期刊文献+

网络科学在反恐研究中面临的挑战和机遇 被引量:13

Network Science's Challenges and Opportunities in Counter-Terrorism Research
下载PDF
导出
摘要 综述了网络科学近年来在反恐中的应用,探讨了网络科学在反恐战争应用中所面临的挑战,主要从反恐网络的数据来源、恐怖组织的网络演化及动力学行为、网络的控制及预测等方面进行研究,以期探索网络科学在大数据时代下,在未来反恐应用中,提供科学依据和发挥应有的指导作用。 In this paper, we discuss some application challenges of network science in counter-ter- rorism research under the big data times. The research focuses on some issues, such as data re- source of counter-terrorism network, network evolution and dynamic behavior of terrorism organ- ization network, network control and forecast of counter-terrorism information. These researches provide some directions in future counter-terrorism of network science, which make some pro- gresses In counter-terrorism war.
出处 《复杂系统与复杂性科学》 EI CSCD 北大核心 2014年第1期60-66,共7页 Complex Systems and Complexity Science
基金 国家自然科学基金面上资助项目(61174151)
关键词 复杂网络 反恐 挑战 面临的问题 complex network counter-terrorism challenges facing problems
  • 相关文献

参考文献28

  • 1Gjelten T. US 'connects the dots' to catch roadside bombers[DB/OL]. [2013 -09 -021. http://www, npr. org/2010/ 12/03/131755378/u-s-connects-the-dots-to-catch-roadside-bombers? sc= 17 ~f= 1001.
  • 2苏北.网络恐怖主义挑战国家信息安全[DB/OL].[2013-09-02].http://news.sina.com.cn/o/2005-05-28/12016013679s.shtml.
  • 3张凡.新疆党委副秘书长郭永辉解读新疆稳定之本[DB/OL].[2013-09-02].http://news.qq.com/a/20110901/001053.htm.
  • 4Arquilla J, Ronfeldt D F. Networks and Netwars: the Future of Terror, Crime, and Militancy I-M~. Santa Monica, Cali fornia: RAND, 2001:10 - 60.
  • 5Bohannon J. Counterterrorism's new tool: metanetwork analysisrJ~. Science, 2009, 325(5939): 409- 411.
  • 6Barabdsi A L, Frangos J. Linked.. a New Science of NetworkEM~. Cambridge: Persus Press,2002: 220- 224.
  • 7李本先,李孟军,孙多勇,迟妍,范林军.社会网络分析在反恐中的应用[J].复杂系统与复杂性科学,2012,9(2):84-93. 被引量:12
  • 8Koschade S A. A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence[J]. Studies in Conflict ~ Terrorism, 2009, 29(6) :559 - 575.
  • 9许小可,方锦清.复杂网络理论在反恐战争中的应用[J].复杂系统与复杂性科学,2010,7(2):116-119. 被引量:8
  • 10Ressler S. Social network analysis as an approach to combat terrorism: past, present, and future research[-J~. Homeland Security Affairs, 2006, 2(2) =1 - 10.

二级参考文献208

  • 1刘琳.东南亚恐怖组织概况[J].东南亚纵横,2003(2):48-49. 被引量:6
  • 2闫栋,祁国宁.大规模软件系统的无标度特性与演化模型[J].物理学报,2006,55(8):3799-3804. 被引量:27
  • 3吴晔,肖井华,吴智远,杨俊忠,马宝军.手机短信网络的生长过程研究[J].物理学报,2007,56(4):2037-2041. 被引量:27
  • 4方锦清.试论四大层次的高科技网络的若干特点和思考[M]// 陈关荣,许晓鸣.复杂网络理论与应用.香港:上海系统科学出版社,2008:1-43.
  • 5Erdos P,Renyi A. On the evolution of randomg raphs[J]. Publ Math Inst Hungar Acad Sei, 1960,5: 17-60.
  • 6Barabasi A L, Albert R. Emergence of scaling in random networks[J]. Science, 1999,286 (5439) : 509-512.
  • 7Krapivsky P L, Redner S, Connectivity of growing random networks[J]. Phys Rev Lett, 2000,85 : 4629-4632.
  • 8Terrorism and Preparedness Data Resource Center. Bibliographic description: global terrorism database Ⅱ, 1998 - 2004[EB/OL]. http://www. icpsr. umich. edu/cocoon/ TPDRC/STUDY/22600. xml, 2009-11-05.
  • 9Bohannon J. Counterterrorism' s new tool: ' metanetwork' analysis [ J]. Science, 2009325:409 - 411.
  • 10Bohannon J. Investigating networks : the dark side [ J]. Science ,2009,325:410 - 411.

共引文献121

同被引文献187

引证文献13

二级引证文献89

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部