This work is licensed under the Creative Commons Attribution 4.0 International License.
Asia Maritime Transparency Initiative. 2017. South China Sea features, available at: www.arcgis.com/home/item.html?id=b64a365b739c4e9aad8a1176e314aaa6 (accessed December 5, 2017).Asia Maritime Transparency Initiative.2017available at:http://www.arcgis.com/home/item.html?id=b64a365b739c4e9aad8a1176e314aaa6(accessedDecember 5, 2017)Search in Google Scholar
Asia Pacific Computerized Information System. 2017. PSC database, available at: www.tokyo-mou.org/inspections_detentions/psc_database.php (accessed May 17, 2017).Asia Pacific Computerized Information System.2017available at:http://www.tokyo-mou.org/inspections_detentions/psc_database.php(accessedMay 17, 2017)Search in Google Scholar
Baker, W. E. and Faulkner, R. R. 1993. The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. American Sociological Review 58(6): 837–60.BakerW. E.FaulknerR. R.1993The social organization of conspiracy: illegal networks in the heavy electrical equipment industry58(6)8376010.2307/2095954Search in Google Scholar
Barabási, A.-L. 2016. Network science, Cambridge University Press, Cambridge, UK.BarabásiA.-L.2016Cambridge University Press, Cambridge, UKSearch in Google Scholar
Borgatti, S. P., Everett, M. G. and Johnson, J. C. 2013. Analyzing social networks, SAGE Publications, Los Angeles, CA.BorgattiS. P.EverettM. G.JohnsonJ. C.2013SAGE Publications, Los Angeles, CASearch in Google Scholar
Burt, R. S. 1992. Structural holes: the social structure of competition, Harvard University Press, Cambridge, MA, pp. 38–40.BurtR. S.1992Harvard University PressCambridge, MA, pp.384010.4159/9780674029095Search in Google Scholar
Burt, R. S. 2005. Brokerage and closure: an introduction to social capital, Oxford University Press, Oxford.BurtR. S.2005Oxford University PressOxfordSearch in Google Scholar
Childress, D. and Taylor, J. 2012. A better way to fight IEDs. Armed Forces Journal 30: 8–11.ChildressD.TaylorJ.2012A better way to fight IEDs30:811Search in Google Scholar
Cunningham, D., Everton, S. and Murphy, P. 2016. Understanding dark networks: a strategic framework for the use of social network analysis, Rowman & Littlefield, Lanham, MD.CunninghamD.EvertonS.MurphyP.2016Rowman & Littlefield, Lanham, MDSearch in Google Scholar
Ducruet, C. and Lugo, I. 2013. Structure and dynamics of transportation networks: models, methods and applications. The SAGE Handbook of Transport Studies, Thousand Oaks, CA, pp. 347–65.DucruetC.LugoI.2013Structure and dynamics of transportation networks: models, methods and applicationspp.3476510.4135/9781446247655.n20Search in Google Scholar
Ducruet, C. and Notteboom, T. 2012. The worldwide maritime network of container shipping: spatial structure and regional dynamics. Global Networks 12(3): 395–423.DucruetC.NotteboomT.2012The worldwide maritime network of container shipping: spatial structure and regional dynamics12(3)39542310.1111/j.1471-0374.2011.00355.xSearch in Google Scholar
Ducruet, C., Rozenblat, C. and Zaidi, F. 2010. Ports in multi-level maritime networks: evidence from the Atlantic (1996–2006). Journal of Transport Geography 18(4): 508–18.DucruetC.RozenblatC.ZaidiF.2010Ports in multi-level maritime networks: evidence from the Atlantic (1996–2006)18(4)5081810.1016/j.jtrangeo.2010.03.005Search in Google Scholar
Everton, S. F. and Cunningham, D. 2014. Terrorist network adaptation to a changing environment, in Morselli, C. (Ed.), Crime and networks, Routledge, New York, NY, pp. 287–308.EvertonS. F.CunninghamD.2014Terrorist network adaptation to a changing environmentInMorselliC.(Ed.)RoutledgeNew York, NY, pp.287308Search in Google Scholar
Franzese, R. J., Hays, J. C. and Kachi, A. 2012. Modeling history dependence in network-behavior coevolution. Political Analysis 20(2): 175–90.FranzeseR. J.HaysJ. C.KachiA.2012Modeling history dependence in network-behavior coevolution20(2)1759010.1093/pan/mpr049Search in Google Scholar
Freeman, L. C. 2016. The development of social network analysis – with an emphasis on recent events, in Scott, J. and Carrington, P. J. (Eds), The SAGE handbook of social network analysis, SAGE Publications Ltd., Thousand Oaks, CA, pp. 26–39.FreemanL. C.2016The development of social network analysis – with an emphasis on recent eventsinScottJ.CarringtonP. J.(Eds)pp.2639Search in Google Scholar
Google. 2017. Google translate, available at: translate.google.com (accessed December 5, 2017).Google.2017available at:http://translate.google.com(accessed December 5, 2017)Search in Google Scholar
Granovetter, M. 1973. The strength of weak ties. American Journal of Sociology 78(6): 1360–80.GranovetterM.1973The strength of weak ties78(6)13608010.1086/225469Search in Google Scholar
Granovetter, M. 1985. Economic action and social structure: the problem of embeddedness. American Journal of Sociology 91(3): 481–510.GranovetterM.1985Economic action and social structure: the problem of embeddedness91(3)48151010.2307/j.ctv1f886rp.12Search in Google Scholar
Hanneke, S., Fu, W. and Xing, E. P. 2010. Discrete temporal models of social networks. Electronic Journal of Statistics 4: 585–605.HannekeS.FuW.XingE. P.2010Discrete temporal models of social networks458560510.1007/978-3-540-73133-7_9Search in Google Scholar
Hays, J. C., Kachi, A. and Franzese, R. J. 2010. A spatial model incorporating dynamic, endogenous network interdependence: a political science application. Statistical Methodology 7(3): 406–28.HaysJ. C.KachiA.FranzeseR. J.2010A spatial model incorporating dynamic, endogenous network interdependence: a political science application7(3)4062810.1016/j.stamet.2009.11.005Search in Google Scholar
Kadushin, C. 2012. Understanding social networks: theories, concepts, and findings, Oxford University Press, New York, NY.KadushinC.2012Oxford University PressNew York, NYSearch in Google Scholar
Kleinberg, J. M. 1999. Authoritative sources in a hyperlinked environment. Journal of the ACM 46(May 1997): 668–77.KleinbergJ. M.1999Authoritative sources in a hyperlinked environment46(May 1997)6687710.1515/9781400841356.514Search in Google Scholar
Koschade, S. 2006. A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence. Studies in Conflict and Terrorism 29(6): 559–75.KoschadeS.2006A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence29(6)5597510.1080/10576100600798418Search in Google Scholar
Krebs, V. E. 2002. Mapping networks of terrorist cells. Connections 24(3): 43–52.KrebsV. E.2002Mapping networks of terrorist cells24(3)4352Search in Google Scholar
Krivitsky, P. N. and Handcock, M. S. 2014. A separable model for dynamic networks. 2010. Journal of the Royal Statistical Society Series B 76: 29–46.KrivitskyP. N.HandcockM. S.2014A separable model for dynamic networks. 201076294610.1111/rssb.12014Search in Google Scholar
Lehmann, T. C., Rolfsen, J. A. and Clark, T. D. 2015. Predicting the trajectory of the evolving international cyber regime: simulating the growth of a social network. Social Networks 41: 72–84.LehmannT. C.RolfsenJ. A.ClarkT. D.2015Predicting the trajectory of the evolving international cyber regime: simulating the growth of a social network41728410.1016/j.socnet.2015.01.002Search in Google Scholar
LexisNexis. 2019. Lexis advance research, available at: advance.lexis.com (accessed June 27, 2019).LexisNexis.2019available at:http://advance.lexis.com(accessed June 27, 2019)Search in Google Scholar
McCulloh, I. and Carley, K. M. 2011. Detecting change in longitudinal social networks. Journal of Social Structure 12(3): 1–37, available at: www.cmu.edu/joss/content/articles/volume12/McCullohCarley.pdf.McCullohI.CarleyK. M.2011Detecting change in longitudinal social networks12(3):137available at:http://www.cmu.edu/joss/content/articles/volume12/McCullohCarley.pdf10.21307/joss-2019-031Search in Google Scholar
Marine Traffic. 2017. Marine traffic – global ship tracking intelligence, available at: www.marinetraffic.com.Marine Traffic2017available at:http://www.marinetraffic.comSearch in Google Scholar
Morselli, C. and Petit, K. 2007. Law-enforcement disruption of a drug importation network. Global Crime 8(2): 109–30.MorselliC.PetitK.2007Law-enforcement disruption of a drug importation network8(2)1093010.1007/978-0-387-09526-4_6Search in Google Scholar
National Geospatial-Intelligence Agency. 2017. World port index (Pub 150), 26th ed., Springfield, VA.National Geospatial-Intelligence Agency201726th ed.SpringfieldVASearch in Google Scholar
Prell, C. 2012. Social network analysis: history, theory & methodology, SAGE Publications, London.PrellC.2012SAGE PublicationsLondonSearch in Google Scholar
Robins, G., Snijders, T., Wang, P., Handcock, M. and Pattison, P. 2007. Recent developments in exponential random graph (p*) models for social networks. Social Networks 29(2): 192–215.RobinsG.SnijdersT.WangP.HandcockM.PattisonP.2007Recent developments in exponential random graph (p*) models for social networks29(2)19221510.1016/j.socnet.2006.08.003Search in Google Scholar
Rodrigue, J. P. and Notteboom, T. 2013. The geography of cruises: itineraries, not destinations. Applied Geography 38(1): 31–42.RodrigueJ. P.NotteboomT.2013The geography of cruises: itineraries, not destinations38(1)314210.1016/j.apgeog.2012.11.011Search in Google Scholar
Snijders, T. A. B. 2001. The statistical evaluation of social network dynamics. Sociological Methodology 31(1): 361–95.SnijdersT. A. B.2001The statistical evaluation of social network dynamics31(1)3619510.1111/0081-1750.00099Search in Google Scholar
Snijders, T. A. B. 2005. Models for longitudinal network data, in Carrington, P. J., Scott, J. and Wasserman, S. (Eds), Models and methods in social network analysis, Cambridge University Press, New York, NY, pp. 215–47.SnijdersT. A. B.2005Models for longitudinal network datainCarringtonP. J.ScottJ.WassermanS.(Eds)Cambridge University PressNew York, NY, pp.2154710.1017/CBO9780511811395.011Search in Google Scholar
Snijders, T. A. B., van de Bunt, G. G. and Steglich, C. E. G. 2010. Introduction to stochastic actor-based models for network dynamics. Social Networks 32(1): 44–60.SnijdersT. A. B.van de BuntG. G.SteglichC. E. G.2010Introduction to stochastic actor-based models for network dynamics32(1)446010.1016/j.socnet.2009.02.004Search in Google Scholar
Uzzi, B. 1997. Social structure and competition in interfirm networks: the paradox of embeddedness. Administrative Science Quarterly 42(1): 35–67.UzziB.1997Social structure and competition in interfirm networks: the paradox of embeddedness42(1)356710.4324/9780429494338-13Search in Google Scholar
Uzzi, B. 1999. Embeddedness in the making of financial capital: how social relations and networks benefit firms seeking financing. American Sociological Review 64(4): 481–505.UzziB.1999Embeddedness in the making of financial capital: how social relations and networks benefit firms seeking financing64(4)48150510.2307/j.ctv1f886rp.16Search in Google Scholar
Wallace, T. and Mesko, F. 2013. The Odessa network: mapping facilitators of Russian and Ukrainian Arms Transfers, C4IDS, available at: https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/56af8a2dd210b86520934e62/1454344757606/The+Odessa+Network.pdf (accessed January 7, 2017).WallaceT.MeskoF.2013available at:https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/56af8a2dd210b86520934e62/1454344757606/The+Odessa+Network.pdf(accessed January 7, 2017)Search in Google Scholar
Wasserman, S., Scott, J. and Carrington, P. J. 2005. Introduction, in Carrington, P. J., Scott, J. and Wasserman, S. (Eds), Models and methods in social network analysis, Cambridge University Press, Cambridge, pp. 1–7.WassermanS.ScottJ.CarringtonP. J.2005IntroductioninCarringtonP. J.ScottJ.WassermanS.(Eds)Cambridge University PressCambridge, pp.1710.1017/CBO9780511811395Search in Google Scholar
Watts, D. J. 2004. Six degrees: the science of a connected age, WW Norton, New York, NY.WattsD. J.2004WW NortonNew York, NYSearch in Google Scholar