This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analysis literature. The advantage of such automatic methods is to detect key players in terrorist networks. We illustrate the algorithm over some case studies of terrorist events that have occurred in the past. The results show great promise in detecting high value individuals.
The European Center for Counterterrorism Research and Studies Department of Computer Science and Engineering, Aalborg University, DK-6700 Esbjerg, Denmark
%0 Book Section
%1 memon2008detecting
%A Memon, Nasrullah
%A Larsen, Henrik
%A Hicks, David
%A Harkiolakis, Nicholas
%B Intelligence and Security Informatics
%C Berlin / Heidelberg
%D 2008
%E Yang, Christopher
%E Chen, Hsinchun
%E Chau, Michael
%E Chang, Kuiyu
%E Lang, Sheau-Dong
%E Chen, Patrick
%E Hsieh, Raymond
%E Zeng, Daniel
%E Wang, Fei-Yue
%E Carley, Kathleen
%E Mao, Wenji
%E Zhan, Justin
%I Springer
%K detection hierarchy role sna terrorist
%P 477-489
%R 10.1007/978-3-540-69304-8_50
%T Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies
%U http://dx.doi.org/10.1007/978-3-540-69304-8_50
%V 5075
%X This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analysis literature. The advantage of such automatic methods is to detect key players in terrorist networks. We illustrate the algorithm over some case studies of terrorist events that have occurred in the past. The results show great promise in detecting high value individuals.
@incollection{memon2008detecting,
abstract = {This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analysis literature. The advantage of such automatic methods is to detect key players in terrorist networks. We illustrate the algorithm over some case studies of terrorist events that have occurred in the past. The results show great promise in detecting high value individuals.},
added-at = {2011-01-13T10:01:46.000+0100},
address = {Berlin / Heidelberg},
affiliation = {The European Center for Counterterrorism Research and Studies Department of Computer Science and Engineering, Aalborg University, DK-6700 Esbjerg, Denmark},
author = {Memon, Nasrullah and Larsen, Henrik and Hicks, David and Harkiolakis, Nicholas},
biburl = {https://www.bibsonomy.org/bibtex/2fc9ec73f506c6e9b8cbca26af59e190c/folke},
booktitle = {Intelligence and Security Informatics},
description = {SpringerLink - Abstract},
doi = {10.1007/978-3-540-69304-8_50},
editor = {Yang, Christopher and Chen, Hsinchun and Chau, Michael and Chang, Kuiyu and Lang, Sheau-Dong and Chen, Patrick and Hsieh, Raymond and Zeng, Daniel and Wang, Fei-Yue and Carley, Kathleen and Mao, Wenji and Zhan, Justin},
interhash = {aeac63fad1962ff76c784ad653ef6d50},
intrahash = {fc9ec73f506c6e9b8cbca26af59e190c},
keywords = {detection hierarchy role sna terrorist},
pages = {477-489},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2011-01-13T10:01:47.000+0100},
title = {Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies},
url = {http://dx.doi.org/10.1007/978-3-540-69304-8_50},
volume = 5075,
year = 2008
}