| dc.contributor.author | Gaharwar, R. D. | |
| dc.contributor.author | Shah, D. B. | |
| dc.contributor.author | Gaharwar, G. K. S. | |
| dc.date.accessioned | 2016-03-15T05:28:09Z | |
| dc.date.available | 2016-03-15T05:28:09Z | |
| dc.date.issued | 2015-03 | |
| dc.identifier.issn | 2319-8354 | |
| dc.identifier.uri | http://27.109.7.66:8080/xmlui/handle/123456789/196 | |
| dc.description | “Terrorist Network Mining: Issues and Challenges” published in proceeding of “International Journal of Advance Research in Science and Engineering, ISSN: 2319-8354, Vol.04, SI.01, March 2015, IF.1.14, Page.33-37” | en_US |
| dc.description.abstract | Before few decades Terrorism was merely considered as a law and order problem in many countries. But due exponential increase in the number of such organizations and their activities, they become threat for very existence of many countries. Many of these terrorist organizations are equipped with the advance technology based weapons. Also, it has been observed in last few decades that these terrorist organizations are communicating and coordinating with other terrorist organizations. Traditional war methods are not equipped to counter such an organized network of terrorist organizations and a systematic effort is greatly to study the architecture of such terrorist networks. This paper is a small step in that direction. This paper looks at the usefulness of Social Network Analysis and Graph Theory for decoding the structure of terrorist networks through Terrorist Network Mining. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | IJARSE | en_US |
| dc.subject | Betweeness | en_US |
| dc.subject | Closeness | en_US |
| dc.subject | Graph Theory | en_US |
| dc.subject | Prestige | en_US |
| dc.subject | Terrorism | en_US |
| dc.subject | Terrorist Network | en_US |
| dc.subject | Mining | en_US |
| dc.subject | Social Network Analysis | en_US |
| dc.title | Terrorist network mining: issues and challenges | en_US |
| dc.type | Article | en_US |