Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Gómez, José M.
and
Perfectti, Francisco
2012.
Fitness consequences of centrality in mutualistic individual-based networks.
Proceedings of the Royal Society B: Biological Sciences,
Vol. 279,
Issue. 1734,
p.
1754.
Schrodt, Philip A.
Yonamine, James
and
Bagozzi, Benjamin E.
2013.
Handbook of Computational Approaches to Counterterrorism.
p.
129.
Acosta, Benjamin
and
Childs, Steven J.
2013.
Illuminating the Global Suicide-Attack Network.
Studies in Conflict & Terrorism,
Vol. 36,
Issue. 1,
p.
49.
Langhorne, Anna L.
2013.
Design, User Experience, and Usability. User Experience in Novel Technological Environments.
Vol. 8014,
Issue. ,
p.
112.
Lou, Jialin
Zhao, Jiaxin
and
Song, Yang
2013.
Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012.
Vol. 217,
Issue. ,
p.
593.
Swedlow, Brendon
2014.
Advancing Policy Theory with Cultural Theory: An Introduction to the Special Issue.
Policy Studies Journal,
Vol. 42,
Issue. 4,
p.
465.
Basu, Aparna
2014.
Social Networking.
Vol. 65,
Issue. ,
p.
215.
Breiger, Ronald L.
Schoon, Eric
Melamed, David
Asal, Victor
and
Rethemeyer, R. Karl
2014.
Comparative configurational analysis as a two-mode network problem: A study of terrorist group engagement in the drug trade.
Social Networks,
Vol. 36,
Issue. ,
p.
23.
McDoom, Omar Shahabudin
2014.
Antisocial Capital.
Journal of Conflict Resolution,
Vol. 58,
Issue. 5,
p.
865.
Walther, Olivier J
and
Leuprecht, Christian
2015.
Mapping and Deterring Violent Extremist Networks in North-West Africa.
SSRN Electronic Journal,
Kilger, Max
2015.
Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios.
p.
693.
del Val, E.
Martínez, C.
and
Botti, V.
2016.
Analyzing users’ activity in online social networks over time through a multi-agent framework.
Soft Computing,
Vol. 20,
Issue. 11,
p.
4331.
Perliger, Arie
Koehler-Derrick, Gabriel
and
Pedahzur, Ami
2016.
The Gap Between Participation and Violence: Why We Need to Disaggregate Terrorist ‘Profiles’.
International Studies Quarterly,
Vol. 60,
Issue. 2,
p.
220.
Ban, Vin Shen
Lega, Bradley
and
Batjer, H. Hunt
2016.
Maximizing the Potential of Social Media and Social Networks in Neurosurgery.
World Neurosurgery,
Vol. 91,
Issue. ,
p.
609.
Pedahzur, Ami
and
Martin, Susanne
2016.
The Handbook of the Criminology of Terrorism.
p.
339.
Ball, Leslie
2016.
Automating social network analysis: A power tool for counter-terrorism.
Security Journal,
Vol. 29,
Issue. 2,
p.
147.
Zech, Steven T.
and
Gabbay, Michael
2016.
Social Network Analysis in the Study of Terrorism and Insurgency: From Organization to Politics.
International Studies Review,
Vol. 18,
Issue. 2,
p.
214.
Cenciarelli, Orlando
Mancinelli, Sandro
Ludovici, Gian Marco
and
Palombi, Leonardo
2017.
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges.
p.
277.
Chih-yu Shih
2017.
The Relational Turn East and West From Chinese Confucianism to Balance of Relationships.
Korean Political Science Review,
Vol. 51,
Issue. 6,
p.
107.
Cranmer, Skyler J.
Leifeld, Philip
McClurg, Scott D.
and
Rolfe, Meredith
2017.
Navigating the Range of Statistical Tools for Inferential Network Analysis.
American Journal of Political Science,
Vol. 61,
Issue. 1,
p.
237.