Understanding Terror Networks
Harvesting Terrorists Information from Web
IV '07 Proceedings of the 11th International Conference Information Visualization
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Harvesting covert networks: a case study of the iMiner database
International Journal of Networking and Virtual Organisations
Using cohesive subgroups for analyzing the evolution of the friend view mobile social network
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Social network analysis based on authorship identification for cybercrime investigation
PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
Hi-index | 0.00 |
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analysis literature. The advantage of such automatic methods is to detect key players in terrorist networks. We illustrate the algorithm over some case studies of terrorist events that have occurred in the past. The results show great promise in detecting high value individuals.