2009
DOI: 10.1504/ijssci.2009.024936
|View full text |Cite
|
Sign up to set email alerts
|

Analysing covert social network foundation behind terrorism disaster

Abstract: This paper addresses a method to analyze the covert social network foundation hidden behind the terrorism disaster. It is to solve a node discovery problem, which means to discover a node, which functions relevantly in a social network, but escaped from monitoring on the presence and mutual relationship of nodes. The method aims at integrating the expert investigator's prior understanding, insight on the terrorists' social network nature derived from the complex graph theory, and computational data processing.… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…The importance of nodes in terrorism networks was also investigated by Muhammad and Hussain [349]. An interesting finding was reported by Maeno and Ohsawa [350,351], where they proposed a method to solve the node discovery problem in complex networks. Although some previous knowledge is required, this method can be applied in terrorism networks to identify an unobserved agent behind the perpetrators of terrorist attacks.…”
Section: Terrorism Networkmentioning
confidence: 95%
“…The importance of nodes in terrorism networks was also investigated by Muhammad and Hussain [349]. An interesting finding was reported by Maeno and Ohsawa [350,351], where they proposed a method to solve the node discovery problem in complex networks. Although some previous knowledge is required, this method can be applied in terrorism networks to identify an unobserved agent behind the perpetrators of terrorist attacks.…”
Section: Terrorism Networkmentioning
confidence: 95%
“…Yoshiharu Maeno and Yukio Ohsawa [10] uses the clustering and ranking procedure along with the expert investigator's earlier understanding to evaluate the activeness of communication and calculates possibility of the suspicious inter-cluster relationships due to covert nodes between the clusters. It generates a latent structure if the above process is done iteratively.…”
Section: Node Discovery Problemmentioning
confidence: 99%
“…The method is applied to analyze the covert social network foundation behind the terrorism disasters [14].…”
Section: Related Workmentioning
confidence: 99%
“…(14). Suspiciousness means the likeliness where the covert node would appear in the data if it became overt.…”
Section: Node Discovery -Anomaly Detectionmentioning
confidence: 99%