首页> 外文会议>International Conference on Computer Science, Engineering and applications >Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies
【24h】

Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies

机译:使用有效选择策略生成9/11恐怖主义网络的行为档案

获取原文
获取外文期刊封面目录资料

摘要

In recent days terrorism poses a threat to homeland security. It's highly motivated by the "net-war" where the extremist are organized in a network structure. The major problem faced is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The nodes and links are represented in the form of a directional semantic graph where each node is related with more than one relationship with the other node. The behaviors of nodes are analyzed based on the semantic profile generated. This analysis helps the crime analyst to judge the key player for a criminal activity. The semantic profile is obtained by choosing carefully the path types that suits best for a specific node. The selection strategies can be generalized as path equivalence and constraint based. The strategy further supports the variable relaxation approach by grouping all the paths with the same sequence of relations as a single path type. This can also be made as user friendly by letting the user to represent their own preferences on the nodes and links.
机译:近年来,恐怖主义对国土安全构成威胁。这是由极端分子以网络结构组织的“网络战争”所激发的。面临的主要问题是自动识别可以最大程度地影响大型关系隐蔽网络中其他节点的关键角色。节点和链接以有向语义图的形式表示,其中每个节点与另一个节点之间的关系不只一个。根据生成的语义配置文件分析节点的行为。该分析有助于犯罪分析人员判断犯罪活动的主要参与者。通过仔细选择最适合特定节点的路径类型来获得语义配置文件。选择策略可以概括为基于路径等价和约束的。该策略通过将所有路径分组为与单个路径类型相同的关系序列,进一步支持变量松弛方法。也可以通过让用户在节点和链接上表示自己的首选项来使其对用户友好。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号