Domain ontologies for data sharing-an example from environmental monitoring using field GIS
Computers & Geosciences - Intelligent methods for processing geodata
Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
Understanding Terror Networks
Criminal network analysis and visualization
Communications of the ACM - 3d hard copy
Identifying sets of key players in a social network
Computational & Mathematical Organization Theory
Defense and homeland security applications of multi-agent simulations
Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
Design of experiments: overview
Proceedings of the 40th Conference on Winter Simulation
Hi-index | 0.00 |
The representation of violent extremist networks (VENs) and their behaviors within social simulations is required in order to leverage models and simulations for use in attack the network course of action analysis. VENs appear throughout the world in multiple forms with varying objectives and behaviors. They exist as a subset of society, nested within and leveraging the underlying social network of a culture to further their own ends. The interdiction of these networks to presents a challenging task for law enforcement and military organizations due to their ability to change and adapt to the situation at hand. The use of social simulation with VEN representations and designed simulation experiments can provide decision makers with insights into the potential impact of their actions to attack the threat network to include the likely manner in which the VEN might adapt to counter the attack. This paper discusses the requirements to represent VENs within simulations, provides an overview of the current VEN representation within the Cultural Geography model, and provides a case study analysis of the use of social simulations for the exploration of possible futures in support of course of action analysis.