Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Gómez, José M.
and
Perfectti, Francisco
2012.
Fitness consequences of centrality in mutualistic individual-based networks.
Proceedings of the Royal Society B: Biological Sciences,
Vol. 279,
Issue. 1734,
p.
1754.
Acosta, Benjamin
and
Childs, Steven J.
2013.
Illuminating the Global Suicide-Attack Network.
Studies in Conflict & Terrorism,
Vol. 36,
Issue. 1,
p.
49.
Lou, Jialin
Zhao, Jiaxin
and
Song, Yang
2013.
Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012.
Vol. 217,
Issue. ,
p.
593.
Langhorne, Anna L.
2013.
Design, User Experience, and Usability. User Experience in Novel Technological Environments.
Vol. 8014,
Issue. ,
p.
112.
Schrodt, Philip A.
Yonamine, James
and
Bagozzi, Benjamin E.
2013.
Handbook of Computational Approaches to Counterterrorism.
p.
129.
Breiger, Ronald L.
Schoon, Eric
Melamed, David
Asal, Victor
and
Rethemeyer, R. Karl
2014.
Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade.
Social Networks,
Vol. 36,
Issue. ,
p.
23.
Swedlow, Brendon
2014.
Advancing Policy Theory with Cultural Theory: An Introduction to the Special Issue.
Policy Studies Journal,
Vol. 42,
Issue. 4,
p.
465.
McDoom, Omar Shahabudin
2014.
Antisocial Capital.
Journal of Conflict Resolution,
Vol. 58,
Issue. 5,
p.
865.
Basu, Aparna
2014.
Social Networking.
Vol. 65,
Issue. ,
p.
215.
Walther, Olivier J
and
Leuprecht, Christian
2015.
Mapping and Deterring Violent Extremist Networks in North-West Africa.
SSRN Electronic Journal,
Kilger, Max
2015.
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios.
p.
693.
Perliger, Arie
Koehler-Derrick, Gabriel
and
Pedahzur, Ami
2016.
The Gap Between Participation and Violence: Why We Need to Disaggregate Terrorist ‘Profiles’.
International Studies Quarterly,
Vol. 60,
Issue. 2,
p.
220.
Pedahzur, Ami
and
Martin, Susanne
2016.
The Handbook of the Criminology of Terrorism.
p.
339.
del Val, E.
Martínez, C.
and
Botti, V.
2016.
Analyzing users’ activity in online social networks over time through a multi-agent framework.
Soft Computing,
Vol. 20,
Issue. 11,
p.
4331.
Zech, Steven T.
and
Gabbay, Michael
2016.
Social Network Analysis in the Study of Terrorism and Insurgency: From Organization to Politics.
International Studies Review,
Vol. 18,
Issue. 2,
p.
214.
Ban, Vin Shen
Lega, Bradley
and
Batjer, H. Hunt
2016.
Maximizing the Potential of Social Media and Social Networks in Neurosurgery.
World Neurosurgery,
Vol. 91,
Issue. ,
p.
609.
Ball, Leslie
2016.
Automating social network analysis: A power tool for counter-terrorism.
Security Journal,
Vol. 29,
Issue. 2,
p.
147.
Cenciarelli, Orlando
Mancinelli, Sandro
Ludovici, Gian Marco
and
Palombi, Leonardo
2017.
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges.
p.
277.
Cranmer, Skyler J.
Leifeld, Philip
McClurg, Scott D.
and
Rolfe, Meredith
2017.
Navigating the Range of Statistical Tools for Inferential Network Analysis.
American Journal of Political Science,
Vol. 61,
Issue. 1,
p.
237.
Chih-yu Shih
2017.
The Relational Turn East and West From Chinese Confucianism to Balance of Relationships.
Korean Political Science Review,
Vol. 51,
Issue. 6,
p.
107.