Terrorist Networks Analysis through Argument Driven Hypotheses Model

D. Hussain
{"title":"Terrorist Networks Analysis through Argument Driven Hypotheses Model","authors":"D. Hussain","doi":"10.1109/ARES.2007.146","DOIUrl":null,"url":null,"abstract":"Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons, events or organizations, etc. In fact these nodes could be any thing, importantly, these nodes propagate or do some thing and obviously these nodes have attributes. Social network analysis (SNA) is a multi-model multi-link problem and one can imagine the challenge posed by such multidimensional task. Typically, models represent various processes and their organization including the interaction between processes. Such types of models are intellective simulation models, explaining one particular aspect of the model abstracting other factors present in the model. The standard or normal representation of a typical social network model is through a graph data structure. The dynamics of larger social networks is so complex some time it becomes difficult to understand the various levels of interactions and dependencies just by mere representation through a graph. However, to overcome this limitation many analytical methods provide relationship dependencies, role of different nodes and their importance in the social networks. Since the start of the new century many terrorism events have occurred around the globe. These events have provided a new impetus for the analysis, investigation, studying the behavior and tracking terrorist networks (individuals). In this paper we are presenting a very novel and absolutely new approach to SNA for locating important key players in the network. The system also predicts a path through these nodes which shows the vulnerability of the network and if the path along with these nodes is removed it can reduce/destabilize or even destroy the structure of the network","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Second International Conference on Availability, Reliability and Security (ARES'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2007.146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons, events or organizations, etc. In fact these nodes could be any thing, importantly, these nodes propagate or do some thing and obviously these nodes have attributes. Social network analysis (SNA) is a multi-model multi-link problem and one can imagine the challenge posed by such multidimensional task. Typically, models represent various processes and their organization including the interaction between processes. Such types of models are intellective simulation models, explaining one particular aspect of the model abstracting other factors present in the model. The standard or normal representation of a typical social network model is through a graph data structure. The dynamics of larger social networks is so complex some time it becomes difficult to understand the various levels of interactions and dependencies just by mere representation through a graph. However, to overcome this limitation many analytical methods provide relationship dependencies, role of different nodes and their importance in the social networks. Since the start of the new century many terrorism events have occurred around the globe. These events have provided a new impetus for the analysis, investigation, studying the behavior and tracking terrorist networks (individuals). In this paper we are presenting a very novel and absolutely new approach to SNA for locating important key players in the network. The system also predicts a path through these nodes which shows the vulnerability of the network and if the path along with these nodes is removed it can reduce/destabilize or even destroy the structure of the network
基于论证驱动假设模型的恐怖主义网络分析
社会网络分析用于分析和理解网络中节点的行为已经有相当长的一段时间了。这些节点可以是个人或一组人、事件或组织等。事实上,这些节点可以是任何东西,重要的是,这些节点传播或做一些事情,显然这些节点有属性。社会网络分析(Social network analysis, SNA)是一个多模型多环节的问题,可以想象这种多维任务所带来的挑战。通常,模型表示各种过程及其组织,包括过程之间的交互。这种类型的模型是智能模拟模型,解释模型的一个特定方面,抽象模型中存在的其他因素。典型社交网络模型的标准或正常表示是通过图形数据结构。大型社交网络的动态是如此复杂,以至于有时仅仅通过图表来表示很难理解各种层次的互动和依赖关系。然而,为了克服这一局限性,许多分析方法提供了关系依赖、不同节点的作用及其在社会网络中的重要性。进入新世纪以来,全球发生了许多恐怖主义事件。这些事件为分析、调查、研究和跟踪恐怖分子网络(个人)提供了新的动力。在本文中,我们提出了一种非常新颖的SNA方法,用于定位网络中重要的关键参与者。系统还预测了通过这些节点的路径,这表明了网络的脆弱性,如果这些节点的路径被移除,它可以减少/破坏甚至破坏网络的结构
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信