Showing 1 - 10 of 2,776
The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist...
Persistent link: https://www.econbiz.de/10011091910
All over the world intelligence services are collecting data concerning possible terrorist threats. This information is usually transformed into network structures in which the nodes represent the individuals in the data set and the links possible connections between these individuals....
Persistent link: https://www.econbiz.de/10011144438
This article investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social...
Persistent link: https://www.econbiz.de/10011090311
Subject classifications: Terrorism; Counterinsurgency; Intelligence; Defense; Covert networks; Affiliation networks.
Persistent link: https://www.econbiz.de/10011091248
Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper...
Persistent link: https://www.econbiz.de/10011091539
In order to be able to devise successful strategies for destabilizing terrorist organizations it is vital to recognize and understand their structural properties. This paper deals with the opti- mal communication structure of terrorist organizations when considering the tradeoff between secrecy...
Persistent link: https://www.econbiz.de/10011092758
The identification of key players in a terrorist organization aids in preventing attacks, the efficient allocation of surveillance measures, and the destabilization of the corresponding network. In this paper, we introduce a game theoretic approach to identify key players in terrorist networks....
Persistent link: https://www.econbiz.de/10010664716
Persistent link: https://www.econbiz.de/10010104966
In the area of computer simulation, Latin hypercube designs play an important role. In this paper the classes of maximin and Audze-Eglais Latin hypercube designs are considered. Up to now only several two-dimensional designs and a few higher dimensional designs for these classes have been...
Persistent link: https://www.econbiz.de/10011090728
The problem of finding a maximin Latin hypercube design in two dimensions can be described as positioning n non-attacking rooks on an n x n chessboard such that the minimal distance between pairs of rooks is maximized.Maximin Latin hypercube designs are important for the approximation and...
Persistent link: https://www.econbiz.de/10011090862