2006
DOI: 10.1007/11760146_29
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Terrorist Social Networks with Visualization Tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(16 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…Using visualization tools, C Yang et al [69] have explored the complex network of Terrorists to determine the network structure. They have proposed a Spring Embedded algorithm which displays the Terrorist network by optimizing the usage of 2D space.…”
Section: Clusteringmentioning
confidence: 99%
“…Using visualization tools, C Yang et al [69] have explored the complex network of Terrorists to determine the network structure. They have proposed a Spring Embedded algorithm which displays the Terrorist network by optimizing the usage of 2D space.…”
Section: Clusteringmentioning
confidence: 99%
“…These difficulties hinder previous methods. In fact, in most of the recent studies on terrorist network analysis, the terrorist network was usually viewed a statical social network created at a certain time point, without considering its growth and evolution along time axis [11,12] . By doing so, the network is analyzed only once so that some important knowledge, such as "how did the size and structure of a network evolve", is not able to be fully discovered and then clearly visualized.…”
Section: Social Network Theorymentioning
confidence: 99%
“…Unfortunately, the social network owned by individual agency may contain sensitive information. Such sensitive information is usually confidential due [19] to the privacy issue that causes the limitation on the degree of information sharing. Ideally, it is desired to share the crucial information in order to mine as much knowledge as if we have the complete information without violating the privacy.…”
Section: Introductionmentioning
confidence: 99%
“…Terrorist or criminal social networks have been proven to be useful for investigation, identifying suspects and gateways, and extracting communication patterns of terrorist or criminal organizations [5,19,20,21]. An illustration of a terrorist social network as presented in [19] is shown in Fig.…”
Section: Introductionmentioning
confidence: 99%