dc.contributor.author |
Gaharwar, R. D. |
|
dc.contributor.author |
Shah, D. B. |
|
dc.contributor.author |
Gaharwar, G. K. S. |
|
dc.date.accessioned |
2016-03-15T05:28:09Z |
|
dc.date.available |
2016-03-15T05:28:09Z |
|
dc.date.issued |
2015-03 |
|
dc.identifier.issn |
2319-8354 |
|
dc.identifier.uri |
http://27.109.7.66:8080/xmlui/handle/123456789/196 |
|
dc.description |
“Terrorist Network Mining: Issues and Challenges” published in proceeding of “International Journal of Advance Research in Science and Engineering, ISSN: 2319-8354, Vol.04, SI.01, March 2015, IF.1.14, Page.33-37” |
en_US |
dc.description.abstract |
Before few decades Terrorism was merely considered as a law and order problem in many countries. But due
exponential increase in the number of such organizations and their activities, they become threat for very
existence of many countries. Many of these terrorist organizations are equipped with the advance technology
based weapons. Also, it has been observed in last few decades that these terrorist organizations are
communicating and coordinating with other terrorist organizations. Traditional war methods are not equipped
to counter such an organized network of terrorist organizations and a systematic effort is greatly to study the
architecture of such terrorist networks. This paper is a small step in that direction. This paper looks at the
usefulness of Social Network Analysis and Graph Theory for decoding the structure of terrorist networks
through Terrorist Network Mining. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IJARSE |
en_US |
dc.subject |
Betweeness |
en_US |
dc.subject |
Closeness |
en_US |
dc.subject |
Graph Theory |
en_US |
dc.subject |
Prestige |
en_US |
dc.subject |
Terrorism |
en_US |
dc.subject |
Terrorist Network |
en_US |
dc.subject |
Mining |
en_US |
dc.subject |
Social Network Analysis |
en_US |
dc.title |
Terrorist network mining: issues and challenges |
en_US |
dc.type |
Article |
en_US |