[1]
|
Z. Maoz, D. Kuperman, L. Terris and I. Talmud, “Structural Equivalence and International Conflict: A Social Networks Analysis,” Journal of Conflict Resolution, Vol. 50, No. 5, 2006, pp. 664-689.
doi:10.1177/0022002706291053
|
[2]
|
M. Sageman, “Understanding Terror Networks,” Philadelphia, University of Pennsylvania Press. 2004.
|
[3]
|
J. T. Scholz, R. Berardo and B. Kile, “Do Networks Enhance Cooperation? Credibility, Search, and Collaboration,” Journal of Politics, Vol. 70, No. 2, 2008, pp. 393-406.
|
[4]
|
J. Fowler, B. Grofman and N. Masuoka, “Social Networks in Political Science: Hiring and Placement of Ph. Ds, 1960-2002. Political Science: 2007, pp. 727-739.
|
[5]
|
S. Sreenivasan, R. Cohen, E. Lopez, Z. Toroczkai and H. E. Stanley 2007. Phys. Rev. E 75, 036105.
doi:10.1103/PhysRevE.75.036105
|
[6]
|
M. O. Jackson, “Presenting and Measuring networks,” Chapter 2, Social and Economic Networks, Princeton University Press, Princeton, 2008.
|
[7]
|
T. Opsahl, F. Agneessens and J. Skvoretz, “Node Centrality in Weighted Networks: Generalizing Degree and Shortest Paths,” Social Networks, Vol. 32, No. 3, 2010, pp. 245-251. doi:10.1016/j.socnet.2010.03.006
|
[8]
|
F. Jordan and I. Scheuring, “Network Ecology: Topological Constraints on Ecosystems Dynamics,” Physics of Life Reviews, Vol. 1, No. 3, 2004, pp. 139-172.
doi:10.1016/j.plrev.2004.08.001
|
[9]
|
F. Jordan, W. C. Liu and A. J. Davis, “Topological Keystone Species: Measures of Positional Importance in Food Webs,” Oikos, Vol. 112, No. 3, 2006, pp. 535-546.
doi:10.1111/j.0030-1299.2006.13724.x
|
[10]
|
M. Lazic, “On the Laplacian Energy of a Graph,” Cze- choslovak Mathematical Journal, Vol. 56, No. 131, 2006, pp. 1207-1213.
|
[11]
|
S. Koschade, “A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence,” Studies in Conflict and Terrorism, Vol. 29, No. 6, 2006, pp. 559-575.
doi:10.1080/10576100600798418
|
[12]
|
V. Krebs, “Uncloaking Terrorist Networks,” First Monday, Vol. 7, No. 4, 2002, 1st April.
|
[13]
|
F. Chung, “Spectral Graph Theory,” American Mathematical Society, USA1997.
|
[14]
|
J. Magouirk, S. Atran and M. Sageman, “Connecting Terrorist Networks,” Studies in Conflict and Terrorism, Vol. 31, No. 1, 2008, pp. 1-16.
|
[15]
|
T. H. Kean et al., “The 9/11 Commission Report,” W. W. Norton and Company, New York, 2004.
|
[16]
|
M. Hamada, K. Sato and K. Asai, “Improving the Accuracy of Predicting Secondary Structure for Aligned RNA Sequences,” Nucleic Acids Research, 1-10. 2010.
|
[17]
|
M. Xu, Z. Su, “Computational Prediction of cAMP Receptor Protein (CRP) Binding Sites in Cyanobacterial Genomes,” BMC Genomics, 10-23. 2009.
|
[18]
|
S. Pemmaraju and S. Skiena, “All-Pairs Shortest Paths and Transitive Closure and Reduction. In: Computational Discrete Mathematics: Combinatorics and Graph Theory in Mathematica. Cambridge, England, Cambridge University Press, 2003. pp. 330-331 and 353-356.
|
[19]
|
B. C. Csaji, R. M. Jungers and V. D. Blondel, “Pagerank Optimization by Edge Selection,” The Computing Research Repository abs/0911.2280. 2009.
|