DocumentCode :
2551413
Title :
Investigative Data Mining: Identifying Key Nodes in Terrorist Networks
Author :
Shaikh, Muhammad Akram ; Jiaxin, Wang
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing
fYear :
2006
fDate :
23-24 Dec. 2006
Firstpage :
201
Lastpage :
206
Abstract :
The concern about national security has increased significantly since the 9/11 attacks. However, information overload and lack of advanced, automated techniques hinders the effective analysis of criminal and terrorist activities. Data mining applied in the context of law enforcement and intelligence analysis, called investigative data mining (IDM), holds the promise of alleviating such problems. In this paper, we present an understanding to show how IDM works and the importance of this approach in identifying key nodes in terrorist networks.
Keywords :
data mining; national security; terrorism; investigative data mining; key node identification; terrorist networks; Computer science; Data analysis; Data mining; Data security; Drugs; Information analysis; Intelligent networks; Law enforcement; National security; Terrorism;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multitopic Conference, 2006. INMIC '06. IEEE
Conference_Location :
Islamabad
Print_ISBN :
1-4244-0795-8
Electronic_ISBN :
1-4244-0795-8
Type :
conf
DOI :
10.1109/INMIC.2006.358163
Filename :
4196406
Link To Document :
بازگشت