Graph structural mining in terrorist networks

被引:0
|
作者
Shaikh, Muhammad Akram [1 ]
Wang, Jiaxin [1 ]
Yang, Zehong [1 ]
Song, Yixu [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, State Key Lab Intelligent Technol & Syst, Beijing 100084, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Law enforcement agencies and intelligence analysts frequently face the problems of identifying the actor importance and possible roles among a specific group of entities in a terrorist network. However, such tasks can be fairly time consuming and labor-intensive without the help of some efficient methods. In this paper we will discuss how graph structural mining is applied in the context of terrorist networks using structural measures or properties from social network analysis (SNA) research. Structural properties are determined by the graph structure of the network. These properties are used to evaluate the relationship between entities and identifying different roles. The graph structural mining concept is also demonstrated by using publicly available data on terrorists network in two ways i.e., one for identifying different roles (leaders, brokers, and outliers) known as role structural mining and other for ranking important actors known as rank structural mining. In addition to this we also illustrate how terrorist network is disrupt by knowing the actor importance in a network using rank structural mining.
引用
收藏
页码:570 / +
页数:2
相关论文
共 50 条
  • [21] The complexity of terrorist networks
    Fellman P.V.
    International Journal of Networking and Virtual Organisations, 2011, 8 (1-2) : 4 - 14
  • [22] Destabilization of terrorist networks
    Eiselt, H. A.
    CHAOS SOLITONS & FRACTALS, 2018, 108 : 111 - 118
  • [23] The complexity of terrorist networks
    Fellman, Philip Vos
    PROCEEDINGS OF THE 12TH INTERNATIONAL INFORMATION VISUALISATION, 2008, : 338 - 340
  • [24] Connecting terrorist networks
    Magouirk, Justin
    Atran, Scott
    Sageman, Marc
    STUDIES IN CONFLICT & TERRORISM, 2008, 31 (01) : 1 - 16
  • [25] Online Structural Graph Clustering Using Frequent Subgraph Mining
    Seeland, Madeleine
    Girschick, Tobias
    Buchwald, Fabian
    Kramer, Stefan
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PT III, 2010, 6323 : 213 - 228
  • [26] Researching Terrorist Networks
    Asal, Victor
    Rethemeyer, R. Karl
    JOURNAL OF APPLIED SECURITY RESEARCH, 2006, 1 (04) : 65 - 74
  • [27] Reshaping Terrorist Networks
    Spezzano, Francesca
    Subrahmanian, V. S.
    Mannes, Aaron
    COMMUNICATIONS OF THE ACM, 2014, 57 (08) : 60 - 69
  • [28] Probabilistic Graph Model Mining User Affinity in Social Networks
    Su, Jie
    Li, Jun
    Chen, Jifeng
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2021, 18 (03) : 22 - 41
  • [29] Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach
    Jiang, Meng
    Cui, Peng
    Beutel, Alex
    Faloutsos, Christos
    Yang, Shiqiang
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2016, 10 (04)
  • [30] MULTISCALE COMMUNITY MINING IN NETWORKS USING SPECTRAL GRAPH WAVELETS
    Tremblay, Nicolas
    Borgnat, Pierre
    2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,