If you made any changes in Pure these will be visible here soon.

Personal profile

Research interests

My research focuses on identifying key players in terrorist and covert networks. Both network structure and information about individual players in the network are weighted to construct rankings of the most important players in the network. To obtain such rankings centrality measures from social network analysis are combined with power indices from cooperative game theory.

Keywords

  • Game Theory
  • Operations Research
  • Network Analysis

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Latin Hypercube Design Mathematics
Maximin Mathematics
Computer Experiments Mathematics
Nested Design Mathematics
Black Box Mathematics
Bombing Engineering & Materials Science
Two Dimensions Mathematics
Design Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2003 2018

A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack

van Campen, T., Hamers, H., Husslage, B. & Lindelauf, R. Dec 2018 In : Social Network Analysis and Mining. 8, 1, 12 p., 3

Research output: Contribution to journalArticleScientificpeer-review

Open Access

A New Approximation Method for the Shapley Value Applied to the WTC 9/11 Terrorist Attack

Hamers, H., Husslage, B., Lindelauf, R. & Campen, T. 21 Nov 2016 Tilburg: CentER, Center for Economic Research, 17 p.(CentER Discussion Paper; vol. 2016-042)

Research output: Working paperDiscussion paperOther research output

File
Sampling
Game theory
Refining
Computational complexity
Costs

Sociale Netwerken

Husslage, B. 2016 Epsilon Uitgaven. 68 p. (Zebra reeks; vol. 47)

Research output: Book/ReportBookProfessional

Slag
Social Networks

Ranking terrorists in networks: A sensitivity analysis of Al Qaeda’s 9/11 attack

Husslage, B. G. M., Borm, P., Burg, T., Hamers, H. & Lindelauf, R. Jul 2015 In : Social Networks. 42, p. 1-7 7 p.

Research output: Contribution to journalArticleScientificpeer-review

ranking
surveillance
methodology
secret service
Al Qaeda

Ranking Terrorists in Networks: A Sensitivity Analysis of Al Qaeda’s 9/11 Attack

Husslage, B. G. M., Borm, P. E. M., Burg, T., Hamers, H. J. M. & Lindelauf, R. 16 Apr 2014 Tilburg: Operations research, 12 p.(CentER Discussion Paper; vol. 2014-028)

Research output: Working paperDiscussion paperOther research output

File
Sensitivity analysis
Complex networks
Decision support systems

Projects 2002 2006

Design of optimalization schemes

Husslage, B., den Hertog, D. & den Hertog, D.

1/09/021/09/06

Project: Research projectDissertation research