The influence of secrecy on the communication structure of covert networks R Lindelauf, P Borm, H Hamers Social Networks 31 (2), 126-137, 2009 | 179 | 2009 |
Cooperative game theoretic centrality analysis of terrorist networks: The cases of jemaah islamiyah and al qaeda RHA Lindelauf, HJM Hamers, BGM Husslage European Journal of Operational Research 229 (1), 230-238, 2013 | 145 | 2013 |
Search theory S Alpern, R Fokkink, L Gasieniec, R Lindelauf, VS Subrahmanian Springer 10, 978-1, 2013 | 95 | 2013 |
A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack T van Campen, H Hamers, B Husslage, R Lindelauf Social Network Analysis and Mining 8, 1-12, 2018 | 86 | 2018 |
Understanding terrorist network topologies and their resilience against disruption R Lindelauf, P Borm, H Hamers Counterterrorism and Open Source Intelligence, 61-72, 2011 | 47 | 2011 |
The “princess and monster” game on an interval S Alpern, R Fokkink, R Lindelauf, GJ Olsder SIAM Journal on Control and Optimization 47 (3), 1178-1190, 2008 | 42 | 2008 |
Ranking terrorists in networks: A sensitivity analysis of Al Qaeda's 9/11 attack B Husslage, P Borm, T Burg, H Hamers, R Lindelauf Social Networks 42, 1-7, 2015 | 35 | 2015 |
On heterogeneous covert networks R Lindelauf, P Borm, H Hamers Mathematical methods in counterterrorism, 215-228, 2009 | 28 | 2009 |
Power grid defense against malicious cascading failure P Shakarian, H Lei, R Lindelauf arXiv preprint arXiv:1401.1086, 2014 | 24 | 2014 |
Stochastic approach to the spatial analysis of pitting corrosion and pit interaction JL De La Cruz, RHA Lindelauf, L Koene, MA Gutiérrez Electrochemistry communications 9 (2), 325-330, 2007 | 21 | 2007 |
“Stay nearby or get checked”: A Covid-19 control strategy JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink Infectious Disease Modelling 6, 36-45, 2021 | 15 | 2021 |
The application of search games to counter terrorism studies R Fokkink, R Lindelauf Handbook of computational approaches to counterterrorism, 543-557, 2012 | 14 | 2012 |
Nuclear deterrence in the algorithmic age: game theory revisited R Lindelauf NL ARMS 2, 421, 2021 | 10 | 2021 |
Design and analysis of covert networks, affiliations and projects R Lindelauf | 10 | 2011 |
" stay nearby or get checked": A covid-19 lockdown exit strategy JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink arXiv preprint arXiv:2004.06891, 2020 | 9 | 2020 |
Disclose or exploit? A game-theoretic approach to strategic decision making in cyber-warfare H Chen, Q Han, S Jajodia, R Lindelauf, VS Subrahmanian, Y Xiong IEEE Systems Journal 14 (3), 3779-3790, 2020 | 9 | 2020 |
Game theoretic centrality analysis of terrorist networks: the cases of jemaah islamiyah and al qaeda RHA Lindelauf, H Hamers, B Husslage CentER Discussion Paper Series, 2011 | 8 | 2011 |
The irresponsibility of not using AI in the military HW Meerveld, RHA Lindelauf, EO Postma, M Postma Ethics and Information Technology 25 (1), 14, 2023 | 7 | 2023 |
Timely exposure of a secret project: Which activities to monitor? B Hermans, H Hamers, R Leus, R Lindelauf Naval Research Logistics (NRL) 66 (6), 451-468, 2019 | 7 | 2019 |
One-mode projection analysis and design of covert affiliation networks R Lindelauf, P Borm, H Hamers Social Networks 34 (4), 614-622, 2012 | 7 | 2012 |