Security of underground resistance movements

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In an attempt to better understand the possible lines of communication in a terrorist group, we consider a graph theoretic model and the competing demands of the desire for ease of communication versus the danger of betrayal of subverted or captured members. We first examine what the design should be when the attack on the network is optimal as well as when it is random but in both cases with no restriction on the surviving network. Then the question of what the design should be to minimize damage but to ensure that the average size of the surviving components is as large as possible is considered. Finally the restriction that all the survivors are capable of communicating is examined. © 2009 Springer Vienna.

Cite

CITATION STYLE

APA

Hartnell, B., & Gunther, G. (2009). Security of underground resistance movements. In Mathematical Methods in Counterterrorism (pp. 185–204). Springer Vienna. https://doi.org/10.1007/978-3-211-09442-6_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free