Login / Signup
Shaping Operations to Attack Robust Terror Networks.
Devon Callahan
Paulo Shakarian
Jeffrey Nielsen
Anthony N. Johnson
Published in:
SocialInformatics (2012)
Keyphrases
</>
real time
computer networks
database
social networks
network analysis
parameter tuning
genetic algorithm
search engine
data model
computationally efficient
countermeasures