Abstract | ||
---|---|---|
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity OPSEC, multi relational graphs were introduced for Covert Network Analysis CNA. In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality of the nodes is analyzed based on the profile generated using enhanced selection strategies. It further justifies the findings by presenting layman understandable explanation through feature extraction and semantic rule convertors. An event that brought a worldwide attention towards terrorism is the unforgettable 9/11 disaster. The covert network involved in this attack is used as dataset for SpyNetMiner. The performance of SpyNetMiner is compared to a similar system called as UNICORN and other conventional algorithms. The results evidently show that SpyNetMiner outperforms all existing methodologies in covert network analysis. |
Year | DOI | Venue |
---|---|---|
2014 | 10.4018/ijdwm.2014010103 | IJDWM |
Keywords | Field | DocType |
tag elites,feature extraction,similar system,clandestine social networks,covert network analysis,covert network analysis cna,enhanced selection strategy,outlier analysis,conventional algorithm,existing methodology,covert network,proposed spynetminer system,operational security opsec | Data mining,Social network,Computer security,Computer science,Terrorism,Artificial intelligence,Network analysis,Homeland security,Operations security,Social network analysis,Outlier,Covert,Machine learning | Journal |
Volume | Issue | ISSN |
10 | 1 | 1548-3924 |
Citations | PageRank | References |
0 | 0.34 | 29 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
S. Karthika | 1 | 0 | 0.68 |
S. Bose | 2 | 20 | 2.89 |
A. Kannan | 3 | 195 | 25.98 |