The identification of key players in a terrorist organization aids in preventing attacks, the efficient allocation of surveillance measures, and the destabilization of the corresponding network. In this paper, we introduce a game theoretic approach to identify key players in terrorist networks. In particular we use the Shapley value as a measure of importance in cooperative games that are specifically designed to reflect the context of the terrorist organization at hand. The advantage of this approach is that both the structure of the terrorist network, which usually reflects a communication and interaction structure, as well as non-network features, i.e., individual based parameters such as financial means or bomb building skills, can be t...
The law enforcement agencies need up-to-the minute intelligence about terrorist threats, which makes...
We develop a game-theoretic analysis of terrorism that examines the interaction between a terrorist ...
The paper introduces the subject of terrorism and counterterrorism by means of a two-person bimatrix...
All over the world intelligence services are collecting data concerning possible terrorist threats. ...
robust and effi cient techniques to analyze and understand the structure and operation of terror-ist...
We study a recently developed centrality metric to identify key players in terrorist organisations d...
The use of graph theory in social network analysis to identify the most important actors is well-kno...
The interest in analyzing loosely connected and decentralized terrorist networks of global reach has...
This study proposes a novel method for identifying the primary conspirators involved in terrorist ac...
The Shapley value (Shapley (1953)) is one of the most prominent one-point solution concepts in coope...
We consider a game played by a state sponsor of terrorism, a terrorist group, and the target of terr...
Abstract: Lindelauf et al. (2009a) introduced a quantitative approach to investigate optimal structu...
Throughout the history of the western world a constant struggle has been taking place between govern...
We consider a game played by a state sponsor of terrorism, a terrorist group, and the target of terr...
The Shapley value (Shapley in Ann Math Stud 2:28, 1953) is one of the most prominent one-point solut...
The law enforcement agencies need up-to-the minute intelligence about terrorist threats, which makes...
We develop a game-theoretic analysis of terrorism that examines the interaction between a terrorist ...
The paper introduces the subject of terrorism and counterterrorism by means of a two-person bimatrix...
All over the world intelligence services are collecting data concerning possible terrorist threats. ...
robust and effi cient techniques to analyze and understand the structure and operation of terror-ist...
We study a recently developed centrality metric to identify key players in terrorist organisations d...
The use of graph theory in social network analysis to identify the most important actors is well-kno...
The interest in analyzing loosely connected and decentralized terrorist networks of global reach has...
This study proposes a novel method for identifying the primary conspirators involved in terrorist ac...
The Shapley value (Shapley (1953)) is one of the most prominent one-point solution concepts in coope...
We consider a game played by a state sponsor of terrorism, a terrorist group, and the target of terr...
Abstract: Lindelauf et al. (2009a) introduced a quantitative approach to investigate optimal structu...
Throughout the history of the western world a constant struggle has been taking place between govern...
We consider a game played by a state sponsor of terrorism, a terrorist group, and the target of terr...
The Shapley value (Shapley in Ann Math Stud 2:28, 1953) is one of the most prominent one-point solut...
The law enforcement agencies need up-to-the minute intelligence about terrorist threats, which makes...
We develop a game-theoretic analysis of terrorism that examines the interaction between a terrorist ...
The paper introduces the subject of terrorism and counterterrorism by means of a two-person bimatrix...