Covert Network Analysis to Detect Key Players using Correlation and Social Network Analysis

被引:2
|
作者
Farooq, Ejaz [1 ]
Khan, Shoab A. [1 ]
Butt, Wasi Haider [1 ]
机构
[1] Natl Univ Sci & Technol NUST, Dept Comp Engn, H-12, Islamabad, Pakistan
关键词
Key player; preprocessing; similarity measures; CENTRALITY;
D O I
10.1145/3018896.3025142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing terrorist events across all over the world have attracted the attention of many researchers towards counter-terrorism. This field demands from them to contribute in developing new techniques and methods for analysis, identification and prediction of terrorist events and group leaders. In this paper, we propose a model to detect key players from a network keeping focus on their communication contents. The proposed model finds correlation of communication contents of all nodes with data dictionary and detects nodes based on a threshold correlation value. A new network is drawn and its density is calculated. After that different centrality measures are applied on new network and most important nodes detected using each measure. That gives us different key players with different roles in the network. Data dictionary consists of words or terms used by the terrorist in their communication. We used Enron email data set to test and validate our proposed model.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Influence of Key Player Detection and Removal on Efficiency and Performance of Covert Networks using Social Network Analysis
    Ahmad, Aisha Zafar
    Shahjahan, Anam
    Butt, Wasi Haider
    Qamar, Usman
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMPUTER SYSTEMS, 2016, 38 : 1 - 6
  • [2] Key players in conservation diffusion: Using social network analysis to identify critical injection points
    Mbaru, Emmanuel K.
    Barnes, Michele L.
    BIOLOGICAL CONSERVATION, 2017, 210 : 222 - 232
  • [3] Identifying Key Players and Themes in Michigan Protests Through Social Network Analysis
    Nguyen, Hieu
    Gokhale, Swapna S.
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 634 - 639
  • [4] Using social network analysis to identify key players within clinical teams for improving pain management
    Desikan, Prasanna
    Banerji, Nilanjana
    Ferguson, Stacey
    Britt, Heather
    2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013), 2013, : 483 - 483
  • [5] Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier
    Butt, Wasi Haider
    Akram, M. Usman
    Khan, Shoab A.
    Javed, Muhammad Younus
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [6] How to identify key players that contribute to resilient performance: A social network analysis perspective
    Bertoni, Vanessa Becker
    Saurin, Tarcisio Abreu
    Fogliatto, Flavio Sanson
    SAFETY SCIENCE, 2022, 148
  • [7] Identifying key players in soccer teams using network analysis and pass difficulty
    McHale, Ian G.
    Relton, Samuel D.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2018, 268 (01) : 339 - 347
  • [8] Identifying sets of key players in a social network
    Borgatti S.P.
    Computational & Mathematical Organization Theory, 2006, 12 (1): : 21 - 34
  • [9] Graphs and Key Players in an Educational Social Network
    Calle-Alonso, Fernando
    Boton-Fernandez, Vicente
    de la Fuente, Dimas
    Javier Perez, Carlos
    Vega-Rodriguez, Miguel A.
    de la Mata, Daniel
    CSEDU: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED EDUCATION - VOL 2, 2019, : 523 - 527
  • [10] Network risk and key players: A structural analysis of interbank liquidity
    Denbee, Edward
    Julliard, Christian
    Li, Ye
    Yuan, Kathy
    JOURNAL OF FINANCIAL ECONOMICS, 2021, 141 (03) : 831 - 859