Network detection theory

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Despite the breadth of modern network theory, it can be difficult to apply its results to the task of uncovering terrorist networks: the most useful network analyses are often low-tech, link-following approaches. In the traditional military domain, detection theory has a long history of finding stealthy targets such as submarines. We demonstrate how the detection theory framework leads to a variety of network analysis questions. Some solutions to these leverage existing theory; others require novel techniques-but in each case the solutions contribute to a principled methodology for solving network detection problems. This endeavor is difficult, and the work here represents only a beginning. However, the required mathematics is interesting, being the synthesis of two fields with little common history. © 2009 Springer Vienna.

Cite

CITATION STYLE

APA

Ferry, J. P., Lo, D., Ahearn, S. T., & Phillips, A. M. (2009). Network detection theory. In Mathematical Methods in Counterterrorism (pp. 161–181). Springer Vienna. https://doi.org/10.1007/978-3-211-09442-6_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free