New framework that uses patterns and relations to understand terrorist behaviors

被引:30
作者
Tutun, Salih [1 ,2 ,4 ]
Khasawneh, Mohammad T. [2 ]
Zhuang, Jun [3 ]
机构
[1] Turkish Mil Acad, Def Sci Inst, Ankara, Turkey
[2] SUNY Binghamton, Dept Syst Sci & Ind Engn, Binghamton, NY 13902 USA
[3] SUNY Buffalo, Dept Ind & Syst Engn, Buffalo, NY USA
[4] SUNY Binghamton, Binghamton, NY 13902 USA
关键词
Link formation; Feature selection; Adaptive optimization; Networks; Decision making; Homeland security; SOCIAL NETWORK ANALYSIS; FEATURE-SELECTION; CLASSIFICATION; OPTIMIZATION; MODEL;
D O I
10.1016/j.eswa.2017.02.029
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Terrorism is a complex phenomenon with high uncertainties in user strategy. The uncertain nature of terrorism is a main challenge in the design of counter-terrorism policy. Government agencies (e.g., CIA, FBI, NSA, etc.) cannot always use social media and telecommunications to capture the intentions of terrorists because terrorists are very careful in the use of these environments to plan and prepare attacks. To address this issue, this research aims to propose a new framework by defining the useful patterns of suicide attacks to analyze the terrorist activity patterns and relations, to understand behaviors and their future moves, and finally to prevent potential terrorist attacks. In the framework, a new network model is formed, and the structure of the relations is analyzed to infer knowledge about terrorist attacks. More specifically, an Evolutionary Simulating Annealing Lasso Logistic Regression (ESALLOR) model is proposed to select key features for similarity function. Subsequently, a new weighted heterogeneous similarity function is proposed to estimate the relationships among attacks. Moreover, a graph-based outbreak detection is proposed to define hazardous places for the outbreak of violence. Experimental results demonstrate the effectiveness of our framework with high accuracy (more than 90% accuracy) for finding patterns when compared with that of actual terrorism events in 2014 and 2015. In conclusion, by using this intelligent framework, governments can understand automatically how terrorism will impact future events, and governments can control terrorists' behaviors and tactics to reduce the risk of future events. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:358 / 375
页数:18
相关论文
共 62 条
[1]  
Agarwal J., 2013, INT J COMPUTER APPL, V83
[2]   Fuzzy integrated vulnerability assessment model for critical facilities in combating the terrorism [J].
Akgun, Ilker ;
Kandakoglu, Ahmet ;
Ozok, Ahmet Fahri .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (05) :3561-3573
[3]  
[Anonymous], 2009, FINDING GROUPS DATA
[4]  
[Anonymous], 2005, P NIPS, DOI DOI 10.5555/2976248.2976254
[5]  
[Anonymous], 2002, Connections
[6]  
[Anonymous], INT J ADV RES COMPUT
[7]  
[Anonymous], 2012, ABS12023725 CORR
[8]   Feature selection and classification of hyperspectral images, with support vector machines [J].
Archibald, Rick ;
Fann, George .
IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, 2007, 4 (04) :674-677
[9]  
Arulanandam R., 2014, P 2 AUSTR WEB C, V155, P31
[10]  
Barabasi A.-L., 2014, LINKED NEW SCI NETWO