von Nasrullah Memon
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 198 03 - Diskussion Zuletzt bearbeitet: 2012-05-01 08:31:45 Hindemith | Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung, Xu and Chen 2005b |
|
|
Untersuchte Arbeit: Seite: 198, Zeilen: 3-18 |
Quelle: Xu and Chen 2005b Seite(n): 201, Zeilen: 5-15 |
---|---|
Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the
development of effective strategies to prevent terrorist attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow for the extraction of network knowledge from terrorist organizations data. To help law enforcement and intelligence agencies discover terrorist network knowledge efficiently and effectively, in this research we propose a framework for automated network analysis, visualization and destabilization. Based upon this framework, this project developed a system called iMiner that incorporates several advanced techniques: subgroups detection approach, discovering efficiency of a network, social network analysis methods, destabilizing strategies for terrorist networks including detection of hidden hierarchy. |
Knowledge about the structure and organization of criminal networks is important for both crime investigation and the development of effective strategies to prevent crimes. However, except for network visualization, criminal network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow extraction of network knowledge from large volumes of criminal-justice data. To help law enforcement and intelligence agencies discover criminal network knowledge efficiently and effectively, in this research we proposed a framework for automated network analysis and visualization. The framework included four stages: network creation, network partition, structural analysis, and network visualization. Based upon it, we have developed a system called CrimeNet Explorer that incorporates several advanced techniques: a concept space approach, hierarchical clustering, social network analysis methods, and multidimensional scaling. |
This is just the introduction from the major paper of Xu and Chen (2005b), in which they present their "CrimeNet Explorer" system, slightly rewritten to fit terrorist networks instead of criminal networks. The source is not named here. |
|
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120501083331