Abstract
Since the incident about 9.11, the Security Sectors of many countries have put great attentions on gathering and mining of crime data and establishing anti-terrorist databases. With the emergence of anti-terrorist application, data mining for anti-terrorist has attracted great attention from both researchers and officers as well as in China. The purpose of analyzing and mining related terrorist or crimes data is that analyzing of psychology, behavior and related laws about crime, and providing hidden clues to prevent a criminal case, and forecasting terror happening to keeping with crime limits.
Similar content being viewed by others
References
McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, pp. 53–94. Dartmouth Publishing, Aldershot (1999)
Watts, D.: An Experimental Study of Search in Global Social Networks. Proc. Journal of SCIENCE 301(8) (2003)
Chen, H.: Crime Data Mining: A General Framework and Some Examples. Computer 37(4) (2004)
Breiger, R.L.: The analysis of social networks. In: Hardy, M.A., Bryman, A. (eds.) Handbook of Data Analysis, pp. 505–526. Sage Publications, London (2004)
Watts, D.J., Strogatz, S.H.: Nature (London) 393, 440 (1998)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Liu, Q., Tang, C., Qiao, S., Liu, Q., Wen, F. (2007). Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_35
Download citation
DOI: https://doi.org/10.1007/978-3-540-71549-8_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71548-1
Online ISBN: 978-3-540-71549-8
eBook Packages: Computer ScienceComputer Science (R0)