{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:19:49Z","timestamp":1740028789047,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"abstract":"<jats:p>This chapter focuses on the study and development of recently introduced new measures, theories, mathematical models and algorithms to support the detection of core members in terrorist networks. Specific techniques and tools are described to demonstrate their applicability to the area.<\/jats:p>","DOI":"10.3233\/978-1-58603-898-4-345","type":"book-chapter","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:11:46Z","timestamp":1739992306000},"source":"Crossref","is-referenced-by-count":0,"title":["Detecting Core Members in Terrorist Networks: A Case Study"],"prefix":"10.3233","author":[{"family":"Memon Nasrullah","sequence":"additional","affiliation":[]},{"family":"Hicks David L.","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["NATO Science for Peace and Security Series - D: Information and Communication Security","Mining Massive Data Sets for Security"],"original-title":[],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:15:58Z","timestamp":1739992558000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISSNISBN&issn=1874-6268&volume=19&spage=345"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-58603-898-4-345","relation":{},"ISSN":["1874-6268"],"issn-type":[{"value":"1874-6268","type":"print"}],"subject":[],"published":{"date-parts":[[2008]]}}}