A comparative study of social networking approaches in identifying the covert nodes

S Bose - International Journal on Web Service Computing …, 2011 - papers.ssrn.com
This paper categories and compares various works done in the field of social networking for
covert networks. It uses criminal network analysis to categorize various approaches in social …

Algorithms for the management of remote backup data bases for disaster recovery

C Mohan, K Treiber… - Proceedings of IEEE 9th …, 1993 - ieeexplore.ieee.org
A method for managing a remote backup database to provide protection from disasters that
destroy the primary database is presented. The method is general enough to accommodate …

Behavioral profile generation for 9/11 terrorist network using efficient selection strategies

S Karthika, A Kiruthiga, S Bose - … & Applications (ICCSEA 2012), May 25 …, 2012 - Springer
In recent days terrorism poses a threat to homeland security. It's highly motivated by the “net-
war” where the extremist are organized in a network structure. The major problem faced is to …

Network analysis of terrorist activities

J Fu, Y Fan, Y Wang, S Wang - Journal of Systems Science and …, 2014 - Springer
This paper uses an extensive network approach to “East Turkistan” activities by building
both the one-mode and the bipartite networks for these activities. In the one-mode network …

Identifying key players in a covert network using behavioral profile

S Karthika, A Kiruthiga, S Bose - … International Conference on …, 2012 - ieeexplore.ieee.org
In recent day's terrorism poses a threat to homeland security. It's highly motivated by the “net-
war” where the extremist are organized in a network structure. The knowledge discovery …

[PDF][PDF] Dominant features identification for covert nodes in 9/11 attack using their profile

S Karthika, A Kiruthiga, S Bose - … Journal of Network Security & Its …, 2012 - academia.edu
In recent days terrorism poses a threat to homeland security. The major problem faced in
network analysis is to automatically identify the key player who can maximally influence …

Analyzing various social networking approaches for covert networks

S Karthika, S Bose - International Conference on Web and Semantic …, 2011 - Springer
The world we live in is a complex socio-technical system and systematically thinking about,
representing, modeling and analyzing these systems has been made possible by social …

Research on counter-terrorism based on big data

S Nie, D Sun - 2016 IEEE International Conference on Big Data …, 2016 - ieeexplore.ieee.org
In the area of big data, people have a new perspective on counter-terrorism research. In this
paper, we have carried out a systematic research on the applications of big data in counter …

The all-pairs vitality-maximization (VIMAX) problem

A Paul, SE Martonosi - Annals of Operations Research, 2024 - Springer
Traditional network interdiction problems focus on removing vertices or edges from a
network so as to disconnect or lengthen paths in the network; network diversion problems …

Methods of tracking online community in social network

S Sharma, GN Purohit - Social Networking: Mining, Visualization, and …, 2014 - Springer
Social relationships and networking are key components of human life. Social network
analysis provides both a visual and a mathematical analysis of human relationships …