Analysis of Global Terrorist Activities Based on Social Network

被引:0
作者
Liu, Jiaqi [1 ]
Wu, Qiwu [1 ]
Liu, Xueyue [1 ]
Jiang, Lingzhi [1 ]
机构
[1] Engn Univ PAP, Xian 710086, Peoples R China
来源
PROCEEDINGS OF THE 5TH ANNUAL INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND CONTEMPORARY HUMANITY DEVELOPMENT (SSCHD 2019) | 2019年 / 376卷
基金
中国国家自然科学基金;
关键词
Social network analysis; UCINET; Terrorist incident; Anti-terrorism strategy;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In recent years, global terrorism has accelerated its transformation and has been continuously upgraded. UCINET software is used to construct the network model of "time-area" and "target-method" relationship of international terrorist events. It also analyzes the singular value, summarizes the characteristics and development trends of current terrorist incidents, and proposes corresponding strategies for the fight against terrorism under the new situation. Combined with the impact on China's anti-terrorism situation, it proposes the next step to effectively combat violent terrorist activities.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 7 条
[1]  
Gong Jingtao, 2013, INTELLIGENCE MAGAZIN, V11, P37
[2]  
Hou Xiaoni, 2015, PEOPLES LIBERATION A, V13, P1
[3]  
Li G., 2019, IEEE ACCESS, V7
[4]  
Lili Tian, 2018, SOFTWARE GUIDE, V4, P221
[5]  
Tanuja U, 2019, INT CONF COMMUN SYST, P570
[6]   Prevalent Co-visiting Patterns Mining from Location-based Social Networks [J].
Wang, Xiaoxuan ;
Wang, Lizhen ;
Yang, Peizhong .
2019 20TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2019), 2019, :581-586
[7]  
Xu F, 2017, PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), P274, DOI 10.1109/CompComm.2017.8322555