首页> 外文会议>International conference on Information systems for crisis response and management in mediterranean countries >Recognizing Information Spreaders in Terrorist Networks: 26/11 Attack Case Study
【24h】

Recognizing Information Spreaders in Terrorist Networks: 26/11 Attack Case Study

机译:识别恐怖主义网络中的信息传播者:26/11攻击案例研究

获取原文

摘要

Terrorism is a man-made hazard characterized by its uncon-trollability and unpredictability. In fact, terrorist cells are covert networks where secrecy is the prime concern during the operation. To disrupt these inhuman operations, it is crucial to reveal this secrecy and identify the responsible key actors. Therefore, a new research area emerges. Investigative Data Mining (IDM) is the study of terrorist networks using Social Network Analysis (SNA). It involves graph theory to analyze networks. Among analysis techniques, network metrics defined as centrality measures have been successfully involved in terrorist networks destabilization methods. In this paper, we propose another disruption strategy of terrorist network using the percolation centrality metric. This measure allows to conduct a dynamic analysis of terrorist network on one hand. On the other hand, it identifies information spreaders in the network. We experiment on the Mumbai 26/11 attack data set, the proposed approach recognizes the information spreaders involved in this incident.
机译:恐怖主义是一种人为危险,其特征是不可控制和不可预测。实际上,恐怖分子牢房是秘密行动中的秘密网络。为了破坏这些不人道的行动,至关重要的是要揭露这种秘密并确定负责任的主要行为者。因此,出现了一个新的研究领域。调查数据挖掘(IDM)是使用社交网络分析(SNA)对恐怖分子网络进行的研究。它涉及图论来分析网络。在分析技术中,被定义为集中性措施的网络指标已成功地参与了恐怖分子网络破坏稳定的方法。在本文中,我们使用渗流集中度指标提出了另一种恐怖网络破坏策略。这种措施一方面可以对恐怖分子网络进行动态分析。另一方面,它标识网络中的信息传播器。我们对孟买26/11攻击数据集进行了试验,提出的方法可以识别此事件所涉及的信息传播者。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号