Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3110025.3110154acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Three is The Answer: Combining Relationships to Analyze Multilayered Terrorist Networks

Published: 31 July 2017 Publication History

Abstract

In this paper we introduce a methodology to create multilayered terrorist networks, taking into account that the main challenges of the data behind the networks are incompleteness, fuzzy boundaries, and dynamic behavior. To account for these dark networks' characteristics, we use knowledge sharing communities in determining the methodology to create 3-layered networks from each of our datasets. We analyze the resulting layers of three terrorist datasets and present explanations of why three layers should be used for these models. We also use the information of just one layer, to identify the Bali 2005 attack community.

References

[1]
Valdis E Krebs. Mapping networks of terrorist cells. Connections, 24(3):43--52, 2002.
[2]
Malcolm K Sparrow. The application of network analysis to criminal intelligence: An assessment of the prospects. Social networks, 13(3):251--274, 1991.
[3]
Sean F Everton. Network topography, key players and terrorist networks. In annual conference of the Association for the Study of Economics, Religion and Culture in Washington, DC, 2009.
[4]
Sean F Everton. Disrupting dark networks. Number 34. Cambridge University Press, 2012.
[5]
Michael AP Taylor, Somenahalli VC Sekhar, and Glen M D'Este. Application of accessibility based methods for vulnerability analysis of strategic road networks. Networks and Spatial Economics, 6(3-4):267--291, 2006.
[6]
Gilles Didier, Christine Brun, and Anaïs Baudot. Identifying communities from multiplex biological networks. PeerJ, 3:1--20, 2015.
[7]
Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10):1--13, 2008.
[8]
Mark EJ Newman. Modularity and community structure in networks. Proceedings of the National Academy of Sciences, 103(23):8577--8582, 2006.
[9]
Stephen P Borgatti, Martin G Everett, and Linton C Freeman. Ucinet for Windows: Software for social network analysis. Analytic Technologies, 2002.
[10]
Günce Keziban Orman and Vincent Labatut. A comparison of community detection algorithms on artificial networks. In Discovery science, pages 242--256. Springer, 2009.
[11]
Günce Keziban Orman, Vincent Labatut, and Hocine Cherifi. On accuracy of community structure discovery algorithms. arXiv preprint arXiv:1112.4134, 2011.
[12]
LNF Ana and Anil K Jain. Robust data clustering. In Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on, volume 2, pages II--128. IEEE, 2003.
[13]
Alexander Strehl, Joydeep Ghosh, and Raymond Mooney. Impact of similarity measures on web-page clustering. In Workshop on Artificial Intelligence for Web Search (AAAI 2000), pages 58--64, 2000.
[14]
A Dean Forbes. Classification-algorithm evaluation: Five performance measures based onconfusion matrices. Journal of Clinical Monitoring, 11(3):189--206, 1995.
[15]
William M Rand. Objective criteria for the evaluation of clustering methods. Journal of the American Statistical association, 66(336):846--850, 1971.
[16]
Lawrence Hubert and Phipps Arabie. Comparing partitions. Journal of classification, 2(1):193--218, 1985.
[17]
Francesco Ricci, Lior Rokach, and Bracha Shapira. Introduction to recommender systems handbook. Springer, 2011.
[18]
Andrew Walker. What is Boko Haram? US Institute of Peace, Washington, DC, 2012.
[19]
Cunningham, Daniel. The Boko Haram Network. [Machine-readable data file]. https://sites.google.com/site/sfeverton18/research/appendix-1, June 2014. Online; Accessed 30 January 2017.
[20]
Gabriel Weimann. Terror on the Internet: The new arena, the new challenges. US Institute of Peace Press, Washington, DC, 2006.
[21]
Dan Cunningham, Sean Everton, Greg Wilson, Carlos Padilla, and Doug Zimmerman. Brokers and key players in the internationalization of the FARC. Studies in Conflict & Terrorism, 36(6):477--502, 2013.
[22]
Roberts, Nancy and Sean F. Everton. Terrorist Data: Noordin Top Terrorist Network. https://sites.google.com/site/sfeverton18/research/appendix-1, June 2011. Online; Accessed 30 Jan 2017.
[23]
S Jones. Terrorism in indonesia: Noordin's networks. Technical Report 114, Asia Report, 2006.
[24]
Brad Martin, Thomas Manacapilli, James C Crowley, Joseph Adams, Michael G Shanley, Paul Steinberg, and Dave Stebbins. Assessment of joint improvised explosive device defeat organization (jieddo) training activity. Technical report, DTIC Document, 2013.
[25]
Ryan Miller. Purpose-driven communities in multiplex networks: Thresholding user-engaged layer aggregation. Master's Thesis, 2016.
[26]
Scott Warnke. Partial information community detection in a multi-layered network. Master's Thesis, 2016.

Cited By

View all
  • (2021)A Review of Research in Illicit Supply-Chain Networks and New Directions to Thwart themIISE Transactions10.1080/24725854.2021.1939466(1-59)Online publication date: 9-Jun-2021
  • (2020)Uncovering the internal structure of Boko Haram through its mobility patternsApplied Network Science10.1007/s41109-020-00264-45:1Online publication date: 16-Jun-2020
  • (2018)Now You See Me: Identifying Duplicate Network Personas2018 European Intelligence and Security Informatics Conference (EISIC)10.1109/EISIC.2018.00012(23-30)Online publication date: Oct-2018
  • Show More Cited By
  1. Three is The Answer: Combining Relationships to Analyze Multilayered Terrorist Networks

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017
      July 2017
      698 pages
      ISBN:9781450349932
      DOI:10.1145/3110025
      Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 July 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ASONAM '17
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 116 of 549 submissions, 21%

      Upcoming Conference

      KDD '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)A Review of Research in Illicit Supply-Chain Networks and New Directions to Thwart themIISE Transactions10.1080/24725854.2021.1939466(1-59)Online publication date: 9-Jun-2021
      • (2020)Uncovering the internal structure of Boko Haram through its mobility patternsApplied Network Science10.1007/s41109-020-00264-45:1Online publication date: 16-Jun-2020
      • (2018)Now You See Me: Identifying Duplicate Network Personas2018 European Intelligence and Security Informatics Conference (EISIC)10.1109/EISIC.2018.00012(23-30)Online publication date: Oct-2018
      • (2018)Discovering and Leveraging Communities in Dark Multi-Layered Networks for Network Disruption2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)10.1109/ASONAM.2018.8508309(1152-1159)Online publication date: Aug-2018
      • (2018)Sampling dark networks to locate people of interestSocial Network Analysis and Mining10.1007/s13278-018-0487-08:1Online publication date: 3-Mar-2018
      • (2017)A Generative Model for the Layers of Terrorist NetworksProceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201710.1145/3110025.3110153(690-697)Online publication date: 31-Jul-2017

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media