Sciweavers

Share
IJBIDM
2010

Practical algorithms for subgroup detection in covert networks

11 years 5 months ago
Practical algorithms for subgroup detection in covert networks
: In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrated in an application by a prototype system. The system finds associations between terrorist and terrorist organisations and is capable of determining links between terrorism plots occurred in the past, their affiliation with terrorist camps, travel record, funds transfer, etc. The findings are represented by a network in the form of an Attributed Relational Graph (ARG). Paths from a node to any other node in the network indicate the relationships between individuals and organisations. The system also provides assistance to law enforcement agencies, indicating when the capture of a specific terrorist will more likely destabilise the terrorist network. In this paper, we discuss the important application area related to subgroups in a terrorist cell using filtering of graph algorithms. The novelty of the algorit...
Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qure
Added 27 Jan 2011
Updated 27 Jan 2011
Type Journal
Year 2010
Where IJBIDM
Authors Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qureshi
Comments (0)
books