Networks & Terrorism Publications

Benigni, Matthew & Carley, Kathleen M. (2016). From Tweets to Intelligence: Understanding the Islamic Jihad Supporting Communities in Twitter. In Proceedings of the 2016 SBP-BRiMS International Conference, Washington, DC, June 28-July 1, 2016.,

Frankenstein, William & Mezzour, Ghita & Carley, Kathleen M & Carley, Richard L. (2015). Remote assessment of countries' nuclear, biological, and cyber capabilities: joint motivation and latent capability approach. Social Network Analysis and Mining, 5(5), [DOI] [link]

Fellman, Philip V & Parnell, Gregory S & Carley, Kathleen M. (2011). Biowar and Bioterrorism Risk Assessment. In Eighth International Conference on Complex Systems, Boston., [pdf]

Gerdes, Luke. (2008). Codebook for Network Data on Individuals Involved with Terrorism and Counterterrorism. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report CMU-ISR-08-136, [pdf]

Olson, Jamie & Carley, Kathleen M. (2008). Summarization and Information Loss in Network Analysis. Link Analysis, Counterterrorism, and Security Workshop 2008, SIAM International Conference on Data Mining, Atlanta, GA, USA, [pdf]

Moon, Il-Chul & Carley, Kathleen M & Levis, Alexander H. (2008). Vulnerability Assessment on Adversarial Organization: Unifying Command and Control Structure Analysis and Social Network Analysis. SIAM International Conference on Data Mining, Workshop on Link Analysis, Counterterrorism and Security, Atlanta, Georgia, Apr. 26, 2008, [pdf]

Moon, Il-Chul & Carley, Kathleen M. (2007). Modeling and Simulation of Terrorist Networks in Social and Geospatial Dimensions. IEEE Intelligent Systems, Special issue on Special issue on Social Computing - Sep/Oct '07, 22(5), 40 - 49. [link]

Carley, Kathleen M. (2006). A Dynamic Network Approach to the Assessment of Terrorist Groups and The Impact of Alternative Courses of Action. Visualising Network Information. Meeting Proceedings RTO-MP-IST-063, 12 - 14. Neuilly-sur-Seine, France: RTO. [link]

Tsvetovat, Max & Carley, Kathleen M. (2005). Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence. Journal of Social Structure, 6(2), elec. pub. [pdf]

Thomas, Michael D & Arough, Scott L & Carley, Kathleen M & Kraiman, James B & Davis, Jonathan R. (2004). Automated Anomaly Detection Processor for Bioterrorism Early Detection. National Syndromic Surveillance Conference Proceedings, In supplement of the Morbidity and Mortality Weekly Report (MMWR), [gif]

Carley, Kathleen M & Fridsma, D & Casman, E & Altman, Neal & Chang, J & Kaminsky, B & Nave, D & Yahja, Alex. (2004). BioWar: Scalable Multi-Agent Social and Epidemiological Simulation of Bioterrorism Events. NAACSOS Conference 2003, Day 4, Electronic Publication, Pittsburgh, PA, IEEE SMCA03-11-0274., [link] [pdf] 507kb

Breiger, Ronald & Carley, Kathleen M & Pattison, Philippa. (2003). Dynamic Social Network Modeling and Analysis. Workshop Summary. Washington, DC: The National Academies Press. [link]
National Research Council of the National Academies

Tsvetovat, Max & Carley, Kathleen M. (2003). Bouncing Back: Recovery mechanisms of covert networks. NAACSOS Conference 2003, Day 3, Electronic Publication, Pittsburgh, PA, [link] [pdf] 72kb

Carley, Kathleen M. (2003). Destabilizing Terrorist Networks. Proceedings of the 8th International Command and Control Research and Technology Symposium. Conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 3, Electronic Publication, [link] [pdf]

Dombroski, Matthew & Fischbeck, Paul & Carley, Kathleen M. (2003). Estimating the Shape of Covert Networks. Proceedings of the 8th International Command and Control Research and Technology Symposium. Conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 3, Electronic Publication, Vienna, VA., Washington DC, Vienna, VA: [link] [pdf]

Yahja, Alex & Carley, Kathleen M. (2003). Generating Realistic Heterorgenous Agents: Computing Confidant-based Base Interaction Probabilities. Pittsburgh, PA: [pdf]

Behrman, Robert & Carley, Kathleen M. (2003). Modeling the Structure and Effectiveness of Intelligence Organizations: Dynamic Information Flow Simulation. Proceedings of the 8th International Command and Control Research and Technology Symposium. Conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 7, Electronic Publication, Washington DC, Vienna, VA: [link] [pdf]
the 8th International Command and Control Research and Technology Symposium

Diedrich, Frederick J & Carley, Kathleen M & MacMillan, Jean & Baker, Keith & Schlabach, MAJ Jerry L & J, LTC & Fink, Victor. (2003). Visualization of threats and attacks in urban environments. Military Intelligence Professional Bulletin, 29(1): 42-45. [link]

Yahja, Alex & Carley, Kathleen M. (2003). WIZER: What-If Analyzer for Automated Social Model Space Exploration and Validation. NAACSOS Conference 2003, Pittsburgh, PA Electronic Publication, [pdf]

Carley, Kathleen M. (2002). Inhibiting Adaptation. Proceedings of the 2002 Command and Control Research and Technology Symposium. Conference held in Naval Postgraduate School, Monterey, CA. Evidence Based Research, Track 3, Electronic Publication, , Vienna, VA, Monterey, CA: [link] [pdf]
Naval Postgraduate School, Monterey, CA

Carley, Kathleen M & Lee, Ju-Sung & Krackhardt, David. (2001). Destabilizing Networks. Connections, 24(3): 31-34. [link]