3Sparrow,M.K..The application of network analysis to criminal intelligence:An assessment of the prospects [J]. Social Networks, 1991, ( 13 ) : 251-274.
4Baker,W.E. and R.R. Faulkner.The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry [J]. American Sociological Review, 1993, (58) :837-860.
5Klerks,P..The network paradigm applied to criminal organizations:Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands [J].Connections, 2001 , (24) : 53-65.
6Valdis E. Krebs Mapping Networks of Terrorist Cells [J]. Comlections,2001, (24) :43-52.
7R.odriquez. J. A. The March 11th terrorist network: In its weakness lies its strength [R].Working paper EPP-LEA, 2005, (3). http://www.ub.es/epp/wp/11m.PDF.
8Ferenc Jordtn.Predicting target selection by terrorists:a network analysis of the 2005 London underground attacks [J].Int. J. Crifcal Infi-astructures, 2008, (4) :206-214.
9Marc Sageman. Understanding Terror Networks [M]. Philadelphia : University of Pennsylvania Press.2004,.