Journal articles on the topic 'Terrorist networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Terrorist networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Karjaya, Lalu Putrwandi, Mohammad Sood, and Purnami Safitri. "Narcoterrorism dan Perdagangan Senjata Ilegal sebagai Penghubung Jaringan Terorisme Internasional." Nation State Journal of International Studies 1, no. 1 (December 31, 2018): 91–113. http://dx.doi.org/10.24076/nsjis.2018v1i1.91.
Full textDamayanti, Angel, and Melda Yanny. "Gender-Based Counter-Terrorism Policing." International Journal of Scientific Research and Management 10, no. 08 (August 22, 2022): 1210–21. http://dx.doi.org/10.18535/ijsrm/v10i8.sh01.
Full textPavlik, Mihail, and Konstantin Borichev. "The terrorism of individuals: the main trends and features of counteraction." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2020, no. 1 (April 8, 2020): 106–12. http://dx.doi.org/10.35750/2071-8284-2020-1-106-112.
Full textKhokhlov, I. "Some Approaches to Interpretation of Terrorism Phenomenon." World Economy and International Relations, no. 5 (2015): 19–28. http://dx.doi.org/10.20542/0131-2227-2015-5-19-28.
Full textRostokinsky, A. V., and S. V. Danelyan. "Terror by franchise, or separation of the name from the bodies." Law Нerald of Dagestan State University 40, no. 4 (2021): 129–33. http://dx.doi.org/10.21779/2224-0241-2021-40-4-129-133.
Full textSingh, Saurabh, Shashikant Verma, and Akhilesh Tiwari. "An innovative approach for identification of pivotal node in terrorist network using promethee method (an anti-terrorism approach)." International Journal of Engineering & Technology 7, no. 1 (January 27, 2018): 95. http://dx.doi.org/10.14419/ijet.v7i1.8828.
Full textKaminski, Stacey, Steven Beres, and Richard Hayes. "Negotiating the Non-Negotiable: Dealing with Absolutist Terrorists." International Negotiation 8, no. 3 (2003): 451–67. http://dx.doi.org/10.1163/1571806031310824.
Full textGaivoronskaya, I. B., T. F. Fomina, and B. А. Amanzholova. "Online Recruitment into Extremist and Terrorist Organizations." Psychology and Law 10, no. 4 (2020): 152–65. http://dx.doi.org/10.17759/psylaw.2020100411.
Full textSpyropoulos, Alexandros Z., Charalampos Bratsas, Georgios C. Makris, Evangelos Ioannidis, Vassilis Tsiantos, and Ioannis Antoniou. "Entropy and Network Centralities as Intelligent Tools for the Investigation of Terrorist Organizations." Entropy 23, no. 10 (October 13, 2021): 1334. http://dx.doi.org/10.3390/e23101334.
Full textSpyropoulos, Alexandros Z., Charalampos Bratsas, Georgios C. Makris, Evangelos Ioannidis, Vassilis Tsiantos, and Ioannis Antoniou. "Entropy and Network Centralities as Intelligent Tools for the Investigation of Terrorist Organizations." Entropy 23, no. 10 (October 13, 2021): 1334. http://dx.doi.org/10.3390/e23101334.
Full textEdi Prastiyo, Wawan, and I. Ketut Rai Setiabudhi. "Children Involvement in Terrorism Activities: Perpetrator or a Victim? (A Study in the Circle of Violence)." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 8, no. 2 (2021): 213–31. http://dx.doi.org/10.22304/pjih.v8n2.a3.
Full textYashlavskii, A. "The Problem of Terrorist Activity of Jihadists from Central Asia in the West." Russia and New States of Eurasia, no. 4 (2020): 133–48. http://dx.doi.org/10.20542/2073-4786-2020-4-133-148.
Full textSingh, Saurabh, Shashi Kant Verma, and Akhilesh Tiwari. "A novel approach for finding crucial node using ELECTRE method." International Journal of Modern Physics B 34, no. 09 (April 10, 2020): 2050076. http://dx.doi.org/10.1142/s0217979220500769.
Full textSpyropoulos, Alexandros Z., Charalampos Bratsas, Georgios C. Makris, Evangelos Ioannidis, Vassilis Tsiantos, and Ioannis Antoniou. "Investigation of Terrorist Organizations Using Intelligent Tools: A Dynamic Network Analysis with Weighted Links." Mathematics 10, no. 7 (March 28, 2022): 1092. http://dx.doi.org/10.3390/math10071092.
Full textLi, Zhanfeng, Bo Li, and Duoyong Sun. "The evolutionary dynamics of group-level terrorist network." MATEC Web of Conferences 309 (2020): 02011. http://dx.doi.org/10.1051/matecconf/202030902011.
Full textMagouirk, Justin, Scott Atran, and Marc Sageman. "Connecting Terrorist Networks." Studies in Conflict & Terrorism 31, no. 1 (January 4, 2008): 1–16. http://dx.doi.org/10.1080/10576100701759988.
Full textSpezzano, Francesca, V. S. Subrahmanian, and Aaron Mannes. "Reshaping terrorist networks." Communications of the ACM 57, no. 8 (August 2014): 60–69. http://dx.doi.org/10.1145/2632661.2632664.
Full textAsal, Victor, and R. Karl Rethemeyer. "Researching Terrorist Networks." Journal of Security Education 1, no. 4 (October 20, 2006): 65–74. http://dx.doi.org/10.1300/j460v01n04_06.
Full textBakti, Agus Surya, Hafied Cangara, Dwia Aries Tina Palubuhu, and Eriyanto Eriyanto. "Social Network Strategy to Counter Acts of Terrorism in Indonesia: A Structural Hole Study." Jurnal Komunikasi Ikatan Sarjana Komunikasi Indonesia 6, no. 2 (December 17, 2021): 312–23. http://dx.doi.org/10.25008/jkiski.v6i2.603.
Full textNwanga, E. M., K. C. Okafor, G. A. Chukwudebe, and I. E. Achumba. "Computational Robotics: An Alternative Approach for Predicting Terrorist Networks." International Journal of Robotics and Automation Technology 8 (November 24, 2021): 1–11. http://dx.doi.org/10.31875/2409-9694.2021.08.1.
Full textMel'nikova, A. "Media Communication and Terrorism: Areas of Intersection." Scientific Research and Development. Modern Communication Studies 9, no. 1 (February 4, 2020): 57–61. http://dx.doi.org/10.12737/2587-9103-2020-57-61.
Full textSingh, Saurabh, Shashi Kant Verma, and Akhilesh Tiwari. "A novel method for destabilization of terrorist network." Modern Physics Letters B 34, no. 27 (June 3, 2020): 2050298. http://dx.doi.org/10.1142/s021798492050298x.
Full textTawadros, Amira S. N. "Mapping terrorist groups using network analysis: Egypt case study." Journal of Humanities and Applied Social Sciences 2, no. 2 (January 25, 2020): 141–59. http://dx.doi.org/10.1108/jhass-09-2019-0050.
Full textUddin, M. Irfan, Nazir Zada, Furqan Aziz, Yousaf Saeed, Asim Zeb, Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh, and Marwan Mahmoud. "Prediction of Future Terrorist Activities Using Deep Neural Networks." Complexity 2020 (April 22, 2020): 1–16. http://dx.doi.org/10.1155/2020/1373087.
Full textHendroy, Faruq Arjuna. "The US National Efforts to Counter Domestic Terrorism: Progress and Controversy." Jurnal Global Strategis 12, no. 2 (November 30, 2018): 69. http://dx.doi.org/10.20473/jgs.12.2.2018.69-80.
Full textHan, Na, Runhua Tang, and Jianjun Wang. "The Communication Characteristics and Intervention of Terrorism-related Public Opinion An Analysis of Manchester Bombing Terrorist Attack." Tobacco Regulatory Science 7, no. 5 (September 30, 2021): 3671–84. http://dx.doi.org/10.18001/trs.7.5.1.144.
Full textIssaev, Leonid M., Marat B. Aisin, Ilya A. Medvedev, and Andrey V. Korotayev. "Islamic Terrorism in the Middle East and its Impact on Global Security." RUDN Journal of Political Science 22, no. 4 (December 15, 2020): 713–30. http://dx.doi.org/10.22363/2313-1438-2020-22-4-713-730.
Full textEiselt, H. A. "Destabilization of terrorist networks." Chaos, Solitons & Fractals 108 (March 2018): 111–18. http://dx.doi.org/10.1016/j.chaos.2018.01.018.
Full textGregori, Matteo, and Ugo Merlone. "Comparing operational terrorist networks." Trends in Organized Crime 23, no. 3 (March 31, 2020): 263–88. http://dx.doi.org/10.1007/s12117-020-09381-z.
Full textQuanandi, Jodi, Susaningtyas N. H. Kertopati, and Fauzia Gustarina Cempaka Timur. "Keterlibatan dan Pola Pergerakan Teroris Perempuan dalam Jaringan Terorisme di Indonesia." Journal of Education, Humaniora and Social Sciences (JEHSS) 5, no. 2 (November 8, 2022): 1189–99. http://dx.doi.org/10.34007/jehss.v5i2.1356.
Full textVeretenko, Tetiana, Anton Trebe, and Olena Bieloliptseva. "FORMATION OF HIGH SCHOOL STUDENTS’SAFE BEHAVIOUR WHILE TERRORIST ATTACKS." SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference 1 (May 28, 2021): 732–41. http://dx.doi.org/10.17770/sie2021vol1.6476.
Full textMachitidze, G. "Comparative Analyses of Terrorist Threats under Conditions of COVID-19." World Economy and International Relations 64, no. 11 (2020): 5–12. http://dx.doi.org/10.20542/0131-2227-2020-64-11-5-12.
Full textTrager, Robert F., and Dessislava P. Zagorcheva. "Deterring Terrorism: It Can Be Done." International Security 30, no. 3 (January 2006): 87–123. http://dx.doi.org/10.1162/isec.2005.30.3.87.
Full textNeag, Mihai Marcel. "Physiognomy of the Operations Against Terrorism." International conference KNOWLEDGE-BASED ORGANIZATION 23, no. 1 (June 20, 2017): 220–26. http://dx.doi.org/10.1515/kbo-2017-0035.
Full textSyafiq, Muhammad. "Proses Perubahan Diri Seorang Teroris menjadi Aktivis Perdamaian." Jurnal Ilmiah Psyche 15, no. 2 (December 10, 2021): 73–92. http://dx.doi.org/10.33557/jpsyche.v15i2.1564.
Full textel-Nawawy, Mohammed, and Basel Alameer Hasan. "Terrorism, Islamophobia and White supremacy: Comparing CNN and the BBC coverage of the Christchurch mosque shooting." Journal of Arab & Muslim Media Research 15, no. 1 (April 1, 2022): 65–85. http://dx.doi.org/10.1386/jammr_00041_1.
Full textTrăistaru, Marius. "Involving cross-border organized crime networks from ex-Soviet sources in support of terrorism and their influence on regional economic development." Proceedings of the International Conference on Business Excellence 14, no. 1 (July 1, 2020): 975–83. http://dx.doi.org/10.2478/picbe-2020-0092.
Full textLi, Ze, Duoyong Sun, Bo Li, Zhanfeng Li, and Aobo Li. "Terrorist Group Behavior Prediction by Wavelet Transform-Based Pattern Recognition." Discrete Dynamics in Nature and Society 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/5676712.
Full textFIELD, ANTONY. "Tracking terrorist networks: problems of intelligence sharing within the UK intelligence community." Review of International Studies 35, no. 4 (October 2009): 997–1009. http://dx.doi.org/10.1017/s0260210509990416.
Full textFellman, Philip Vos. "The complexity of terrorist networks." International Journal of Networking and Virtual Organisations 8, no. 1/2 (2011): 4. http://dx.doi.org/10.1504/ijnvo.2011.037158.
Full textSCHMIDLE, ROBERT E. "Positioning Theory and Terrorist Networks." Journal for the Theory of Social Behaviour 40, no. 1 (March 2010): 65–78. http://dx.doi.org/10.1111/j.1468-5914.2009.00421.x.
Full textSiqueira, Kevin, and Todd Sandler. "Terrorist networks, support, and delegation." Public Choice 142, no. 1-2 (July 25, 2009): 237–53. http://dx.doi.org/10.1007/s11127-009-9487-y.
Full textBogerts, Bernhard, Maria Schöne, and Stephanie Breitschuh. "Brain alterations potentially associated with aggression and terrorism." CNS Spectrums 23, no. 2 (August 14, 2017): 129–40. http://dx.doi.org/10.1017/s1092852917000463.
Full textRostokinsky, Alexander V., and Rita S. Danelyan. "About armed rebellions of singles or features of individual terrorist activity." Law Нerald of Dagestan State University 42, no. 2 (2022): 153–57. http://dx.doi.org/10.21779/2224-0241-2022-42-2-153-157.
Full text., R. D. Gaharwar. "THE IMPLEMENTATION OF TERRORIST WEB MINER FOR THE TERRORIST NETWORKS." International Journal of Research in Engineering and Technology 04, no. 11 (November 25, 2015): 268–71. http://dx.doi.org/10.15623/ijret.2015.0411047.
Full textPolo, Sara M. T. "How Terrorism Spreads: Emulation and the Diffusion of Ethnic and Ethnoreligious Terrorism." Journal of Conflict Resolution 64, no. 10 (June 10, 2020): 1916–42. http://dx.doi.org/10.1177/0022002720930811.
Full textAndrusyshyn, Julia, and Valeria Barannik. "INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE." Information Security of the Person, Society and State, no. 31-33 (December 20, 2021): 6–15. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-1.
Full textOlomojobi, Yinka, and Odusanya Temitope Omotola. "Social Media." International Journal of Cyber Warfare and Terrorism 11, no. 1 (January 2021): 31–44. http://dx.doi.org/10.4018/ijcwt.2021010103.
Full textArrobi, Mohammad Zaki. "The Making of Islamist-inspired Terrorism and It’s Counter-terrorism in Indonesia." Politik Indonesia: Indonesian Political Science Review 3, no. 2 (July 15, 2018): 217–38. http://dx.doi.org/10.15294/ipsr.v3i2.13673.
Full textTakeyh, Ray, and Nikolas Gvosdev. "Do terrorist networks need a home?" Washington Quarterly 25, no. 3 (September 2002): 97–108. http://dx.doi.org/10.1162/01636600260046262.
Full text