{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:29Z","timestamp":1750306709049,"version":"3.41.0"},"reference-count":21,"publisher":"Association for Computing Machinery (ACM)","issue":"8","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF0910206"],"award-info":[{"award-number":["W911NF0910206"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2014,8]]},"abstract":"<jats:p>To destabilize terrorist organizations, the &lt;code&gt;STONE&lt;\/code&gt; algorithms identify a set of operatives whose removal would maximally reduce lethality.<\/jats:p>","DOI":"10.1145\/2632661.2632664","type":"journal-article","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T15:46:18Z","timestamp":1406216778000},"page":"60-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Reshaping terrorist networks"],"prefix":"10.1145","volume":"57","author":[{"given":"Francesca","family":"Spezzano","sequence":"first","affiliation":[{"name":"University of Maryland Institute for Advanced Computer Studies, College Park, MD"}]},{"given":"V. S.","family":"Subrahmanian","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD"}]},{"given":"Aaron","family":"Mannes","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD"}]}],"member":"320","published-online":{"date-parts":[[2014,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7083-y"},{"key":"e_1_2_1_3_1","first-page":"3","article-title":"Destabilizing networks","volume":"24","author":"Carley K.M.","year":"2002","unstructured":"Carley , K.M. , Lee , J.-S. , and Krackhardt , D . Destabilizing networks . Connections 24 , 3 ( 2002 ), 79--92. Carley, K.M., Lee, J.-S., and Krackhardt, D. Destabilizing networks. Connections 24, 3 (2002), 79--92.","journal-title":"Connections"},{"key":"e_1_2_1_4_1","volume-title":"How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns","author":"Cronin A.K.","year":"2010","unstructured":"Cronin , A.K. How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns . Princeton University Press , Princeton, NJ , 2010 . Cronin, A.K. How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns. Princeton University Press, Princeton, NJ, 2010."},{"key":"e_1_2_1_5_1","volume-title":"Bin Laden's Legacy: Why We're Still Losing the War on Terror","author":"Gartenstein-Ross D.","year":"2011","unstructured":"Gartenstein-Ross , D. Bin Laden's Legacy: Why We're Still Losing the War on Terror . John Wiley & Sons, Inc. , New York , 2011 . Gartenstein-Ross, D. Bin Laden's Legacy: Why We're Still Losing the War on Terror. John Wiley & Sons, Inc., New York, 2011."},{"key":"e_1_2_1_6_1","volume-title":"Caliphate's Soldiers: The Lashkar-e-Tayyeba's Long War. Amaryllis and the Observer Researcher Foundation","author":"John W.","year":"2011","unstructured":"John , W. Caliphate's Soldiers: The Lashkar-e-Tayyeba's Long War. Amaryllis and the Observer Researcher Foundation , New Delhi , India , 2011 . John, W. Caliphate's Soldiers: The Lashkar-e-Tayyeba's Long War. Amaryllis and the Observer Researcher Foundation, New Delhi, India, 2011."},{"key":"e_1_2_1_7_1","first-page":"3","article-title":"Mapping networks of terrorist cells","volume":"24","author":"Krebs V.E","year":"2002","unstructured":"Krebs , V.E . Mapping networks of terrorist cells . Connections 24 , 3 ( 2002 ), 43--52. Krebs, V.E. Mapping networks of terrorist cells. Connections 24, 3 (2002), 43--52.","journal-title":"Connections"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800020109"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(03)00429-6"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2008.12.003"},{"key":"e_1_2_1_11_1","volume-title":"Is counterterrorism good value for money? NATO Review Magazine (Apr","author":"Lomborg B.","year":"2008","unstructured":"Lomborg , B. Is counterterrorism good value for money? NATO Review Magazine (Apr . 2008 ). Lomborg, B. Is counterterrorism good value for money? NATO Review Magazine (Apr. 2008)."},{"key":"e_1_2_1_12_1","volume-title":"Profiles in Terror: A Guide to Middle East Terror Organizations","author":"Mannes A.","year":"2004","unstructured":"Mannes , A. Profiles in Terror: A Guide to Middle East Terror Organizations . Rowman and Littlefield Publishers , Lanham, MD , 2004 . Mannes, A. Profiles in Terror: A Guide to Middle East Terror Organizations. Rowman and Littlefield Publishers, Lanham, MD, 2004."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.65"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_34"},{"key":"e_1_2_1_15_1","volume-title":"A Second Course in Statistics: Regression Analysis. Pearson","author":"Mendenhall W.","year":"2011","unstructured":"Mendenhall , W. and Sincich , T . A Second Course in Statistics: Regression Analysis. Pearson , Upper Saddle River, NJ , 2011 . Mendenhall, W. and Sincich, T. A Second Course in Statistics: Regression Analysis. Pearson, Upper Saddle River, NJ, 2011."},{"key":"e_1_2_1_16_1","volume-title":"An algorithm for ranking all the assignments in order of increasing cost. Operations Research 16, 3 (May--June","author":"Murty K.G.","year":"1968","unstructured":"Murty , K.G. An algorithm for ranking all the assignments in order of increasing cost. Operations Research 16, 3 (May--June 1968 ), 682--687. Murty, K.G. An algorithm for ranking all the assignments in order of increasing cost. Operations Research 16, 3 (May--June 1968), 682--687."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1378245.1378270"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/983494"},{"key":"e_1_2_1_19_1","volume-title":"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba","author":"Subrahmanian V.","year":"2012","unstructured":"Subrahmanian , V. , Mannes , A. , Sliva , A. , Shakarian , J. , and Dickerson , J . Computational Analysis of Terrorist Groups: Lashkar-e-Taiba . SpringerLink: B\u00fccher . Springer London, Ltd ., 2012 . Subrahmanian, V., Mannes, A., Sliva, A., Shakarian, J., and Dickerson, J. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba. SpringerLink: B\u00fccher. Springer London, Ltd., 2012."},{"key":"e_1_2_1_20_1","volume-title":"Storming the World Stage: The Story of Lashkar-e-Taiba","author":"Tankel S.","year":"2011","unstructured":"Tankel , S. Storming the World Stage: The Story of Lashkar-e-Taiba . C. Hurst & Co. (Publishers) Ltd ., London, U.K., 2011 . Tankel, S. Storming the World Stage: The Story of Lashkar-e-Taiba. C. Hurst & Co. (Publishers) Ltd., London, U.K., 2011."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/30918"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632661.2632664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2632661.2632664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:15Z","timestamp":1750231155000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632661.2632664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["10.1145\/2632661.2632664"],"URL":"https:\/\/doi.org\/10.1145\/2632661.2632664","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2014,8]]},"assertion":[{"value":"2014-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}