Covert Network Analysis to Detect Key Players using Correlation and Social Network Analysis

被引:2
作者
Farooq, Ejaz [1 ]
Khan, Shoab A. [1 ]
Butt, Wasi Haider [1 ]
机构
[1] Natl Univ Sci & Technol NUST, Dept Comp Engn, H-12, Islamabad, Pakistan
来源
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017) | 2017年
关键词
Key player; preprocessing; similarity measures; CENTRALITY;
D O I
10.1145/3018896.3025142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing terrorist events across all over the world have attracted the attention of many researchers towards counter-terrorism. This field demands from them to contribute in developing new techniques and methods for analysis, identification and prediction of terrorist events and group leaders. In this paper, we propose a model to detect key players from a network keeping focus on their communication contents. The proposed model finds correlation of communication contents of all nodes with data dictionary and detects nodes based on a threshold correlation value. A new network is drawn and its density is calculated. After that different centrality measures are applied on new network and most important nodes detected using each measure. That gives us different key players with different roles in the network. Data dictionary consists of words or terms used by the terrorist in their communication. We used Enron email data set to test and validate our proposed model.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Concept maps as network data: Analysis of a concept map using the methods of social network analysis
    McLinden, Daniel
    EVALUATION AND PROGRAM PLANNING, 2013, 36 (01) : 40 - 48
  • [12] Summarization of Documents by Finding Key Sentences Based on Social Network Analysis
    Cho, Su Gon
    Kim, Seoung Bum
    CURRENT APPROACHES IN APPLIED ARTIFICIAL INTELLIGENCE, 2015, 9101 : 285 - 292
  • [13] Investigating the Structure of the Internet of Things Patent Network Using Social Network Analysis
    Mazlumi, Seyed Hessam Hoseinizade
    Kermani, Mehrdad Agha Mohammadali
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (15) : 13458 - 13469
  • [14] Identification of key cyberbullies: A text mining and social network analysis approach
    Choi, Yoon-Jin
    Jeon, Byeong-Jin
    Kim, Hee-Woong
    TELEMATICS AND INFORMATICS, 2021, 56
  • [15] Identifying Key-Players in Online Activist Groups on the Facebook Social Network
    Nouh, Mariam
    Nurse, Jason R. C.
    2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2015, : 969 - 978
  • [16] Seaport Research: An Analysis of Research Collaboration using Social Network Analysis
    Woo, Su-Han
    Kang, Dong-Joon
    Martin, Sally
    TRANSPORT REVIEWS, 2013, 33 (04) : 460 - 475
  • [17] An overview of social network analysis
    Oliveira, Marcia
    Gama, Joao
    WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2012, 2 (02) : 99 - 115
  • [18] Social Network Analysis of EduTubers
    Pasquel-Lopez, Cynthia
    Rodriguez-Aceves, Lucia
    Valerio-Urena, Gabriel
    FRONTIERS IN EDUCATION, 2022, 7
  • [19] Analysis of the NETSCIENCE Social Network
    Li, X. B.
    Podpecan, V.
    Lavrac, N.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 456 - 459
  • [20] Analysing the correlation between social network analysis measures and performance of students in social network-based engineering education
    Putnik, Goran
    Costa, Eric
    Alves, Catia
    Castro, Helio
    Varela, Leonilde
    Shah, Vaibhav
    INTERNATIONAL JOURNAL OF TECHNOLOGY AND DESIGN EDUCATION, 2016, 26 (03) : 413 - 437