Shaping Operations to Attack Robust Terror Networks | IEEE Conference Publication | IEEE Xplore