{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T16:09:00Z","timestamp":1744301340018,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/isi.2017.8004871","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T20:42:42Z","timestamp":1502397762000},"page":"37-42","source":"Crossref","is-referenced-by-count":1,"title":["Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations"],"prefix":"10.1109","author":[{"given":"Ze","family":"Li","sequence":"first","affiliation":[]},{"given":"Duoyong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2005.00032.x"},{"journal-title":"The Political Economy of Terrorism","year":"2006","key":"ref11"},{"journal-title":"Terrorism and Game Theory","year":"0","author":"sandler","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015241914483"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/14759390802383801"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1126\/science.1065547"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.07.003"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s10796-013-9453-6","article-title":"BFF: A tool for eliciting tie strength and user communities in social networking services","volume":"16","author":"fogu","year":"2014","journal-title":"Information Systems Frontiers"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518735"},{"key":"ref19","first-page":"152","article-title":"DESIGN PRINGIPLES FOR ONLINE COMMUNITIES","author":"kollock","year":"1997","journal-title":"PC Update"},{"key":"ref4","first-page":"401","volume":"12","author":"terveen","year":"2005","journal-title":"Social matching A framework and research agenda"},{"key":"ref3","first-page":"15056","article-title":"The logic of terrorism: Terrorist behavior as a product of strategic choice","volume":"98","author":"crenshaw","year":"1998","journal-title":"Proc Nat Acad Sci United States America"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0910921107"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/17467586.2013.838690"},{"journal-title":"The Strength of Weak Ties","year":"1973","author":"granovetter","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-011-9133-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2011.561469"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8350090"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206791"},{"journal-title":"John Jay & ARTIS Transnational Terrorism Database","year":"2009","author":"artis","key":"ref20"},{"journal-title":"Other Selves Philosophers on Friendship","year":"1991","author":"pakaluk","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2006.358163"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.21236\/ADA460034"},{"journal-title":"Geospatial Analysis of Dynamic Terrorist Networks","year":"2009","author":"medina","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888905000494"}],"event":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2017,7,22]]},"location":"Beijing, China","end":{"date-parts":[[2017,7,24]]}},"container-title":["2017 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999198\/8004858\/08004871.pdf?arnumber=8004871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T07:37:37Z","timestamp":1570001857000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8004871\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isi.2017.8004871","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}