Understanding Terror Networks
Practical algorithms for destabilizing terrorist networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Understanding the structure of terrorist networks
International Journal of Business Intelligence and Data Mining
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Network structure mining: locating and isolating core members in covert terrorist networks
WSEAS Transactions on Information Science and Applications
Calling communities analysis and identification using machine learning techniques
Expert Systems with Applications: An International Journal
Practical algorithms for subgroup detection in covert networks
International Journal of Business Intelligence and Data Mining
Mining online shopping patterns and communities
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Harvesting covert networks: a case study of the iMiner database
International Journal of Networking and Virtual Organisations
A fuzzy prediction model for calling communities
International Journal of Networking and Virtual Organisations
Discovering cancer biomarkers: from DNA to communities of genes
International Journal of Networking and Virtual Organisations
Parameterized algorithmics and computational experiments for finding 2-clubs
IPEC'12 Proceedings of the 7th international conference on Parameterized and Exact Computation
Hi-index | 0.00 |
This paper uses measures of structural cohesion from social network analysis (SNA) literature to discuss how to destabilize terrorist networks by visualizing participation index of various terrorists in the dataset. Structural cohesion is defined as the minimum number of terrorists, who if removed from the group, would disconnect the group. We tested bottom-up measures from SNA (cliques, n-cliques, n-clans and k-plex) using dataset of 9-11 terrorist network, and found that Mohamed Atta, who was known as ring leader of the plot, participated maximum number of groups generated by the structural cohesion measures. We discuss the results of recently introduced algorithms for constructing hierarchy of terrorist networks, so that investigators can view the structure of non-hierarchical organizations, in order to destabilize terrorist networks. Based upon the degree centrality, eigenvector centrality, and dependence centrality measures, a method is proposed to construct the hierarchical structure of complex networks. It is tested on the September 11, 2001 terrorist network constructed by Valdis Krebs. In addition we also briefly discuss various roles in the network i.e., position role index, which discovers various positions in the network, for example, leaders / brokers and followers.