Sciweavers

Share
ISI
2008
Springer

Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies

8 years 2 months ago
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analysis literature. The advantage of such automatic methods is to detect key players in terrorist networks. We illustrate the algorithm over some case studies of terrorist events that have occurred in the past. The results show great promise in detecting high value individuals.
Nasrullah Memon, Henrik Legind Larsen, David L. Hi
Added 12 Dec 2010
Updated 12 Dec 2010
Type Journal
Year 2008
Where ISI
Authors Nasrullah Memon, Henrik Legind Larsen, David L. Hicks, Nicholas Harkiolakis
Comments (0)
books