Law enforcement agencies and intelligence analysts frequently face the problems of identifying the actor importance and possible roles among a specific group of entities in a terrorist network. However, such tasks can be fairly time consuming and labor-intensive without the help of some efficient methods. In this paper we will discuss how graph structural mining is applied in the context of terrorist networks using structural measures or properties from social network analysis (SNA) research. Structural properties are determined by the graph structure of the network. These properties are used to evaluate the relationship between entities and identifying different roles. The graph structural mining concept is also demonstrated by using publicly available data on terrorists network in two ways i.e., one for identifying different roles (leaders, brokers, and outliers) known as role structural mining and other for ranking important actors known as rank structural mining. In addition to this we also illustrate how terrorist network is disrupt by knowing the actor importance in a network using rank structural mining.
%0 Book Section
%1 shaikh2007graph
%A Shaikh, Muhammad
%A Wang, Jiaxin
%A Yang, Zehong
%A Song, Yixu
%B Advanced Data Mining and Applications
%C Berlin / Heidelberg
%D 2007
%E Alhajj, Reda
%E Gao, Hong
%E Li, Xue
%E Li, Jianzhong
%E Zaïane, Osmar
%I Springer
%K detection mining role sna
%P 570-577
%R 10.1007/978-3-540-73871-8_54
%T Graph Structural Mining in Terrorist Networks
%U http://dx.doi.org/10.1007/978-3-540-73871-8_54
%V 4632
%X Law enforcement agencies and intelligence analysts frequently face the problems of identifying the actor importance and possible roles among a specific group of entities in a terrorist network. However, such tasks can be fairly time consuming and labor-intensive without the help of some efficient methods. In this paper we will discuss how graph structural mining is applied in the context of terrorist networks using structural measures or properties from social network analysis (SNA) research. Structural properties are determined by the graph structure of the network. These properties are used to evaluate the relationship between entities and identifying different roles. The graph structural mining concept is also demonstrated by using publicly available data on terrorists network in two ways i.e., one for identifying different roles (leaders, brokers, and outliers) known as role structural mining and other for ranking important actors known as rank structural mining. In addition to this we also illustrate how terrorist network is disrupt by knowing the actor importance in a network using rank structural mining.
@incollection{shaikh2007graph,
abstract = {Law enforcement agencies and intelligence analysts frequently face the problems of identifying the actor importance and possible roles among a specific group of entities in a terrorist network. However, such tasks can be fairly time consuming and labor-intensive without the help of some efficient methods. In this paper we will discuss how graph structural mining is applied in the context of terrorist networks using structural measures or properties from social network analysis (SNA) research. Structural properties are determined by the graph structure of the network. These properties are used to evaluate the relationship between entities and identifying different roles. The graph structural mining concept is also demonstrated by using publicly available data on terrorists network in two ways i.e., one for identifying different roles (leaders, brokers, and outliers) known as role structural mining and other for ranking important actors known as rank structural mining. In addition to this we also illustrate how terrorist network is disrupt by knowing the actor importance in a network using rank structural mining.},
added-at = {2011-01-13T09:58:33.000+0100},
address = {Berlin / Heidelberg},
affiliation = {State Key Lab of Intelligent Technology and Systems, Department of Computer Science & Technology, Tsinghua University, Beijing, P.R. China},
author = {Shaikh, Muhammad and Wang, Jiaxin and Yang, Zehong and Song, Yixu},
biburl = {https://www.bibsonomy.org/bibtex/2f863d826b92cbd97afdc01dbf55fbe68/folke},
booktitle = {Advanced Data Mining and Applications},
description = {SpringerLink - Abstract},
doi = {10.1007/978-3-540-73871-8_54},
editor = {Alhajj, Reda and Gao, Hong and Li, Xue and Li, Jianzhong and Zaïane, Osmar},
interhash = {5259de42ac15092db9cb486dddc4e450},
intrahash = {f863d826b92cbd97afdc01dbf55fbe68},
keywords = {detection mining role sna},
pages = {570-577},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2011-01-13T09:58:33.000+0100},
title = {Graph Structural Mining in Terrorist Networks},
url = {http://dx.doi.org/10.1007/978-3-540-73871-8_54},
volume = 4632,
year = 2007
}