Mathematical Methods in Counterterrorism 2009
DOI: 10.1007/978-3-211-09442-6_11
|View full text |Cite
|
Sign up to set email alerts
|

Security of Underground Resistance Movements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Gunther and Hartnell describe two similar network topologies in [8,9]. These topologies are built by connecting cliques of order k. 'Clique' graphs, Cl k are constructed with k + 1 cliques in which each of the k nodes within a given clique is also connected to a node within a different, unique clique.…”
Section: Gunther-hartnell Graphsmentioning
confidence: 99%
“…Gunther and Hartnell describe two similar network topologies in [8,9]. These topologies are built by connecting cliques of order k. 'Clique' graphs, Cl k are constructed with k + 1 cliques in which each of the k nodes within a given clique is also connected to a node within a different, unique clique.…”
Section: Gunther-hartnell Graphsmentioning
confidence: 99%