[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis

  • Conference paper
Intelligence and Security Informatics (PAISI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4430))

Included in the following conference series:

Abstract

Since the incident about 9.11, the Security Sectors of many countries have put great attentions on gathering and mining of crime data and establishing anti-terrorist databases. With the emergence of anti-terrorist application, data mining for anti-terrorist has attracted great attention from both researchers and officers as well as in China. The purpose of analyzing and mining related terrorist or crimes data is that analyzing of psychology, behavior and related laws about crime, and providing hidden clues to prevent a criminal case, and forecasting terror happening to keeping with crime limits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, pp. 53–94. Dartmouth Publishing, Aldershot (1999)

    Google Scholar 

  2. Watts, D.: An Experimental Study of Search in Global Social Networks. Proc. Journal of SCIENCE 301(8) (2003)

    Google Scholar 

  3. Chen, H.: Crime Data Mining: A General Framework and Some Examples. Computer 37(4) (2004)

    Google Scholar 

  4. Breiger, R.L.: The analysis of social networks. In: Hardy, M.A., Bryman, A. (eds.) Handbook of Data Analysis, pp. 505–526. Sage Publications, London (2004)

    Google Scholar 

  5. Watts, D.J., Strogatz, S.H.: Nature (London) 393, 440 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Christopher C. Yang Daniel Zeng Michael Chau Kuiyu Chang Qing Yang Xueqi Cheng Jue Wang Fei-Yue Wang Hsinchun Chen

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Liu, Q., Tang, C., Qiao, S., Liu, Q., Wen, F. (2007). Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71549-8_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71548-1

  • Online ISBN: 978-3-540-71549-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics