THE IMPLEMENTATION OF TERRORIST WEB MINER FOR THE TERRORIST NETWORKS
نویسندگان
چکیده
منابع مشابه
Destabilizing Terrorist Networks
Most people have at least an intuitive understanding of hierarchies, how they work, and how to affect their behavior. However, covert organizations, such as terrorist organizations, have network structures that are distinct from those in typical hierarchical organizations. Their structure is distinct from the organizations that most people in western culture are used to dealing with. In particu...
متن کاملMapping Networks of Terrorist Cells
This paper looks at the difficulty in mapping covert networks. Analyzing networks after an event is fairly easy for prosecution purposes. Mapping covert networks to prevent criminal activity is much more difficult. We examine the network surrounding the tragic events of September 11th, 2001. Through public data we are able to map a portion of the network centered around the 19 dead hijackers. T...
متن کاملEfficient Algorithm for Destabilization of Terrorist Networks
The advisory feasibility of Social Network Analysis (SNA) to study social networks have encouraged the law enforcement and security agencies to investigate the terrorist network and its behavior along with key players hidden in the web. The study of the terrorist network, utilizing SNA approach and Graph Theory where the network is visualized as a graph, is termed as Investigative Data Mining o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2015
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2015.0411047