Login / Signup
k-Fragility Maximization Problem to Attack Robust Terrorist Networks.
Jabre L. Thornton
Donghyun Kim
Sung-Sik Kwon
Deying Li
Alade O. Tokuta
Published in:
J. Inform. and Commun. Convergence Engineering (2014)
Keyphrases
</>
terrorist networks
social network analysis
terrorist attacks
machine learning
key players