Computing Optimal Monitoring Strategy for Detecting Terrorist Plots