{"title":"Finding key nodes on terrorist networks through k-shell based on structural hole","authors":"Zhichao Liang, Boan Tong, Hui Liu, Bao Jin","doi":"10.1109/AINIT54228.2021.00015","DOIUrl":null,"url":null,"abstract":"Terrorist attacks do great harm to the economic and social development. Structural perspective provides an explanatory framework for the activities of terrorist organizations which are social network structure. Network centrality are used to to identify key nodes in terrorist organizations. Existing researches often neglect the optimization of centrality indicators by structural holes. By considering structural holes that local factors impact on the overall network. We propose an k-shell based on structural hole method to find key nodes. We conducted experiments on three open source data sets of terrorist organization networks. Compare with the traditional centrality index to prove the effectiveness and accuracy of the algorithm proposed in this paper. The results show that, with the proximity of the center algorithm of the center compared to the number of dielectric, eigenvector centrality, hollow structure and algorithms k-shell value algorithm, the better the improvement in recognition accuracy and discrimination results. The algorithm can be used to identify key nodes in terrorist organizations and provide feasible methods for analyzing and combating terrorist organizations.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINIT54228.2021.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Terrorist attacks do great harm to the economic and social development. Structural perspective provides an explanatory framework for the activities of terrorist organizations which are social network structure. Network centrality are used to to identify key nodes in terrorist organizations. Existing researches often neglect the optimization of centrality indicators by structural holes. By considering structural holes that local factors impact on the overall network. We propose an k-shell based on structural hole method to find key nodes. We conducted experiments on three open source data sets of terrorist organization networks. Compare with the traditional centrality index to prove the effectiveness and accuracy of the algorithm proposed in this paper. The results show that, with the proximity of the center algorithm of the center compared to the number of dielectric, eigenvector centrality, hollow structure and algorithms k-shell value algorithm, the better the improvement in recognition accuracy and discrimination results. The algorithm can be used to identify key nodes in terrorist organizations and provide feasible methods for analyzing and combating terrorist organizations.