By Topic

Study on covert networks of terrorists based on interactive relationship hypothesis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Sun Duo-Yong ; Nat. Univ. of Defense Technol., Changsha, China ; Guo Shu-Quan ; Li Ben-Xian ; Liu Xiao-Peng

Rapid development of social network theory provides new perspective for the study of behavior of terrorist organizations. Due to the covertness of terrorist activities, the absence of individuals and relationships often occurs in the construction of interpersonal relationship network of terrorists using social network theory, thus affecting the effectiveness of analysis. This paper proposes a method for constructing covert terrorist networks based on interactive relationship records and combining hypothesis and inference, and carries out empirical study combining typical terrorist activities within the borders. Study results show that key figures and missing figures obtained according to analysis and evaluation of constructed networks are consistent with reality. This shows that the combination of hypothesis and inference and interpersonal relationship records is a feasible way to improve the construction of terrorist social network model.

Published in:

Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on

Date of Conference:

10-12 July 2011