Login / Signup

Shaping Operations to Attack Robust Terror Networks.

Devon CallahanPaulo ShakarianJeffrey NielsenAnthony N. Johnson
Published in: SocialInformatics (2012)
Keyphrases
  • real time
  • computer networks
  • database
  • social networks
  • network analysis
  • parameter tuning
  • genetic algorithm
  • search engine
  • data model
  • computationally efficient
  • countermeasures