@folke

Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies

, , , and . Intelligence and Security Informatics, volume 5075 of Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2008)
DOI: 10.1007/978-3-540-69304-8_50

Abstract

This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analysis literature. The advantage of such automatic methods is to detect key players in terrorist networks. We illustrate the algorithm over some case studies of terrorist events that have occurred in the past. The results show great promise in detecting high value individuals.

Description

SpringerLink - Abstract

Links and resources

Tags