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206791"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3703-5"},{"journal-title":"Destabilization of Adversarial Organizations with Strategic Interventions","year":"2008","author":"moon","key":"ref22"},{"key":"ref21","first-page":"12","article-title":"A Dynamic Network Approach to the Assessment of Terrorist Groups and The Impact of Alternative Courses of Action, In Visualising Network Information","author":"carley","year":"2006","journal-title":"Meeting Proceedings RTO-MP-IST-063"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/270732"},{"key":"ref23","first-page":"215","article-title":"Centrality in Social Networks: Conceptual Clarification","author":"freeman","year":"1979","journal-title":"Social networks 1 3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2004.1371393"},{"key":"ref25","first-page":"113","article-title":"A PCANS Model of Structure in Organization","author":"krackhardt","year":"1998","journal-title":"Proceedings of the 1998 International Symposium on Command and Control Research and Technology"}],"event":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2009,7,8]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2009,7,10]]}},"container-title":["2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5351161\/5356514\/05356520.pdf?arnumber=5356520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T15:28:06Z","timestamp":1489850886000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5356520\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cisda.2009.5356520","relation":{},"subject":[],"published":{"date-parts":[[2009,7]]}}}