Folgen
Roy Lindelauf
Roy Lindelauf
Assistant professor Quantitative Intelligence Analysis, NL Defence Academy
Bestätigte E-Mail-Adresse bei mindef.nl
Titel
Zitiert von
Zitiert von
Jahr
The influence of secrecy on the communication structure of covert networks
R Lindelauf, P Borm, H Hamers
Social Networks 31 (2), 126-137, 2009
1762009
Cooperative game theoretic centrality analysis of terrorist networks: The cases of jemaah islamiyah and al qaeda
RHA Lindelauf, HJM Hamers, BGM Husslage
European Journal of Operational Research 229 (1), 230-238, 2013
1392013
Search theory
S Alpern, R Fokkink, L Gasieniec, R Lindelauf, VS Subrahmanian
Springer 10, 978-1, 2013
892013
A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack
T van Campen, H Hamers, B Husslage, R Lindelauf
Social Network Analysis and Mining 8, 1-12, 2018
752018
Understanding terrorist network topologies and their resilience against disruption
R Lindelauf, P Borm, H Hamers
Counterterrorism and Open Source Intelligence, 61-72, 2011
442011
The “princess and monster” game on an interval
S Alpern, R Fokkink, R Lindelauf, GJ Olsder
SIAM Journal on Control and Optimization 47 (3), 1178-1190, 2008
432008
Ranking terrorists in networks: A sensitivity analysis of Al Qaeda's 9/11 attack
B Husslage, P Borm, T Burg, H Hamers, R Lindelauf
Social Networks 42, 1-7, 2015
332015
On heterogeneous covert networks
R Lindelauf, P Borm, H Hamers
Mathematical methods in counterterrorism, 215-228, 2009
292009
Power grid defense against malicious cascading failure
P Shakarian, H Lei, R Lindelauf
arXiv preprint arXiv:1401.1086, 2014
242014
Stochastic approach to the spatial analysis of pitting corrosion and pit interaction
JL De La Cruz, RHA Lindelauf, L Koene, MA Gutiérrez
Electrochemistry communications 9 (2), 325-330, 2007
212007
The application of search games to counter terrorism studies
R Fokkink, R Lindelauf
Handbook of computational approaches to counterterrorism, 543-557, 2012
142012
“Stay nearby or get checked”: A Covid-19 control strategy
JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink
Infectious Disease Modelling 6, 36-45, 2021
132021
Nuclear deterrence in the algorithmic age: game theory revisited
R Lindelauf
NL ARMS 2, 421, 2021
92021
" stay nearby or get checked": A covid-19 lockdown exit strategy
JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink
arXiv preprint arXiv:2004.06891, 2020
92020
Design and analysis of covert networks, affiliations and projects
R Lindelauf
92011
Disclose or exploit? A game-theoretic approach to strategic decision making in cyber-warfare
H Chen, Q Han, S Jajodia, R Lindelauf, VS Subrahmanian, Y Xiong
IEEE Systems Journal 14 (3), 3779-3790, 2020
72020
One-mode projection analysis and design of covert affiliation networks
R Lindelauf, P Borm, H Hamers
Social Networks 34 (4), 614-622, 2012
72012
Timely exposure of a secret project: Which activities to monitor?
B Hermans, H Hamers, R Leus, R Lindelauf
Naval Research Logistics (NRL) 66 (6), 451-468, 2019
62019
Leaderless covert networks: A quantitative approach
B Husslage, R Lindelauf, H Hamers
Handbook of Computational Approaches to Counterterrorism, 269-282, 2012
62012
Game theoretic centrality analysis of terrorist networks: the cases of jemaah islamiyah and al qaeda
RHA Lindelauf, H Hamers, B Husslage
CentER Discussion Paper Series, 2011
62011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20