Analyzing Various Social Networking Approaches for Covert Networks

被引:0
|
作者
Karthika, S. [1 ]
Bose, S. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Coll Engn Guindy, Madras 600096, Tamil Nadu, India
来源
关键词
Criminal Network Analysis (CNA); Social Network Analysis (SNA); Terrorist network; FRAMEWORK; WEB;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The world we live in is a complex socio-technical system and systematically thinking about, representing, modeling and analyzing these systems has been made possible by social network analysis approach. A lot of groups or communities do exist in the society but the terrorist network has been taken for study in this paper because they consist of networks of individuals that span countries, continents, the economic status, and form around specific ideology. In this paper we present a survey to study the terrorist network using the criminal network analysis which is based on dynamic network analysis, destabilizing covert networks, counter terrorism, key player, subgroup detection and criminal network analysis in homeland security. This paper will also discuss various open problems in this area.
引用
收藏
页码:558 / 566
页数:9
相关论文
共 50 条
  • [1] Social networks and social networking
    Smith, Peter A. C.
    LEARNING ORGANIZATION, 2009, 16 (06):
  • [2] Social networks and social networking
    Churchill, EF
    Halverson, CA
    IEEE INTERNET COMPUTING, 2005, 9 (05) : 14 - 19
  • [3] Analyzing Social Networks
    Neal, Zachary
    JOURNAL OF MATHEMATICAL SOCIOLOGY, 2015, 39 (03): : 221 - 222
  • [4] Analyzing social networks
    Teshale, Getu Ambaye
    JOURNAL OF COMMUNITY PRACTICE, 2016, 24 (03) : 353 - 355
  • [5] Analyzing Social Networks
    Hanneman, Robert
    SOCIAL NETWORKS, 2016, 46 : 101 - 102
  • [6] ANALYZING THE VARIOUS APPROACHES OF PLAIN LANGUAGE LAWS
    BOWEN, BA
    DUFFY, TM
    STEINBERG, ER
    VISIBLE LANGUAGE, 1986, 20 (02) : 155 - 165
  • [7] Collecting, Managing and Analyzing Social Networking Data Effectively
    Zhao, Zhongying
    Feng, Zheng
    Zhang, Yong
    Ning, Li
    Fan, Jiancong
    Feng, Shengzhong
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 1642 - 1646
  • [8] Analyzing Privacy Designs of Mobile Social Networking Applications
    Chen, Guanling
    Rahman, Faruq
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 83 - 88
  • [9] Novel approaches for analyzing biological networks
    Balasundaram, B
    Butenko, S
    Trukhanov, S
    JOURNAL OF COMBINATORIAL OPTIMIZATION, 2005, 10 (01) : 23 - 39
  • [10] Novel Approaches for Analyzing Biological Networks
    Balabhaskar Balasundaram
    Sergiy Butenko
    Svyatoslav Trukhanov
    Journal of Combinatorial Optimization, 2005, 10 : 23 - 39