CHI '86 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A review and taxonomy of distortion-oriented presentation techniques
ACM Transactions on Computer-Human Interaction (TOCHI)
Communications of the ACM
Fractal views: a fractal-based method for controlling information display
ACM Transactions on Information Systems (TOIS)
Visualization of large category map for internet browsing
Decision Support Systems - Web retrieval and mining
Understanding Terror Networks
CrimeNet explorer: a framework for criminal network knowledge discovery
ACM Transactions on Information Systems (TOIS)
Criminal network analysis and visualization
Communications of the ACM - 3d hard copy
Visual Analytics for Supporting Entity Relationship Discovery on Text Data
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
SSnetViz: a visualization engine for heterogeneous semantic social networks
Proceedings of the 11th International Conference on Electronic Commerce
Social networks integration and privacy preservation using subgraph generalization
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
Analyzing and visualizing gray web forum structure
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Mining Criminal Networks from Chat Log
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Hi-index | 0.00 |
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective combating strategies against terrorism. Visualization of a network with the support of social network analysis techniques greatly facilitates the inspection of the network global structure. However, its usefulness becomes limited when the size and complexity of the network increase. In this work, we develop two interactive visualization techniques for complex terrorist social networks: fisheye views and fractal views. Both techniques facilitate the exploration of complex networks by allowing a user to select one or more focus points and dynamically adjusting the graphical layout and abstraction level to enhance the view of regions of interest. Combining the two techniques can effectively help an investigator to recognize patterns previously unreadable in the normal display due to the network complexity. Case studies are presented to illustrate how such visualization tools are capable to extract the hidden relationships among terrorists in the network through user interactions. Experiment was conducted to evaluate the performance of the visualization techniques.