Inference approaches to constructing covert social network topologies

6Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Social network analysis techniques are being increasingly employed in counter-terrorism and counter-insurgency operations to develop an understanding of the organisation, capabilities and vulnerabilities of adversary groups. However, the covert nature of these groups makes the construction of social network topologies very challenging. An additional constraint is that such constructions often have to be made on a fast time-scale using data that has a limited shelf-life. Consequently, developing effective processes for constructing network representations from incomplete and limited data of variable quality is a topic of much current interest. Here we show how Bayesian inference techniques can be used to construct candidate network topologies and predict missing links in two different analysis scenarios. The techniques are illustrated by application to data from open-source publications. © 2009 Springer Vienna.

Cite

CITATION STYLE

APA

Rhodes, C. J. (2009). Inference approaches to constructing covert social network topologies. In Mathematical Methods in Counterterrorism (pp. 127–140). Springer Vienna. https://doi.org/10.1007/978-3-211-09442-6_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free