Academic Journals Database
Disseminating quality controlled scientific knowledge

A Survey on Terrorist Network Mining: Current Trends and Opportunities

ADD TO MY LIST
 
Author(s): Nisha Chaurasia | Mradul Dhakar | Akhilesh Tiwari | R. K. Gupta

Journal: International Journal of Computer Science and Engineering Survey
ISSN 0976-3252

Volume: 3;
Issue: 4;
Start page: 59;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Associations | Data mining | Social network analysis | Web traffic content.

ABSTRACT
Along with the modernization and widespread usage of Internet, the security of the mankind has become one of the major issues today. The threat of human society from the terrorists is the challenge faced dominantly. Advancement in the technology has not only helped the common people for the growth but also these inhuman people to adversely affect the society with sophisticated techniques. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed and detected. To achieve this, the law enforcement agencies are using data mining techniques as one of the effective solution. One such technique of data mining is Social network analysis which studies terrorist networks for the identification of relationships and associations that may exist between terrorist nodes. Terrorist activities can also be detected by means of analyzing Web traffic content. This paper studies social network analysis, web traffic content and explores various ways foridentifying terrorist activities.
Affiliate Program     

Tango Rapperswil
Tango Rapperswil