In this work we focus on the “Noordin Mohamed Top” dataset, develop- ing an asymmetric approach that treats one network as response and the remaining as covariates. The objective is to identify which information may be useful in pre- dicting terrorists’ collaboration in a bombing attack, identifying at the same time the most influential subjects involved in these dynamics. Such aim is addressed through an asymmetric Bayesian semi-parametric model for networks that, through a suitable prior specification, integrates a flexible regularization and the detection of leading node
Terrorism persists as a worldwide threat, as exemplified by the on‐going lethal attacks perpetrated ...
The interest in analyzing loosely connected and decentralized terrorist networks of global reach has...
noWhile criminals may start their activities at individual level, the same is in general not true fo...
This paper investigates the group structure in a terrorist network through the latent class model an...
Developments in statistics and computer science have influenced research on many social problems. Th...
Actor–event data are common in sociological settings, whereby one reg-isters the pattern of attendan...
We present an integrating decision support system designed to aid security analysts’ monitoring of t...
All over the world intelligence services are collecting data concerning possible terrorist threats. ...
Actor-event data are common in sociological settings, whereby one registers the pattern of attendanc...
The identification of key players in a terrorist organization aids in preventing attacks, the effici...
The law enforcement agencies need up-to-the minute intelligence about terrorist threats, which makes...
A sharp rise in terrorist activities has motivated many researchers to device techniques of identifi...
Nowadays, many resources for counter-terrorism operations are available for researchers belonging to...
Since 2009, Nigeria has been the scene of numerous deadly terrorist attacks perpetrated by the terro...
Since 2009, Nigeria has been the scene of numerous deadly terrorist attacks perpetrated by the terro...
Terrorism persists as a worldwide threat, as exemplified by the on‐going lethal attacks perpetrated ...
The interest in analyzing loosely connected and decentralized terrorist networks of global reach has...
noWhile criminals may start their activities at individual level, the same is in general not true fo...
This paper investigates the group structure in a terrorist network through the latent class model an...
Developments in statistics and computer science have influenced research on many social problems. Th...
Actor–event data are common in sociological settings, whereby one reg-isters the pattern of attendan...
We present an integrating decision support system designed to aid security analysts’ monitoring of t...
All over the world intelligence services are collecting data concerning possible terrorist threats. ...
Actor-event data are common in sociological settings, whereby one registers the pattern of attendanc...
The identification of key players in a terrorist organization aids in preventing attacks, the effici...
The law enforcement agencies need up-to-the minute intelligence about terrorist threats, which makes...
A sharp rise in terrorist activities has motivated many researchers to device techniques of identifi...
Nowadays, many resources for counter-terrorism operations are available for researchers belonging to...
Since 2009, Nigeria has been the scene of numerous deadly terrorist attacks perpetrated by the terro...
Since 2009, Nigeria has been the scene of numerous deadly terrorist attacks perpetrated by the terro...
Terrorism persists as a worldwide threat, as exemplified by the on‐going lethal attacks perpetrated ...
The interest in analyzing loosely connected and decentralized terrorist networks of global reach has...
noWhile criminals may start their activities at individual level, the same is in general not true fo...