{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:57:41Z","timestamp":1766066261297},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,3,15]],"date-time":"2013-03-15T00:00:00Z","timestamp":1363305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/2190-8532-2-8","type":"journal-article","created":{"date-parts":[[2013,3,15]],"date-time":"2013-03-15T22:13:59Z","timestamp":1363385639000},"source":"Crossref","is-referenced-by-count":17,"title":["Forecasting the locational dynamics of transnational terrorism: a network analytic approach"],"prefix":"10.1186","volume":"2","author":[{"given":"Bruce A","family":"Desmarais","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Skyler J","family":"Cranmer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,3,15]]},"reference":[{"key":"34_CR1","unstructured":"Mickolus EF, Sandler T, Murdock JM, Flemming PA: International Terrorism: Attributes of Terrorist Events (ITERATE), 1968\u20132007. Vinyard Software (Dunn Loring, 2008) (Dunn Loring, 2008)"},{"key":"34_CR2","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1145\/956863.956972","volume-title":"Proceedings of the Twelfth International Conference on Information and Knowledge Management","author":"D Liben-Nowell","year":"2003","unstructured":"Liben-Nowell D, Kleinberg J: The link prediction problem for social networks. Proceedings of the Twelfth International Conference on Information and Knowledge Management 2003, 556\u2013559."},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1214\/09-EJS548","volume":"4","author":"S Hanneke","year":"2010","unstructured":"Hanneke S, Fu W, Xing EP: Discrete Temporal Models of Social Networks. Electron. J. Stat 2010, 4: 585\u2013605. 10.1214\/09-EJS548","journal-title":"Electron. J. Stat"},{"issue":"2","key":"34_CR4","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1177\/0022002704272830","volume":"49","author":"Q Li","year":"2005","unstructured":"Li Q: Does democracy promote or reduce transnational terrorist incidents? J. Confl. Resolution 2005, 49(2):278\u2013297. 10.1177\/0022002704272830","journal-title":"J. Confl. Resolution"},{"issue":"4","key":"34_CR5","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1080\/07388940701643672","volume":"24","author":"MT Koch","year":"2007","unstructured":"Koch MT, Cranmer SJ: Testing the \u201cDick Cheney\u201d hypothesis: do governments of the left attract more terrorism than governments of the right? Confl. Manag. Peace Sci 2007, 24(4):311\u2013326. 10.1080\/07388940701643672","journal-title":"Confl. Manag. Peace Sci"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1177\/0022343310386269","volume":"48","author":"JK Young","year":"2011","unstructured":"Young JK, Dugan L: Veto players and terror. J. Peace Res 2011, 48: 19\u201333. 10.1177\/0022343310386269","journal-title":"J. Peace Res"},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1162\/isec.2006.31.1.49","volume":"31","author":"AH Kydd","year":"2006","unstructured":"Kydd AH, Walter BF: The strategies of terrorism. Int. Secur 2006, 31: 49\u201380. 10.1162\/isec.2006.31.1.49","journal-title":"Int. Secur"},{"issue":"2","key":"34_CR8","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1177\/0022002703262869","volume":"48","author":"Q Li","year":"2004","unstructured":"Li Q, Schaub D: Economic globalization and transnational terrorism. A pooled time-series analysis. J. Confl. Resolution 2004, 48(2):230\u2013258. 10.1177\/0022002703262869","journal-title":"J. Confl. Resolution"},{"issue":"4","key":"34_CR9","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1080\/10430719208404739","volume":"3","author":"W Enders","year":"1992","unstructured":"Enders W, Parise GF, Sandler T: A time-series analysis of transnational terrorism: trends and cycles. Defense Peace Econ 1992, 3(4):305\u2013320. 10.1080\/10430719208404739","journal-title":"Defense Peace Econ"},{"issue":"3","key":"34_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1177\/0022002700044003002","volume":"44","author":"W Enders","year":"2000","unstructured":"Enders W, Sandler T: Is transnational terrorism becoming more threatening? A time-series investigation. J. Confl. Resolution 2000, 44(3):307\u2013332. 10.1177\/0022002700044003002","journal-title":"J. Confl. Resolution"},{"issue":"2","key":"34_CR11","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1111\/1468-2478.00227","volume":"46","author":"W Enders","year":"2002","unstructured":"Enders W, Sandler T: Patterns of transnational terrorism, 1970\u20131999: alternative time-Series estimates. Int. Stud. Q 2002, 46(2):145\u2013165. 10.1111\/1468-2478.00227","journal-title":"Int. Stud. Q"},{"issue":"3","key":"34_CR12","doi-asserted-by":"publisher","first-page":"467","DOI":"10.2307\/20062054","volume":"71","author":"W Enders","year":"2005","unstructured":"Enders W, Sandler T: Transnational terrorism 1968\u20132000: thresholds, persistence, and forecasts. South Econ. J 2005, 71(3):467\u2013482. 10.2307\/20062054","journal-title":"South Econ. J"},{"issue":"2","key":"34_CR13","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1177\/0022002709355437","volume":"54","author":"PT Brandt","year":"2010","unstructured":"Brandt PT, Sandler T: What do transnational terrorists target? Has it changed? Are we safer? J. Confl. Resolution 2010, 54(2):214\u2013236. 10.1177\/0022002709355437","journal-title":"J. Confl. Resolution"},{"key":"34_CR14","volume-title":"Explaining Terrorism: Causes, Processes, and Consequences","author":"M Crenshaw","year":"2010","unstructured":"Crenshaw M: Explaining Terrorism: Causes, Processes, and Consequences. Routledge, London; 2010."},{"issue":"4","key":"34_CR15","doi-asserted-by":"publisher","first-page":"379","DOI":"10.2307\/421717","volume":"13","author":"M Crenshaw","year":"1981","unstructured":"Crenshaw M: The causes of terrorism. Comp. Polit 1981, 13(4):379\u2013399. 10.2307\/421717","journal-title":"Comp. Polit"},{"issue":"4","key":"34_CR16","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1257\/089533003772034925","volume":"17","author":"AB Krueger","year":"2003","unstructured":"Krueger AB, Male\u010dkov\u00e1: Education, poverty and terrorism: Is there a causal connection? J. Econ. Perspect 2003, 17(4):119\u2013144. 10.1257\/089533003772034925","journal-title":"J. Econ. Perspect"},{"issue":"3","key":"34_CR17","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/S0378-8733(99)00011-8","volume":"21","author":"BS Anderson","year":"1999","unstructured":"Anderson BS, Butts CT, Carley KM: The interaction of size and density with graph-level indices. Soc. Netw 1999, 21(3):239\u2013267. 10.1016\/S0378-8733(99)00011-8","journal-title":"Soc. Netw"},{"key":"34_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1111\/j.1467-839X.2007.00241.x","volume":"11","author":"CT Butts","year":"2008","unstructured":"Butts CT: Social networks: a methodological introduction. Asian J. Soc. Psychol 2008, 11: 13\u201341. 10.1111\/j.1467-839X.2007.00241.x","journal-title":"Asian J. Soc. Psychol"},{"issue":"1","key":"34_CR19","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1093\/pan\/mpq037","volume":"19","author":"SJ Cranmer","year":"2011","unstructured":"Cranmer SJ, Desmarais BA: Inferential network analysis with exponential random graph models. Pol. Anal 2011, 19(1):66\u201386. 10.1093\/pan\/mpq037","journal-title":"Pol. Anal"},{"issue":"3","key":"34_CR20","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1177\/0738894212443446","volume":"29","author":"SJ Cranmer","year":"2012","unstructured":"Cranmer SJ, Desmarais BA, Menninga EJ: Complex dependencies in the alliance network. Confl. Manage. Peace Sci 2012, 29(3):279\u2013313. 10.1177\/0738894212443446","journal-title":"Confl. Manage. Peace Sci"},{"issue":"3","key":"34_CR21","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1080\/03050629.2012.677741","volume":"38","author":"SJ Cranmer","year":"2012","unstructured":"Cranmer SJ, Desmarais BA, Kirkland JH: Toward a network theory of alliance formation. Int. Interact 2012, 38(3):295\u2013324. 10.1080\/03050629.2012.677741","journal-title":"Int. Interact"},{"issue":"2","key":"34_CR22","first-page":"215","volume":"50","author":"NA Bapat","year":"2006","unstructured":"Bapat NA: State bargaining with transnational terrorist groups. Int. Stud. Q 2006, 50(2):215\u2013232.","journal-title":"Int. Stud. Q"},{"issue":"3","key":"34_CR23","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/BF02294547","volume":"61","author":"S Wasserman","year":"1996","unstructured":"Wasserman S, Pattison P: Logit models for social networks: I. an introduction to Markov graphs andp. Psychometrika 1996, 61(3):401\u2013425. 10.1007\/BF02294547","journal-title":"Psychometrika"},{"issue":"6","key":"34_CR24","doi-asserted-by":"publisher","first-page":"66117","DOI":"10.1103\/PhysRevE.70.066117","volume":"70","author":"J Park","year":"2004","unstructured":"Park J, Newman M: Statistical mechanics of networks. Phys. Rev. E 2004, 70(6):66117\u201366130.","journal-title":"Phys. Rev. E"},{"key":"34_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/0022250X.2001.9990243","volume":"25","author":"G Robins","year":"2001","unstructured":"Robins G, Pattison P: Random graph models for temporal processes in social networks. J. Math. Sociol 2001, 25: 5\u201341. 10.1080\/0022250X.2001.9990243","journal-title":"J. Math. Sociol"},{"key":"34_CR26","first-page":"284","volume-title":"Computer and Information Sciences - ISCIS 2005, Volume 3733 of Lecture Notes in Computer Science","author":"P Pons","year":"2005","unstructured":"Pons P, Latapy M: Computing communities in large networks using random walks. Computer and Information Sciences - ISCIS 2005, Volume 3733 of Lecture Notes in Computer Science 2005, 284\u2013293."},{"issue":"1","key":"34_CR27","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jeconom.2011.02.017","volume":"164","author":"J Geweke","year":"2011","unstructured":"Geweke J, Amisano G: Optimal prediction pools. J. Econometrics 2011, 164(1):130\u2013141. 10.1016\/j.jeconom.2011.02.017","journal-title":"J. Econometrics"},{"key":"34_CR28","first-page":"3119","volume-title":"Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Volume 5","author":"ZC Qin","year":"2005","unstructured":"Qin ZC: ROC analysis for predictions made by probabilistic classifiers. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Volume 5 2005, 3119\u20133124."},{"key":"34_CR29","volume-title":"Bin Laden \u2018using Canada as base\u2019","author":"BBC News","year":"2000","unstructured":"BBC News: Bin Laden \u2018using Canada as base\u2019. 2000. http:\/\/news.bbc.co.uk\/2\/hi\/americas\/793178.stm"},{"key":"34_CR30","unstructured":"Gordon L: Briton Admits Blasts. (The Guardian 4 February, 2001). http:\/\/www.guardian.co.uk\/world\/2001\/feb\/05\/saudiarabia (The Guardian 4 February, 2001)."},{"key":"34_CR31","first-page":"71","volume-title":"Terrorism: Roots, Impact, Responses","author":"M Crenshaw","year":"1992","unstructured":"Crenshaw M: How Terrorists think: psychological contributions to understanding terrorism. In Terrorism: Roots, Impact, Responses Edited by: Howard L. 1992, 71\u201380."}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-2-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/2190-8532-2-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-2-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T15:51:45Z","timestamp":1644594705000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/2190-8532-2-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,15]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["34"],"URL":"https:\/\/doi.org\/10.1186\/2190-8532-2-8","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,15]]},"article-number":"8"}}