Roy Lindelauf
Roy Lindelauf
Professor of Data Science in Military Operations (NLDA), Safety & Security (TiU)
Verified email at
Cited by
Cited by
The influence of secrecy on the communication structure of covert networks
R Lindelauf, P Borm, H Hamers
Social Networks 31 (2), 126-137, 2009
Cooperative game theoretic centrality analysis of terrorist networks: The cases of jemaah islamiyah and al qaeda
RHA Lindelauf, HJM Hamers, BGM Husslage
European Journal of Operational Research 229 (1), 230-238, 2013
Search theory
S Alpern, R Fokkink, L Gasieniec, R Lindelauf, VS Subrahmanian
Springer 10, 978-1, 2013
A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack
T van Campen, H Hamers, B Husslage, R Lindelauf
Social Network Analysis and Mining 8, 1-12, 2018
Understanding terrorist network topologies and their resilience against disruption
R Lindelauf, P Borm, H Hamers
Counterterrorism and Open Source Intelligence, 61-72, 2011
The “princess and monster” game on an interval
S Alpern, R Fokkink, R Lindelauf, GJ Olsder
SIAM Journal on Control and Optimization 47 (3), 1178-1190, 2008
Ranking terrorists in networks: A sensitivity analysis of Al Qaeda's 9/11 attack
B Husslage, P Borm, T Burg, H Hamers, R Lindelauf
Social Networks 42, 1-7, 2015
On heterogeneous covert networks
R Lindelauf, P Borm, H Hamers
Mathematical methods in counterterrorism, 215-228, 2009
Power grid defense against malicious cascading failure
P Shakarian, H Lei, R Lindelauf
arXiv preprint arXiv:1401.1086, 2014
Stochastic approach to the spatial analysis of pitting corrosion and pit interaction
JL De La Cruz, RHA Lindelauf, L Koene, MA Gutiérrez
Electrochemistry communications 9 (2), 325-330, 2007
“Stay nearby or get checked”: A Covid-19 control strategy
JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink
Infectious Disease Modelling 6, 36-45, 2021
The application of search games to counter terrorism studies
R Fokkink, R Lindelauf
Handbook of computational approaches to counterterrorism, 543-557, 2012
Design and analysis of covert networks, affiliations and projects
R Lindelauf
Nuclear deterrence in the algorithmic age: game theory revisited
R Lindelauf
NL ARMS 2, 421, 2021
" stay nearby or get checked": A covid-19 lockdown exit strategy
JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink
arXiv preprint arXiv:2004.06891, 2020
Disclose or exploit? A game-theoretic approach to strategic decision making in cyber-warfare
H Chen, Q Han, S Jajodia, R Lindelauf, VS Subrahmanian, Y Xiong
IEEE Systems Journal 14 (3), 3779-3790, 2020
The irresponsibility of not using AI in the military
HW Meerveld, RHA Lindelauf, EO Postma, M Postma
Ethics and Information Technology 25 (1), 14, 2023
Timely exposure of a secret project: Which activities to monitor?
B Hermans, H Hamers, R Leus, R Lindelauf
Naval Research Logistics (NRL) 66 (6), 451-468, 2019
One-mode projection analysis and design of covert affiliation networks
R Lindelauf, P Borm, H Hamers
Social Networks 34 (4), 614-622, 2012
Leaderless covert networks: A quantitative approach
B Husslage, R Lindelauf, H Hamers
Handbook of Computational Approaches to Counterterrorism, 269-282, 2012
The system can't perform the operation now. Try again later.
Articles 1–20