Graph structural mining in terrorist networks

3Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Law enforcement agencies and intelligence analysts frequently face the problems of identifying the actor importance and possible roles among a specific group of entities in a terrorist network. However, such tasks can be fairly time consuming and labor-intensive without the help of some efficient methods. In this paper we will discuss how graph structural mining is applied in the context of terrorist networks using structural measures or properties from social network analysis (SNA) research. Structural properties are determined by the graph structure of the network. These properties are used to evaluate the relationship between entities and identifying different roles. The graph structural mining concept is also demonstrated by using publicly available data on terrorists network in two ways i.e., one for identifying different roles (leaders, brokers, and outliers) known as role structural mining and other for ranking important actors known as rank structural mining. In addition to this we also illustrate how terrorist network is disrupt by knowing the actor importance in a network using rank structural mining. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Shaikh, M. A., Wang, J., Yang, Z., & Song, Y. (2007). Graph structural mining in terrorist networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4632 LNAI, pp. 570–577). Springer Verlag. https://doi.org/10.1007/978-3-540-73871-8_54

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free