Follow
Roy Lindelauf
Roy Lindelauf
Professor of Data Science in Military Operations (NLDA), Safety & Security (TiU)
Verified email at mindef.nl
Title
Cited by
Cited by
Year
The influence of secrecy on the communication structure of covert networks
R Lindelauf, P Borm, H Hamers
Social Networks 31 (2), 126-137, 2009
1802009
Cooperative game theoretic centrality analysis of terrorist networks: The cases of jemaah islamiyah and al qaeda
RHA Lindelauf, HJM Hamers, BGM Husslage
European Journal of Operational Research 229 (1), 230-238, 2013
1492013
Search theory
S Alpern, R Fokkink, L Gasieniec, R Lindelauf, VS Subrahmanian
Springer 10, 978-1, 2013
952013
A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack
T van Campen, H Hamers, B Husslage, R Lindelauf
Social Network Analysis and Mining 8, 1-12, 2018
942018
Understanding terrorist network topologies and their resilience against disruption
R Lindelauf, P Borm, H Hamers
Counterterrorism and Open Source Intelligence, 61-72, 2011
472011
The “princess and monster” game on an interval
S Alpern, R Fokkink, R Lindelauf, GJ Olsder
SIAM Journal on Control and Optimization 47 (3), 1178-1190, 2008
432008
Ranking terrorists in networks: A sensitivity analysis of Al Qaeda's 9/11 attack
B Husslage, P Borm, T Burg, H Hamers, R Lindelauf
Social Networks 42, 1-7, 2015
352015
On heterogeneous covert networks
R Lindelauf, P Borm, H Hamers
Mathematical methods in counterterrorism, 215-228, 2009
282009
Power grid defense against malicious cascading failure
P Shakarian, H Lei, R Lindelauf
arXiv preprint arXiv:1401.1086, 2014
242014
Stochastic approach to the spatial analysis of pitting corrosion and pit interaction
JL De La Cruz, RHA Lindelauf, L Koene, MA Gutiérrez
Electrochemistry communications 9 (2), 325-330, 2007
212007
“Stay nearby or get checked”: A Covid-19 control strategy
JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink
Infectious Disease Modelling 6, 36-45, 2021
162021
The application of search games to counter terrorism studies
R Fokkink, R Lindelauf
Handbook of computational approaches to counterterrorism, 543-557, 2012
142012
Nuclear deterrence in the algorithmic age: game theory revisited
R Lindelauf
NL ARMS 2, 421, 2021
112021
Disclose or exploit? A game-theoretic approach to strategic decision making in cyber-warfare
H Chen, Q Han, S Jajodia, R Lindelauf, VS Subrahmanian, Y Xiong
IEEE Systems Journal 14 (3), 3779-3790, 2020
102020
Design and analysis of covert networks, affiliations and projects
R Lindelauf
102011
The irresponsibility of not using AI in the military
HW Meerveld, RHA Lindelauf, EO Postma, M Postma
Ethics and Information Technology 25 (1), 14, 2023
92023
" stay nearby or get checked": A covid-19 lockdown exit strategy
JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink
arXiv preprint arXiv:2004.06891, 2020
92020
Game theoretic centrality analysis of terrorist networks: the cases of jemaah islamiyah and al qaeda
RHA Lindelauf, H Hamers, B Husslage
CentER Discussion Paper Series, 2011
82011
Understanding the timing of Chinese border incursions into India
KT Greene, C Tornquist, R Fokkink, R Lindelauf, VS Subrahmanian
Humanities and Social Sciences Communications 8 (1), 1-8, 2021
72021
Timely exposure of a secret project: Which activities to monitor?
B Hermans, H Hamers, R Leus, R Lindelauf
Naval Research Logistics (NRL) 66 (6), 451-468, 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20