Application of Centrality Principles for Terrorist Network Role Analysis

Authors

  • R. D. Gaharwar  G. H. Patel Department of Computer Science & Technology, Sardar Patel University, Vallabh Vidyanagar, Gujarat, India
  • Prof. D. B. Shah  G. H. Patel Department of Computer Science & Technology, Sardar Patel University, Vallabh Vidyanagar, Gujarat, India

Keywords:

Data Mining, Social Network Analysis, Terrorist Networks, Terrorist Network Analysis, Centrality Principles

Abstract

Number of terrorist attacks are increasing rapidly around the globe and world is facing a constant need to strengthen counter-terror activities. Information about terrorist organizations/terrorists can be gathered by exploring internet. Enormous data on internet can be examined by sophisticated data mining tools to find useful information. Social Network Analysis tools such as Centrality Principles can be effectively used in this area. This article shows the usefulness of different centrality principles in analyzing and understanding terrorist networks.

References

  1. Gaharwar, R., Shah D., and Gaharwar, G.(2016): The Study of Multi-Search Services for Terrorist Network Mining. International Journal of Computer Applications, 147(11): 30-32.
  2. Sparrow, M.(1991): The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks 13: 251-274.
  3. Yang, X., Chau, M., Hom, A., and Chen,H.(2005): Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list. Decision Support Systems: 69-83.
  4. Memon, N. and Larsen, H.(2006): Structural Analysis and Destabilizing Terrorist Networks. In Proceeding Conference on Data Mining.
  5. Gaharwar, R., Shah D., and Gaharwar, G.(2015): Terrorist Network Mining: Issues and Challenges. International Journal of Advance Research in Science and Engineering,4(1) ; 33-37.
  6. Krebs, V.(2001) "Mapping networks of terrorist cells. Connections 24 : 43-52.
  7. Azad, S. and Gupta, A. (2011): A Quantitative Assessment on 26/11 Mumbai Attack using Social Network Analysis. Journal of Terrorism Research, 2(2).
  8. Chaurasia, N.,Dhakar, M., Tiwari, A., and Gupta, R.(2012): survey on Terrorist Network Mining: Current Trends and Opportunities. International Journal of Computer Science & Engineering Survey (IJCSES), 3(4) : 59-66
  9. Shaikh, M., and Jaixin, W.(2006): Investigative Data Mining : Identifying Key Nodes in Terrorist Networks. In Proceeding IEEE International Conference Multi Topic.
  10. Chen, H. and Xu, J.,(2005):CrimeNet Explorer : a framework for criminal network knowledge discovery. ACM Transactions on Information Systems, 23(2):201-226.
  11. Karthika, S. and Bose, S.(2011): A comperative study of social networking approaches in identifying the covert nodes. International Journal on Web Services Computing (IJWSC), 2(3), : 65-78.
  12. M. E. J. Newman(2003):The structure and function of complex networks. SIAM Review, 45:167-256.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
R. D. Gaharwar, Prof. D. B. Shah, " Application of Centrality Principles for Terrorist Network Role Analysis, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 2, pp.1216-1221, January-February-2018.