This list contains references from the content that can be linked to their source. For a full set of references and notes please see the PDF or HTML where available.
H. Akaike (1974–12) A new look at the statistical model identification. IEEE T. Automat. Contr. 19 (6), 716–723.
M. A. Andresen & N. Malleson (2011) Testing the stability of crime patterns: Implications for theory and policy. J. Res. Crime Delinq. 48 (1), 58–82.
C. Campbell & I. Connolly (2003) A model for the “War Against Terrorism”? Military intervention in northern Ireland and the 1970 falls curfew. J. Law Soc. 30 (3), 341–375.
P. Gao , D. Guo , K. Liao , J. J. Webb & S. L. Cutter (2013) Early detection of terrorism outbreaks using prospective space-time scan statistics. Prof. Geogr. 65 (4), 676–691.
R. A. Hegemann , E. A. Lewis & A. L. Bertozzi (2013) An “estimate & score algorithm” for simultaneous parameter estimation and reconstruction of incomplete data on social networks. Secur. Inform. 2 (1), 1–13.
N. F. Johnson
, P. Medina
, G. Zhao
, D. S. Messinger
, J. Horgan
, P. Gill
, J. C. Bohorquez
, W. Mattson
, D. Gangi
, H. Qi
, P. Manrique
, N. Velasquez
, A. Morgenstern
, E. Restrepo
, N. Johnson
, M. Spagat
& R. Zarama
) Simple mathematical law benchmarks human confrontations
. Sci. Rep. 3
S. D. Johnson
& K. J. Bowers
-04-01) The burglary as clue to the future the beginnings of prospective hot-spotting
. Eur. J. Criminol. 1 (2)
C. Lum & L. W. Kennedy (2012) Evidence-Based Counterterrorism Policy, New York: Springer Science + Business Media.
N. Memon , J. D. Farley , D. L. Hicks & T. Rosenorn (2009-08) Mathematical Methods in Counterterrorism, New York: Springer Science + Business Media.
G. O. Mohler , M. B. Short , P. J. Brantingham , F. P. Schoenberg & G. E. Tita (2011) Self-exciting point process modeling of crime. J. Am. Stat. Assoc. 106 (493), 100–108.
-03-01) Integrability of expected increments of point processes and a related random change of scale
. T. Am. Math. Soc. 165
R. Peng (2003-09) Multi-dimensional point process models in R. J. Stat. Softw. 8 (16), 1–27.
R. Stevenson & N. Crossley (2014) Change in covert social movement networks: The “inner circle'' of the provisional Irish Republican Army. Social Movement Studies 13 (1), 70–91.
A. Stomakhin , M. B. Short & A. L. Bertozzi (2011) Reconstruction of missing data in social networks based on temporal patterns of interactions. Inverse Probl. 27 (11), 1–15.
G. White , M. D. Porter & L. Mazerolle (2012) Terrorism risk, resilience and volatility: A comparison of terrorism patterns in three southeast asian countries. J. Quant. Criminol. 29 (2), 295–320.