共 43 条
- [1] Liu D.H., Zhou T.T., Wang W.G., Sequential reciprocal game model of double standard in international anti-terrorism cooperation, Chinese Journal of Management Science, 23, pp. 301-309, (2015)
- [2] Liu S., Expert: East Turkistan is China's biggest threat international anti-terrorism alliance exists in name only
- [3] Du Y.L., Wu X., Terrorist warning mechanism under perfect wisdom urban perspective, Journal of Intelligence, 34, 7, pp. 13-17, (2015)
- [4] Li B.X., Zhang W., Mei J.M., Et al., Application of big data in counter-terrorism intelligence, Journal of Intelligence, 33, 12, pp. 1-5, (2014)
- [5] Kis-Katos K., On the origin of domestic and international terrorism, European Journal of Political Economy, 27, 6, pp. S17-S36, (2011)
- [6] Akhmat G., Zaman K., Tan S., Et al., Exploring the root causes of terrorism in South Asia: Everybody should be concerned, Quality & Quantity, 48, 6, pp. 3065-3079, (2014)
- [7] Fu J.L., Sun D.Y., Xiao J., Et al., Review of the research on the terrorist networks based on social network analysis, Systems Engineering-Theory & Practice, 33, 9, pp. 2177-2186, (2013)
- [8] Fu J.L., Xiao J., Sun D.Y., Et al., Spatial-temporal characteristics analysis of terrorist activities based on social network analysis, Systems Engineering-Theory & Practice, 35, 9, pp. 2324-2332, (2015)
- [9] Pinker E.J., An analysis of short-term responses to threats of terrorism, Management Science, 53, 6, pp. 865-880, (2007)
- [10] Chai R.R., Sun K., Chen J.F., Et al., Optimization model and application of anti-terrorist facilities location and resource scheduling under continuous terrorist attacks, Systems Engineering-Theory & Practice, 36, 2, pp. 464-472, (2016)