A comparative study of social networking approaches in identifying the covert nodes
S Bose - International Journal on Web Service Computing …, 2011 - papers.ssrn.com
This paper categories and compares various works done in the field of social networking for
covert networks. It uses criminal network analysis to categorize various approaches in social …
covert networks. It uses criminal network analysis to categorize various approaches in social …
Algorithms for the management of remote backup data bases for disaster recovery
C Mohan, K Treiber… - Proceedings of IEEE 9th …, 1993 - ieeexplore.ieee.org
A method for managing a remote backup database to provide protection from disasters that
destroy the primary database is presented. The method is general enough to accommodate …
destroy the primary database is presented. The method is general enough to accommodate …
Behavioral profile generation for 9/11 terrorist network using efficient selection strategies
In recent days terrorism poses a threat to homeland security. It's highly motivated by the “net-
war” where the extremist are organized in a network structure. The major problem faced is to …
war” where the extremist are organized in a network structure. The major problem faced is to …
Network analysis of terrorist activities
J Fu, Y Fan, Y Wang, S Wang - Journal of Systems Science and …, 2014 - Springer
This paper uses an extensive network approach to “East Turkistan” activities by building
both the one-mode and the bipartite networks for these activities. In the one-mode network …
both the one-mode and the bipartite networks for these activities. In the one-mode network …
Identifying key players in a covert network using behavioral profile
In recent day's terrorism poses a threat to homeland security. It's highly motivated by the “net-
war” where the extremist are organized in a network structure. The knowledge discovery …
war” where the extremist are organized in a network structure. The knowledge discovery …
[PDF][PDF] Dominant features identification for covert nodes in 9/11 attack using their profile
In recent days terrorism poses a threat to homeland security. The major problem faced in
network analysis is to automatically identify the key player who can maximally influence …
network analysis is to automatically identify the key player who can maximally influence …
Analyzing various social networking approaches for covert networks
The world we live in is a complex socio-technical system and systematically thinking about,
representing, modeling and analyzing these systems has been made possible by social …
representing, modeling and analyzing these systems has been made possible by social …
Research on counter-terrorism based on big data
S Nie, D Sun - 2016 IEEE International Conference on Big Data …, 2016 - ieeexplore.ieee.org
In the area of big data, people have a new perspective on counter-terrorism research. In this
paper, we have carried out a systematic research on the applications of big data in counter …
paper, we have carried out a systematic research on the applications of big data in counter …
The all-pairs vitality-maximization (VIMAX) problem
Traditional network interdiction problems focus on removing vertices or edges from a
network so as to disconnect or lengthen paths in the network; network diversion problems …
network so as to disconnect or lengthen paths in the network; network diversion problems …
Methods of tracking online community in social network
Social relationships and networking are key components of human life. Social network
analysis provides both a visual and a mathematical analysis of human relationships …
analysis provides both a visual and a mathematical analysis of human relationships …