By Topic

A method for analyzing terrorist attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ibrahim Toure ; Department of Information Systems, University of Maryland Baltimore County (UMBC), 21250, USA ; Aryya Gangopadhyay

Analyzing terrorist attacks is important for homeland security. Analyses of past records can provide important information on those attacks and enable appropriate actions to prevent similar attacks in the future. In this research, we present a novel method based on Latent Dirichlet Allocation to analyze data collected by START (Study of Terrorism and Responses to Terrorism) from 1970 to 2010. The first step in our method consists of generating topic models from the data. We then identify the most frequent terms occurring across various topic distributions. Moreover, we study the evolution of different kinds of attacks that occurred over time. The results show that a distinct change in attack patterns emerges over the past four decades.

Published in:

Homeland Security (HST), 2012 IEEE Conference on Technologies for

Date of Conference:

13-15 Nov. 2012