Roy H. A. Lindelauf
Tilburg University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Roy H. A. Lindelauf.
European Journal of Operational Research | 2013
Roy H. A. Lindelauf; Herbert Hamers
The identification of key players in a terrorist organization aids in preventing attacks, the efficient allocation of surveillance measures, and the destabilization of the corresponding network. In this paper, we introduce a game theoretic approach to identify key players in terrorist networks. In particular we use the Shapley value as a measure of importance in cooperative games that are specifically designed to reflect the context of the terrorist organization at hand. The advantage of this approach is that both the structure of the terrorist network, which usually reflects a communication and interaction structure, as well as non-network features, i.e., individual based parameters such as financial means or bomb building skills, can be taken into account. The application of our methodology to the analysis results in rankings of the terrorists in the network. We illustrate our methodology through two case studies: Jemaah Islamiyah’s Bali bombing and Al Qaedas 9/11 attack, which lead to new insights in the operational networks responsible for these attacks.
Mathematical Methods in Counterterorrism | 2008
Roy H. A. Lindelauf; Peter Borm; Herbert Hamers
Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this framework is put to the test by applying it to the 2002 Jemaah Islamiyah Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is established. It is shown that the pair of individuals in the organization that should conduct the interaction that presents the highest risk to the organization, is the pair that is the least connected to the remainder of the network. Furthermore, optimal networks given a single risky interaction are approximated and compared. When choosing among a path, star and ring graph it is found that for low order graphs the path graph is best. When increasing the order of graphs under consideration a transition occurs such that the star graph becomes best. It is found that the higher the risk a single interaction presents to the covert network the later this transition from path to star graph occurs.
Siam Journal on Control and Optimization | 2008
Steven Alpern; Robbert Fokkink; Roy H. A. Lindelauf; Geert Jan Olsder
A minimizing searcher
Archive | 2011
Roy H. A. Lindelauf; Herbert Hamers
S
Social Networks | 2015
Peter Borm; Twan Burg; Herbert Hamers; Roy H. A. Lindelauf
and a maximizing hider
Handbook of Computational Approaches to Counterterrorism | 2012
Roy H. A. Lindelauf; Herbert Hamers
H
Archive | 2013
Robbert Fokkink; Roy H. A. Lindelauf
move at unit speed on a closed interval until the first (capture, or payoff) time
Archive | 2009
Steve Alpern; Robbert Fokkink; Roy H. A. Lindelauf; Geert Jan Olsder
T=\min \{ t:S(t)=H(t)\}
Archive | 2013
Steve Alpern; Robbert Fokkink; Leszek Gasieniec; Roy H. A. Lindelauf; V.S. Subrahmanian
that they meet. This zero-sum princess and monster game or less colorfully search game with mobile hider was proposed by Rufus Isaacs for general networks
Social Network Analysis and Mining | 2018
Herbert Hamers; Roy H. A. Lindelauf; Tjeerd van Campen
Q.