k-Fragility Maximization Problem to Attack Robust Terrorist Networks |
Thornton, Jabre L.
(Department of Mathematics and Physics, North Carolina Central University)
Kim, Donghyun (Department of Mathematics and Physics, North Carolina Central University) Kwon, Sung-Sik (Department of Mathematics and Physics, North Carolina Central University) Li, Deying (School of Information, Renmin University of China) Tokuta, Alade O. (Department of Mathematics and Physics, North Carolina Central University) |
1 | D. Callahan, P. Shakarian, J. Nielsen, and A. N. Johnson, "Shaping operations to attack robust terror networks," in Proceedings of the ASE/IEEE International Conference on Social Informatics, Washington, DC, pp. 13-18, 2012. |
2 | L. C. Freeman, "Centrality in social networks conceptual clarification," Social Networks, vol. 1, no. 3, pp. 215-239, 1979. |