2009 IEEE Aerospace Conference 2009
DOI: 10.1109/aero.2009.4839642
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition

Abstract: In this paper, we describe our approach and initial results on modeling, detection, and tracking of terrorist groups and their intents based on multimedia data. While research on automated information extraction from multimedia data has yielded significant progress in areas such as the extraction of entities, links, and events, less progress has been made in the development of automated tools for analyzing the results of information extraction to "connect the dots." Hence, our Counter-Terror Social Network Ana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…In this work (Weinstein et al 2009), the authors describe an approach and some initial results on modeling, detection, and tracking of terrorist groups and their intents based on multimedia data. In particular it describes the development and application of a new Terror Attack Description Language (TADL), which is used as a basis for modeling and simulation of terrorist attacks.…”
Section: Models and Algorithmsmentioning
confidence: 99%
“…In this work (Weinstein et al 2009), the authors describe an approach and some initial results on modeling, detection, and tracking of terrorist groups and their intents based on multimedia data. In particular it describes the development and application of a new Terror Attack Description Language (TADL), which is used as a basis for modeling and simulation of terrorist attacks.…”
Section: Models and Algorithmsmentioning
confidence: 99%
“…What makes relationship discovery more important is the fact that it provides critical information for network applications in some networks. Consider two networks as examples: the delay tolerant network (DTN) [1] and the tactical network [2]. In DTNs, each user works as a network router and disseminate the information in a storeand-forward manner.…”
Section: Introductionmentioning
confidence: 99%
“…A more complex model is applied to give improved performance in a more realistic "data poor" test condition. Such features can be important components of an overall automatic threat detection system such as the one presented in [2]. In such a system, automatic identification of individual roles and activities from basic features can help infer intent of groups and individuals through higher-level pattern recognition and social network analysis.…”
Section: Background and Motivationmentioning
confidence: 99%
“…Such a system is described in [2], where "transactions" automatically derived from multimedia content are used to build social networks and infer intent. In this context, the probability that a particular individual is a leader or that a group subscribes to a particular ideology could help in the overall "intent recognition" process.…”
Section: Significance and Impactmentioning
confidence: 99%