Behavioral profile generation for 9/11 terrorist network using efficient selection strategies

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent days terrorism poses a threat to homeland security. It's highly motivated by the "net-war" where the extremist are organized in a network structure. The major problem faced is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The nodes and links are represented in the form of a directional semantic graph where each node is related with more than one relationship with the other node. The behaviors of nodes are analyzed based on the semantic profile generated. This analysis helps the crime analyst to judge the key player for a criminal activity. The semantic profile is obtained by choosing carefully the path types that suits best for a specific node. The selection strategies can be generalized as path equivalence and constraint based. The strategy further supports the variable relaxation approach by grouping all the paths with the same sequence of relations as a single path type. This can also be made as user friendly by letting the user to represent their own preferences on the nodes and links. © 2012 Springer-Verlag GmbH.

Cite

CITATION STYLE

APA

Karthika, S., Kiruthiga, A., & Bose, S. (2012). Behavioral profile generation for 9/11 terrorist network using efficient selection strategies. In Advances in Intelligent and Soft Computing (Vol. 167 AISC, pp. 333–344). https://doi.org/10.1007/978-3-642-30111-7_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free