Albert R, Jeong H, Barabási AL (2000) Error and attack tolerance of complex networks. Nature 406:378–382
Article
Google Scholar
Armal LAN, Scala A, Barthelemy M, Stanley HE (2000) Classes of small-world networks. Proc Natl Acad Sci 97(21):11149–11152
Article
Google Scholar
Asal V, Rethemeyer K (2006) Researching terrorist networks. J Secur Educ 1(4):65–74
Article
Google Scholar
Baker WE, Faulkner RR (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58(6):837–860
Article
Google Scholar
Bakker RM, Raab J, Milward HW (2011) A preliminary theory of dark network resilience. J Policy Anal Manag 31(1):33–62
Article
Google Scholar
Barabási AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512
Article
Google Scholar
Blau PM (1968) The hierarchy of authority in organizations. Am J Sociol 73(4):453–467
Article
Google Scholar
Block P (2015) Reciprocity, transitivity, and the mysterious three-cycle. Soc Netw 40:163–173
Article
Google Scholar
Block P, Koskinen J, Holloway J, Steglich C, Stadtfeld C (2018) Change we can believe in: comparing longitudinal network models on consistency, interpretability and predictive power. Soc Netw 52:180–191
Article
Google Scholar
Bright D, Koskinen J, Malm A (2018) Illicit network dynamics: the formation and evolution of a drug trafficking network. J Quant Criminol. https://doi.org/10.1007/s10940-018-9379-8
Article
Google Scholar
Carley KM (2006) Destabilization of covert networks. Comput Math Organ Theory 12(1):51–66
Article
Google Scholar
Crossley N, Edwards G, Harries E, Stevenson R (2012) Covert social movement networks and the secrecy-efficiency trade off: the case of the UK suffragettes (1906–1914). Soc Networks 34:634–644
Article
Google Scholar
Cunningham D, Everton S, Murphy P (2016) Understanding dark networks: a strategic framework for the use of social network analysis. Rowman & Littlefield, Landham
Google Scholar
Desmarais BA, Cranmer SJ (2012) Micro-level interpretation of exponential random graph models with application to estuary networks. Policy Stud J 40(3):402–434
Article
Google Scholar
Duxbury SW, Haynie DL (2019) Criminal network security: an agent-based approach to evaluating network resilience. Criminology 57(2):314–342
Article
Google Scholar
Enders W, Su X (2007) Rational terrorists and optimal network structure. J Confl Resolut 51(1):33–57
Article
Google Scholar
Erickson BH (1981) Secret societies and social structure. Soc Forces 60(1):188–210
Article
Google Scholar
Everton SF (2012) Disrupting dark networks. Cambridge University Press, New York
Book
Google Scholar
Everton SF (2016) Social networks and religious violence. Rev Relig Res 58(2):191–217
Article
Google Scholar
Felmlee D, Faris R (2016) Toxic ties: a network of friendship, dating, and cyber victimization. Soc Psychol Q 79:243–262
Article
Google Scholar
Felmlee D, McMillan C, Inara Rodis P, Osgood DW (2018) Falling behind: lingering costs of the high school transition for youth friendships and grades. Sociol Educ 91(2):159–182
Article
Google Scholar
Gartner SS, Felmlee D, Yarlagadda R, Verma D (2019) Understanding patterns of terrorism in India using AI machine learning: 2007–2017. In: Fifteenth international conference on technology, knowledge & society, Barcelona
Gerdes LM (2015) Dark dimensions: clarifying relationships among clandestine actors. In: Gerdes LM (ed) Illuminating dark networks: the study of clandestine groups and organizations. Cambridge University Press, New York, pp 19–38
Chapter
Google Scholar
Gill P, Lee J, Rethemeyer KR, Horgan J, Asal V (2014) Lethal connections: the determinants of networks connections in the Provisional Irish Republican Army, 1970–1998. Int Interact 40(1):52–78
Article
Google Scholar
Granovetter MS (1973) The strength of weak ties. Am J Sociol 78(6):1360–1380
Article
Google Scholar
Helfstein S, Wright D (2011) Covert or convenient? Evolution of terror attack networks. J Confl Resolut 55(5):785–813
Article
Google Scholar
Horowitz MC, Potter PBK (2014) Allying to kill: terrorist intergroup cooperation and the consequences for lethality. J Confl Resolut 58(2):199–225
Article
Google Scholar
Hunter DR (2007) Curved exponential family models for social networks. Soc Netw 29:216–230
Article
Google Scholar
Hunter DR, Handcock MS, Butts CT, Goodreau SM, Morris M (2008) ergm: a package to fit, simulate and diagnose exponential-family models for networks. J Stat Softw 24(3):1–29
Article
Google Scholar
John Jay & ARTIS Transnational Terrorism (JJATT) database (2009) http://doitapps.jjay.cuny.edu/jjatt/index.php. Accessed 4 May 2018
Knoke D (2013) ‘It takes a network:’ the rise and fall of social network analysis in U.S. army counterinsurgency doctrine. Connections 33(1):1–10
Google Scholar
Krebs VE (2002) Mapping networks of terrorist cells. Connections 24(3):23–52
Google Scholar
Krivitsky PN, Goodreau SM (2017) STERGM—separable temporal ERGMs for modeling discrete relational dynamics with statnet
Lantz B, Hutchison R (2015) Co-offender ties and the criminal career: the relationship between co-offender group structure and the individual offender. J Res Crime Delinq 52(5):658–690
Article
Google Scholar
Lubbers MJ, Snijders TAB (2007) A comparison of various approaches to the exponential random graph model: a reanalysis of 102 student networks in school classes. Soc Netw 29(4):489–507
Article
Google Scholar
Magouirk J, Atran S, Sageman M (2008) Connecting terrorist networks. Stud Confl Terror 31(1):1–16
Article
Google Scholar
Maoz Z, Terris LG, Kuperman RD, Talmund I (2007) What is the enemy of my enemy? Causes and consequences of imbalanced international relations, 1816–2001. J Polit 69(1):100–115
Article
Google Scholar
Matthew R, Shambaugh G (2005) The limits of terrorism: a network perspective. Int Stud Rev 7(4):617–627
Article
Google Scholar
McAllister B (2004) Al Qaeda and the innovative firm: demythologizing the network. Stud Confl Terror 27(4):297–319
Article
Google Scholar
McFarland DA, Moody J, Diehl D, Smith JA, Thomas RJ (2014) Network ecology and adolescent social structure. Am Sociol Rev 79(6):1088–1121
Article
Google Scholar
McMillan C (2019) Tied together: adolescent friendship networks, immigrant status, and health outcomes. Demography 56(3):1075–1103
Article
Google Scholar
McMillan C, Felmlee D, Osgood DW (2018) Peer influence, friend selection, and gender: how network processes shape adolescent smoking, drinking, and delinquency. Soc Netw 55:86–96
Article
Google Scholar
Milward HB, Raab J (2006) Dark networks as organizational problems: elements of a theory. Int Public Manag J 9(3):333–360
Article
Google Scholar
Morselli C, Giguère C, Petit K (2007) The efficiency/security trade-off in criminal networks. Soc Netw 29:143–153
Article
Google Scholar
Newcomb TM (1961) The acquaintance process. Holt, Rinehart & Winston, New York
Book
Google Scholar
Newman MEJ (2001) Clustering and preferential attachment in growing networks. Phys Rev E 64:1–4
Google Scholar
Osgood DW, Ragan DT, Wallace L, Gest SD, Feinberg ME, Moody J (2013) Peers and the emergence of alcohol use: influence and selection processes in adolescent friendship networks. J Res Adolesc 23(3):500–512
Article
Google Scholar
Papachristos AV (2009) Murder by structure: dominance relations and the social structure of gang homicide. Am J Sociol 115(1):74–128
Article
Google Scholar
Pedahzur A, Perliger A (2006) The changing nature of suicide attacks. Soc Forces 84(4):1987–2008
Article
Google Scholar
Perliger A (2018) Terrorism networks. In: Victor JN, Montgomery AH, Lubell M (eds) The oxford handbook of political networks. Oxford University Press, New York, pp 653–668
Google Scholar
Pirolli P, Card S (2005) The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis. In: Proceedings of international conference on intelligence analysis, p 4
Price DD (1976) A theory of bibliometric and other cumulative advantage processes. J Am Soc Inf Sci 27(5):292–306
Article
Google Scholar
Robins G, Pattison P, Kalish Y, Lusher D (2007) An introduction to exponential random graph (p*) models for social networks. Soc Netw 29(2):173–191
Article
Google Scholar
Rodríguez JA (2005) The March 11th terrorist network: in its weakness lies its strength. EPP-LEA working papers
Sageman M (2004) Understanding terror networks. University of Pennsylvania Press, Philadelphia
Book
Google Scholar
Sageman M (2008) The next generation of terror. Foreign Policy 165:37–42
Google Scholar
Schaefer DR, Marcum CS (2018) Modeling network dynamics. SocArXiv https://doi.org/10.17605/osf.io/6rm9q
Schaefer DR, Simpkins SD, Vest AE, Price CD (2011) The contributions of extracurricular activities to adolescent friendships: new insights through social network analysis. Dev Psychol 47(4):1141–1152
Article
Google Scholar
Simmel G (1906) The sociology of secrecy and of secret societies. Am J Sociol 11(4):441–498
Article
Google Scholar
Snijders TAB, Baerveldt C (2003) A multilevel network study of the effects of delinquent behavior on friendship evolution. J Math Sociol 27(2–3):123–151
Article
Google Scholar
Snijders TAB, Pattison PA, Robins GL, Handcock MS (2006) New specifications for exponential random graph models. Sociol Methodol 36(1):99–153
Article
Google Scholar
Snijders TAB, van de Bunt GG, Steglich CEG (2010) Introduction to stochastic actor-based models for network dynamics. Soc Netw 32(1):44–60
Article
Google Scholar
Steglich C, Snijders TAB, Pearson M (2010) Dynamic networks and behavior: separating selection from influence. Sociol Methodol 40:329–393
Article
Google Scholar
Stevenson R, Crossley N (2014) Change in covert movement networks: the ‘inner circle’ of the Provisional Irish Republican Army. Soc Mov Stud 13(1):70–91
Article
Google Scholar
Stohl C, Stohl M (2007) Networks of terror: theoretical assumptions and pragmatic consequences. Commun Theor 17(2):93–124
Article
Google Scholar
Ünal MC (2019) Do terrorists make a difference in criminal networks? An empirical analysis on illicit drug and narco-terror networks in the prioritization between security and efficiency. Soc Netw 57:1–17
Article
Google Scholar
Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge
Book
Google Scholar
Watts DJ, Strogatz SH (1998) Collective dynamics of ‘small-world’ networks. Nature 393(4):440–442
Article
Google Scholar
Weerman FM (2011) Delinquent peers in context: a longitudinal network analysis of selection and influence effects. Criminology 49(1):253–286
Article
Google Scholar
White G, Porter MD, Mazerolle L (2013) Terrorism risk, resilience and volatility: a comparison of terrorism patterns in three southeast Asian countries. J Quant Criminol 29(2):295–320
Article
Google Scholar
Widmer ED (1999) Family contexts as cognitive networks: a structural approach of family relationships. Pers Relatsh 6(4):487–503
Article
Google Scholar
Wood G (2017) The structure and vulnerability of a drug trafficking collaboration network. Soc Netw 48:1–9
Article
Google Scholar
Yarlagadda R, Felmlee D, Verma D, Gartner S (2018) Implicit terrorist networks: a two-mode social network analysis of terrorism in India. SBP-BRiMS 2018. LNCS 10899:1–8
Google Scholar
Zech ST, Gabbay M (2016) Social network analysis in the study of terrorism and insurgency: from organization to politics. Int Stud Rev 18:214–243
Article
Google Scholar