Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
8253966 | Chaos, Solitons & Fractals | 2018 | 8 Pages |
Abstract
This paper uses a three-phase process to first describe the development of a network to describe different types of relations between terrorists and their supporters. It continues to review some of the usual measures of social network analysis to evaluate different positions in the network. Finally, the work describes different methods to destabilize the terrorist network, and, based on sensitivity analyses, determines the potential of certain actions and the vulnerability of the network.
Related Topics
Physical Sciences and Engineering
Physics and Astronomy
Statistical and Nonlinear Physics
Authors
H.A. Eiselt,