Graph structural mining in terrorist networks

被引:0
|
作者
Shaikh, Muhammad Akram [1 ]
Wang, Jiaxin [1 ]
Yang, Zehong [1 ]
Song, Yixu [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, State Key Lab Intelligent Technol & Syst, Beijing 100084, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Law enforcement agencies and intelligence analysts frequently face the problems of identifying the actor importance and possible roles among a specific group of entities in a terrorist network. However, such tasks can be fairly time consuming and labor-intensive without the help of some efficient methods. In this paper we will discuss how graph structural mining is applied in the context of terrorist networks using structural measures or properties from social network analysis (SNA) research. Structural properties are determined by the graph structure of the network. These properties are used to evaluate the relationship between entities and identifying different roles. The graph structural mining concept is also demonstrated by using publicly available data on terrorists network in two ways i.e., one for identifying different roles (leaders, brokers, and outliers) known as role structural mining and other for ranking important actors known as rank structural mining. In addition to this we also illustrate how terrorist network is disrupt by knowing the actor importance in a network using rank structural mining.
引用
收藏
页码:570 / +
页数:2
相关论文
共 50 条
  • [1] Structural analysis and mathematical methods for destabilizing terrorist networks using investigative data mining
    Memon, Nasrullah
    Larsen, Henrik Legind
    ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2006, 4093 : 1037 - 1048
  • [2] Graph Mining with Graph Neural Networks
    Jin, Wei
    WSDM '21: PROCEEDINGS OF THE 14TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2021, : 1119 - 1120
  • [3] A Novel Graph Analytic Approach to Monitor Terrorist Networks
    Basu, Kaustav
    Zhou, Chenyang
    Sen, Arunabha
    Goliber, Victoria Horan
    2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 1159 - 1166
  • [4] Analyzing Structure of Terrorist Networks by Using Graph Metrics
    Cinar, M. Serkan
    Genc, Burkay
    Sever, Hayri
    Raghavan, Vijay V.
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG KNOWLEDGE (IEEE ICBK 2017), 2017, : 9 - 16
  • [5] Progress of Graph Neural Networks on Complex Graph Mining
    Liu J.
    Shang X.-Q.
    Song L.-Y.
    Tan Y.-C.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (10): : 3582 - 3618
  • [6] Investigative data mining: Identifying key nodes in terrorist networks
    Shaikh, Muhammad Akram
    Wang Jiaxin
    10TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE 2006, PROCEEDINGS, 2006, : 201 - +
  • [7] Subgraph Mining for Graph Neural Networks
    Kikaj, Adem
    Marra, Giuseppe
    De Raedt, Luc
    ADVANCES IN INTELLIGENT DATA ANALYSIS XXII, PT I, IDA 2024, 2024, 14641 : 141 - 152
  • [8] Graph mining of networks from genome biology
    Chin, George, Jr.
    Nakamura, Grant C.
    Chavarria, Daniel G.
    Sofia, Heidi J.
    PROCEEDINGS OF THE 7TH IEEE INTERNATIONAL SYMPOSIUM ON BIOINFORMATICS AND BIOENGINEERING, VOLS I AND II, 2007, : 1265 - 1269
  • [9] A distributed approach for graph mining in massive networks
    Talukder, N.
    Zaki, M. J.
    DATA MINING AND KNOWLEDGE DISCOVERY, 2016, 30 (05) : 1024 - 1052
  • [10] A distributed approach for graph mining in massive networks
    N. Talukder
    M. J. Zaki
    Data Mining and Knowledge Discovery, 2016, 30 : 1024 - 1052