By Topic

Notice of Violation of IEEE Publication Principles
Harvesting Terrorists Information from Web

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Memon, N. ; Aalborg Univ., Esbjerg ; Hicks, D.L. ; Larsen, H.L.

Data collection is difficult to do in any network analysis because it is hard to create a complete network. It is not easy to gain information on terrorist networks. It is a fact that terrorist organizations do not provide information on their members and the government rarely allows researchers to use their intelligence data [1]. Very few researchers [2] [3] [4] collected data from open sources, and to the best of our knowledge, no knowledge base is available in academia for the analysis of the terrorist events. To counter the information scarcity, we at Software Intelligence Security Research Center, Aalborg University Esbjerg Denmark, designed and developed a terrorism knowledge base by harvesting information from authenticated websites. In this paper we discuss data collection and analysis results of our ongoing research of investigative data mining (IDM). In addition, we present a system architecture of our analyzing, visualizing and destabilizing terrorist networks prototype, i.e., iMiner, and also describe how we collected terrorist information using an information harvesting system.

Published in:

Information Visualization, 2007. IV '07. 11th International Conference

Date of Conference:

4-6 July 2007