Finding key nodes on terrorist networks through k-shell based on structural hole | IEEE Conference Publication | IEEE Xplore