How Members of Covert Networks Conceal the Identities of Their Leaders
Author(s) -
Marcin Waniek,
Tomasz Michalak,
Michael Wooldridge,
Talal Rahwan
Publication year - 2021
Publication title -
acm transactions on intelligent systems and technology
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.914
H-Index - 63
eISSN - 2157-6912
pISSN - 2157-6904
DOI - 10.1145/3490462
Subject(s) - betweenness centrality , centrality , covert , computer science , closeness , construct (python library) , ranking (information retrieval) , set (abstract data type) , perspective (graphical) , network science , katz centrality , network analysis , social network analysis , key (lock) , network theory , data science , computer security , artificial intelligence , complex network , world wide web , computer network , mathematics , social media , mathematical analysis , philosophy , linguistics , physics , statistics , combinatorics , quantum mechanics , programming language
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom