CrimeNet explorer: a framework for criminal network knowledge discovery
ACM Transactions on Information Systems (TOIS)
Criminal network analysis and visualization
Communications of the ACM - 3d hard copy
Analyzing terrorist networks: a case study of the global salafi jihad network
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
Law enforcement agencies and intelligence analysts frequently face the problems of identifying the actor importance and possible roles among a specific group of entities in a terrorist network. However, such tasks can be fairly time consuming and labor-intensive without the help of some efficient methods. In this paper we will discuss how graph structural mining is applied in the context of terrorist networks using structural measures or properties from social network analysis (SNA) research. Structural properties are determined by the graph structure of the network. These properties are used to evaluate the relationship between entities and identifying different roles. The graph structural mining concept is also demonstrated by using publicly available data on terrorists network in two ways i.e., one for identifying different roles (leaders, brokers, and outliers) known as role structural mining and other for ranking important actors known as rank structural mining. In addition to this we also illustrate how terrorist network is disrupt by knowing the actor importance in a network using rank structural mining.