Follow
Roy Lindelauf
Roy Lindelauf
Assistant professor Quantitative Intelligence Analysis, NL Defence Academy
Verified email at mindef.nl
Title
Cited by
Cited by
Year
The influence of secrecy on the communication structure of covert networks
R Lindelauf, P Borm, H Hamers
Social Networks 31 (2), 126-137, 2009
1762009
Cooperative game theoretic centrality analysis of terrorist networks: The cases of jemaah islamiyah and al qaeda
RHA Lindelauf, HJM Hamers, BGM Husslage
European Journal of Operational Research 229 (1), 230-238, 2013
1392013
Search theory
S Alpern, R Fokkink, L Gasieniec, R Lindelauf, VS Subrahmanian
Springer 10, 978-1, 2013
892013
A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack
T van Campen, H Hamers, B Husslage, R Lindelauf
Social Network Analysis and Mining 8, 1-12, 2018
772018
Understanding terrorist network topologies and their resilience against disruption
R Lindelauf, P Borm, H Hamers
Counterterrorism and Open Source Intelligence, 61-72, 2011
442011
The “princess and monster” game on an interval
S Alpern, R Fokkink, R Lindelauf, GJ Olsder
SIAM Journal on Control and Optimization 47 (3), 1178-1190, 2008
432008
Ranking terrorists in networks: A sensitivity analysis of Al Qaeda's 9/11 attack
B Husslage, P Borm, T Burg, H Hamers, R Lindelauf
Social Networks 42, 1-7, 2015
332015
On heterogeneous covert networks
R Lindelauf, P Borm, H Hamers
Mathematical methods in counterterrorism, 215-228, 2009
292009
Power grid defense against malicious cascading failure
P Shakarian, H Lei, R Lindelauf
arXiv preprint arXiv:1401.1086, 2014
242014
Stochastic approach to the spatial analysis of pitting corrosion and pit interaction
JL De La Cruz, RHA Lindelauf, L Koene, MA Gutiérrez
Electrochemistry communications 9 (2), 325-330, 2007
212007
The application of search games to counter terrorism studies
R Fokkink, R Lindelauf
Handbook of computational approaches to counterterrorism, 543-557, 2012
142012
“Stay nearby or get checked”: A Covid-19 control strategy
JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink
Infectious Disease Modelling 6, 36-45, 2021
132021
Nuclear deterrence in the algorithmic age: game theory revisited
R Lindelauf
NL ARMS 2, 421, 2021
92021
" stay nearby or get checked": A covid-19 lockdown exit strategy
JT Brethouwer, A van de Rijt, R Lindelauf, R Fokkink
arXiv preprint arXiv:2004.06891, 2020
92020
Design and analysis of covert networks, affiliations and projects
R Lindelauf
92011
Disclose or exploit? A game-theoretic approach to strategic decision making in cyber-warfare
H Chen, Q Han, S Jajodia, R Lindelauf, VS Subrahmanian, Y Xiong
IEEE Systems Journal 14 (3), 3779-3790, 2020
72020
One-mode projection analysis and design of covert affiliation networks
R Lindelauf, P Borm, H Hamers
Social Networks 34 (4), 614-622, 2012
72012
Timely exposure of a secret project: Which activities to monitor?
B Hermans, H Hamers, R Leus, R Lindelauf
Naval Research Logistics (NRL) 66 (6), 451-468, 2019
62019
Leaderless covert networks: A quantitative approach
B Husslage, R Lindelauf, H Hamers
Handbook of Computational Approaches to Counterterrorism, 269-282, 2012
62012
Game theoretic centrality analysis of terrorist networks: the cases of jemaah islamiyah and al qaeda
RHA Lindelauf, H Hamers, B Husslage
CentER Discussion Paper Series, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20