Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Roy H. A. Lindelauf is active.

Publication


Featured researches published by Roy H. A. Lindelauf.


European Journal of Operational Research | 2013

Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda

Roy H. A. Lindelauf; Herbert Hamers

The identification of key players in a terrorist organization aids in preventing attacks, the efficient allocation of surveillance measures, and the destabilization of the corresponding network. In this paper, we introduce a game theoretic approach to identify key players in terrorist networks. In particular we use the Shapley value as a measure of importance in cooperative games that are specifically designed to reflect the context of the terrorist organization at hand. The advantage of this approach is that both the structure of the terrorist network, which usually reflects a communication and interaction structure, as well as non-network features, i.e., individual based parameters such as financial means or bomb building skills, can be taken into account. The application of our methodology to the analysis results in rankings of the terrorists in the network. We illustrate our methodology through two case studies: Jemaah Islamiyah’s Bali bombing and Al Qaedas 9/11 attack, which lead to new insights in the operational networks responsible for these attacks.


Mathematical Methods in Counterterorrism | 2008

On Heterogeneous Covert Networks

Roy H. A. Lindelauf; Peter Borm; Herbert Hamers

Covert organizations are constantly faced with a tradeoff between secrecy and operational efficiency. Lindelauf, Borm and Hamers (2008) developed a theoretical framework to deter- mine optimal homogeneous networks taking the above mentioned considerations explicitly into account. In this paper this framework is put to the test by applying it to the 2002 Jemaah Islamiyah Bali bombing. It is found that most aspects of this covert network can be explained by the theoretical framework. Some interactions however provide a higher risk to the network than others. The theoretical framework on covert networks is extended to accommodate for such heterogeneous interactions. Given a network structure the optimal location of one risky interaction is established. It is shown that the pair of individuals in the organization that should conduct the interaction that presents the highest risk to the organization, is the pair that is the least connected to the remainder of the network. Furthermore, optimal networks given a single risky interaction are approximated and compared. When choosing among a path, star and ring graph it is found that for low order graphs the path graph is best. When increasing the order of graphs under consideration a transition occurs such that the star graph becomes best. It is found that the higher the risk a single interaction presents to the covert network the later this transition from path to star graph occurs.


Siam Journal on Control and Optimization | 2008

The “Princess and Monster” Game on an Interval

Steven Alpern; Robbert Fokkink; Roy H. A. Lindelauf; Geert Jan Olsder

A minimizing searcher


Archive | 2011

Game Theoretic Centrality Analysis of Terrorist Networks: The Cases of Jemaah Islamiyah and Al Qaeda

Roy H. A. Lindelauf; Herbert Hamers

S


Social Networks | 2015

Ranking Terrorists in Networks: A Sensitivity Analysis of Al Qaeda's 9/11 Attack

Peter Borm; Twan Burg; Herbert Hamers; Roy H. A. Lindelauf

and a maximizing hider


Handbook of Computational Approaches to Counterterrorism | 2012

Leaderless Covert Networks: A Quantitative Approach

Roy H. A. Lindelauf; Herbert Hamers

H


Archive | 2013

The Application of Search Games to Counter Terrorism Studies

Robbert Fokkink; Roy H. A. Lindelauf

move at unit speed on a closed interval until the first (capture, or payoff) time


Archive | 2009

A numerical approach to the ‘Princess and Monster’ game on an interval

Steve Alpern; Robbert Fokkink; Roy H. A. Lindelauf; Geert Jan Olsder

T=\min \{ t:S(t)=H(t)\}


Archive | 2013

Search Theory: A Game Theoretic Perspective

Steve Alpern; Robbert Fokkink; Leszek Gasieniec; Roy H. A. Lindelauf; V.S. Subrahmanian

that they meet. This zero-sum princess and monster game or less colorfully search game with mobile hider was proposed by Rufus Isaacs for general networks


Social Network Analysis and Mining | 2018

A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack

Herbert Hamers; Roy H. A. Lindelauf; Tjeerd van Campen

Q.

Collaboration


Dive into the Roy H. A. Lindelauf's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Robbert Fokkink

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar

Geert Jan Olsder

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Steven Alpern

London School of Economics and Political Science

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge