Use of Degree Centrality Principle in Deciding the Future Leader of the Terrorist Network

Authors

  • R. D. Gaharwar  G. H. Patel Department of Computer Science & Technology, Sardar Patel University, Vallabh Vidyanagar, Gujarat, India
  • Prof. D. B. Shah  G. H. Patel Department of Computer Science & Technology, Sardar Patel University, Vallabh Vidyanagar, Gujarat, India

Keywords:

Terrorist Network, Social Network Analysis, Centrality Principles, Degree, Role Analysis

Abstract

Terrorist activities are becoming is a World-wide phenomena, increasing the need of sophisticated tools to sharpen counter-terror activities. Internet is practically flooded with the information related to terrorist attacks but getting useful, relevant and precise information still appears to be a difficult task. Information related to terrorist is gathered with sophisticated tools, are useful only if appropriate analyzing is done. Social Network Analysis is used all-round the World to analyze such information. This article emphasis on the degree centrality principle; a graph theoretic concept, to understand such covert networks. Studies suggest that degree centrality is indication of importance of the node in the network. In this article degree of terrorist networks in Jammu and Kashmir is calculated and interpreted. In the end this paper shows the correlation of different centrality principles with each other.

References

  1. M K Sparrow, "The application of network analysis to criminal intelligence: An assessment of the prospects," Social Networks 13, pp. 251-274, 1991.
  2. U. K. Will, N. Menon and P. Karampelas, "Detecting new trends in terrorism networks," in International Conference on Advances in Social Networks Analysis and Mining, 2010.
  3. Muhammad Akram Shaikh, Wang Jaixin, (2006) "Investigative Data Mining : Identifying Key Nodes in Terrorist Networks"
  4. Gaharwar, R., Shah D., and Gaharwar, G.(2015): Terrorist Network Mining: Issues and Challenges. International Journal of Advance Research in Science and Engineering,4(1) ; 33-37.
  5. Sageman M. (2004). "Understanding Terror Networks", University of Pennsylvania Press.
  6. Memon, N. and Larsen, H.(2006): Structural Analysis and Destabilizing Terrorist Networks. In Proceeding Conference on Data Mining.
  7. Azad, S. and Gupta, A. (2011): A Quantitative Assessment on 26/11 Mumbai Attack using Social Network Analysis. Journal of Terrorism Research, 2(2).
  8. Hopkins A., "Graph Theory, Social Networks and Counter Terrorism", University of Massachusetts Dartmouth, May 2010.
  9. Nisha Chaurasia, Akhilesh Tiwari,"Efficient Algorithm for Destabilization of Terrorist Networks", IJITCS, vol.5, no.12, pp.21-30, 2013. DOI: 10.5815/ijitcs.2013.12.03
  10. Saxena S, Santhanam K. and Basu A., Application of Social Network Analysis (SNA) to Terrorist Networks in Jammu & Kashmir, Strategic Analysis/Jan-Mar 2004.
  11. Krebs, V.(2001) "Mapping networks of terrorist cells. Connections 24 : 43–52.
  12. Shaikh, M., and Jaixin, W.(2006): Investigative Data Mining : Identifying Key Nodes in Terrorist Networks. In Proceeding IEEE International Conference Multi Topic.
  13. R D Gaharwar and D B Shah. Application of Centrality Principles for Terrorist Network Role Analysis. International Journal of Scientific Research in Science and Technology(IJSRST) Vol 4 Issue 2:1216-1221, Feb 2018

Downloads

Published

2018-08-30

Issue

Section

Research Articles

How to Cite

[1]
R. D. Gaharwar, Prof. D. B. Shah, " Use of Degree Centrality Principle in Deciding the Future Leader of the Terrorist Network, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 9, pp.303-310, July-August-2018.