{"id":"https://openalex.org/W2166582316","doi":"https://doi.org/10.1145/2632661.2632664","title":"Reshaping terrorist networks","display_name":"Reshaping terrorist networks","publication_year":2014,"publication_date":"2014-07-24","ids":{"openalex":"https://openalex.org/W2166582316","doi":"https://doi.org/10.1145/2632661.2632664","mag":"2166582316"},"language":"en","primary_location":{"id":"doi:10.1145/2632661.2632664","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2632661.2632664","pdf_url":null,"source":{"id":"https://openalex.org/S103482838","display_name":"Communications of the ACM","issn_l":"0001-0782","issn":["0001-0782","1557-7317"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications of the ACM","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045206246","display_name":"Francesca Spezzano","orcid":"https://orcid.org/0000-0002-0361-9728"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Francesca Spezzano","raw_affiliation_strings":["University of Maryland Institute for Advanced Computer Studies, College Park, MD"],"affiliations":[{"raw_affiliation_string":"University of Maryland Institute for Advanced Computer Studies, College Park, MD","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038645035","display_name":"V. S. Subrahmanian","orcid":"https://orcid.org/0000-0001-7191-0296"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V. S. Subrahmanian","raw_affiliation_strings":["University of Maryland, College Park, MD"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074337935","display_name":"Aaron Mannes","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aaron Mannes","raw_affiliation_strings":["University of Maryland, College Park, MD"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045206246"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":1.407,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.82486497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"57","issue":"8","first_page":"60","last_page":"69"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10211","display_name":"Computational Drug Discovery Methods","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9395999908447266,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.8189079761505127},{"id":"https://openalex.org/keywords/lethality","display_name":"Lethality","score":0.7714139223098755},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6985993981361389},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5965063571929932},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5682868957519531},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5451338887214661},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.28941407799720764},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.251084566116333},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10145536065101624},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.06697148084640503}],"concepts":[{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.8189079761505127},{"id":"https://openalex.org/C20379349","wikidata":"https://www.wikidata.org/wiki/Q1720706","display_name":"Lethality","level":2,"score":0.7714139223098755},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6985993981361389},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5965063571929932},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5682868957519531},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5451338887214661},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.28941407799720764},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.251084566116333},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10145536065101624},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.06697148084640503},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2632661.2632664","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2632661.2632664","pdf_url":null,"source":{"id":"https://openalex.org/S103482838","display_name":"Communications of the ACM","issn_l":"0001-0782","issn":["0001-0782","1557-7317"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications of the ACM","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5600000023841858}],"awards":[{"id":"https://openalex.org/G6613534130","display_name":null,"funder_award_id":"W911NF0910206","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W318870180","https://openalex.org/W416979100","https://openalex.org/W616877721","https://openalex.org/W1523225395","https://openalex.org/W1525482789","https://openalex.org/W1556026397","https://openalex.org/W1602604323","https://openalex.org/W1767515428","https://openalex.org/W1903894141","https://openalex.org/W1964409641","https://openalex.org/W1979088815","https://openalex.org/W2011087880","https://openalex.org/W2056360726","https://openalex.org/W2066636486","https://openalex.org/W2077171526","https://openalex.org/W2096183067","https://openalex.org/W2112090702","https://openalex.org/W2219845730","https://openalex.org/W2222512263","https://openalex.org/W2294153305","https://openalex.org/W3123607850","https://openalex.org/W6639897565"],"related_works":["https://openalex.org/W305282091","https://openalex.org/W2416830540","https://openalex.org/W2069069157","https://openalex.org/W2920937903","https://openalex.org/W2145660343","https://openalex.org/W4210262645","https://openalex.org/W2387122964","https://openalex.org/W1703964582","https://openalex.org/W2074604551","https://openalex.org/W1278030091"],"abstract_inverted_index":{"To":[0],"destabilize":[1],"terrorist":[2],"organizations,":[3],"the":[4],"&lt;code&gt;STONE&lt;/code&gt;":[5],"algorithms":[6],"identify":[7],"a":[8],"set":[9],"of":[10],"operatives":[11],"whose":[12],"removal":[13],"would":[14],"maximally":[15],"reduce":[16],"lethality.":[17]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
