Login / Signup
How Members of Covert Networks Conceal the Identities of Their Leaders.
Marcin Waniek
Tomasz P. Michalak
Michael J. Wooldridge
Talal Rahwan
Published in:
ACM Trans. Intell. Syst. Technol. (2022)
Keyphrases
</>
key players
social networks
social network analysis
terrorist networks
network analysis
information flow
network structure
computer networks
virtual communities
criminal networks
data sets
genetic algorithm
community detection