2020
DOI: 10.1016/j.physa.2019.123769
|View full text |Cite
|
Sign up to set email alerts
|

Identifying influential nodes of global terrorism network: A comparison for skeleton network extraction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Nevertheless, the modelling of criminal behaviours involves the analysis of the spatio-temporal patterns of the commission of the crimes [23,27]. This fact is the reason that network theory is useful for the drawing inferences on antilegislative actions and policies [18][19][20][21]23,[28][29][30][31][32][33][34][35][36][37].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, the modelling of criminal behaviours involves the analysis of the spatio-temporal patterns of the commission of the crimes [23,27]. This fact is the reason that network theory is useful for the drawing inferences on antilegislative actions and policies [18][19][20][21]23,[28][29][30][31][32][33][34][35][36][37].…”
Section: Introductionmentioning
confidence: 99%
“…Entropy has also recently been used to predict criminal behaviours [48][49][50]. Prediction involves the study of temporal networks [51,52], of particular interest in criminal investigations, because the role and/or effectiveness of the nodes usually changes in time [28,29,33,34,47,53]. High entropy of some local network properly indicates that many nodes share this property in more or less the same degree.…”
Section: Introductionmentioning
confidence: 99%
“…e source node which is terrorist can pass its impact to the target through the reachable path in network topology structure [36]. As previously tested and confirmed by [37], TPKS provides a great potential application in the context of skeleton network extraction. e reason is straightforward: TPKS is more likely to create a skeleton network from a small set of highly influential nodes.…”
Section: Influential Nodes By An Improved Topology Potentialmentioning
confidence: 75%
“…For nodes, a range of indices such as degree (Carmi et al, 2007;Kitsak et al, 2010;Siganos, Tauro, & Faloutsos, 2006), local centrality (Chen et al, 2012) and Leader Rank (Li et al, 2014;Lv et al, 2011) have been applied to identify influential nodes. Further, backbone network can be obtained by reserving the smallest possible subset of highly influential nodes and their relevant links (Malang et al, 2020). As for edges, link weights (Zhang & Zhu, 2013;Zhang et al, 2018;Zhao et al, 2014) and network motifs (Cao, Ding, & Shi, 2019) were used to extract functional backbones while edge betweenness (Kim, Noh, & Jeong, 2004) and the shortest path (Grady, Thiemann, & Brockmann, 2011;Zhang et al, 2014) were used to preserve more structural features.…”
Section: Literature Reviewmentioning
confidence: 99%