Title :
Investigative Data Mining: Identifying Key Nodes in Terrorist Networks
Author :
Shaikh, Muhammad Akram ; Jiaxin, Wang
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing
Abstract :
The concern about national security has increased significantly since the 9/11 attacks. However, information overload and lack of advanced, automated techniques hinders the effective analysis of criminal and terrorist activities. Data mining applied in the context of law enforcement and intelligence analysis, called investigative data mining (IDM), holds the promise of alleviating such problems. In this paper, we present an understanding to show how IDM works and the importance of this approach in identifying key nodes in terrorist networks.
Keywords :
data mining; national security; terrorism; investigative data mining; key node identification; terrorist networks; Computer science; Data analysis; Data mining; Data security; Drugs; Information analysis; Intelligent networks; Law enforcement; National security; Terrorism;
Conference_Titel :
Multitopic Conference, 2006. INMIC '06. IEEE
Conference_Location :
Islamabad
Print_ISBN :
1-4244-0795-8
Electronic_ISBN :
1-4244-0795-8
DOI :
10.1109/INMIC.2006.358163