National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events. In this paper, we present a novel method to predict key players from a covert network by applying a hybrid framework. The proposed system calculates certain centrality measures for each node in the network and then applies novel hybrid classifier for detection of key players. Our system also applies anomaly detection to predict any terrorist activity in order to help law enforcement agencies to destab...
Identifying terrorism-related key actors in social media is of vital signi cance for law enforcement...
Social media are widely used among terrorists to communicate and disseminate their activities. User-...
Abstract:- Covert channels and tunneling approaches are becoming a severe threat to information secu...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
National security has gained vital importance due to increasing number of suspicious and te...
The law enforcement agencies need up-to-the minute intelligence about terrorist threats, which makes...
Knowledge about the structure and organization of terrorist networks is important for both terrorism...
The interest in analyzing loosely connected and decentralized terrorist networks of global reach has...
A sharp rise in terrorist activities has motivated many researchers to device techniques of identifi...
Law enforcement agencies across the globe have begun to focus on innovative knowledge discovery tech...
In recent days terrorism poses a threat to homeland security. The major problem faced in network ana...
Developments in statistics and computer science have influenced research on many social problems. Th...
Terrorist threat prevention and counteraction require timely detection of hostile plans. However, ad...
This study proposes a novel method for identifying the primary conspirators involved in terrorist ac...
Terrorist attacks are threats to undermine state security and citizens’ confidence. In the last year...
Identifying terrorism-related key actors in social media is of vital signi cance for law enforcement...
Social media are widely used among terrorists to communicate and disseminate their activities. User-...
Abstract:- Covert channels and tunneling approaches are becoming a severe threat to information secu...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
National security has gained vital importance due to increasing number of suspicious and te...
The law enforcement agencies need up-to-the minute intelligence about terrorist threats, which makes...
Knowledge about the structure and organization of terrorist networks is important for both terrorism...
The interest in analyzing loosely connected and decentralized terrorist networks of global reach has...
A sharp rise in terrorist activities has motivated many researchers to device techniques of identifi...
Law enforcement agencies across the globe have begun to focus on innovative knowledge discovery tech...
In recent days terrorism poses a threat to homeland security. The major problem faced in network ana...
Developments in statistics and computer science have influenced research on many social problems. Th...
Terrorist threat prevention and counteraction require timely detection of hostile plans. However, ad...
This study proposes a novel method for identifying the primary conspirators involved in terrorist ac...
Terrorist attacks are threats to undermine state security and citizens’ confidence. In the last year...
Identifying terrorism-related key actors in social media is of vital signi cance for law enforcement...
Social media are widely used among terrorists to communicate and disseminate their activities. User-...
Abstract:- Covert channels and tunneling approaches are becoming a severe threat to information secu...