Skip to main content

Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4430))

Abstract

Since the incident about 9.11, the Security Sectors of many countries have put great attentions on gathering and mining of crime data and establishing anti-terrorist databases. With the emergence of anti-terrorist application, data mining for anti-terrorist has attracted great attention from both researchers and officers as well as in China. The purpose of analyzing and mining related terrorist or crimes data is that analyzing of psychology, behavior and related laws about crime, and providing hidden clues to prevent a criminal case, and forecasting terror happening to keeping with crime limits.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. McAndrew, D.: The structural analysis of criminal networks. In: Canter, D., Alison, L. (eds.) The Social Psychology of Crime: Groups, Teams, and Networks, pp. 53–94. Dartmouth Publishing, Aldershot (1999)

    Google Scholar 

  2. Watts, D.: An Experimental Study of Search in Global Social Networks. Proc. Journal of SCIENCE 301(8) (2003)

    Google Scholar 

  3. Chen, H.: Crime Data Mining: A General Framework and Some Examples. Computer 37(4) (2004)

    Google Scholar 

  4. Breiger, R.L.: The analysis of social networks. In: Hardy, M.A., Bryman, A. (eds.) Handbook of Data Analysis, pp. 505–526. Sage Publications, London (2004)

    Google Scholar 

  5. Watts, D.J., Strogatz, S.H.: Nature (London) 393, 440 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Christopher C. Yang Daniel Zeng Michael Chau Kuiyu Chang Qing Yang Xueqi Cheng Jue Wang Fei-Yue Wang Hsinchun Chen

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Liu, Q., Tang, C., Qiao, S., Liu, Q., Wen, F. (2007). Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71549-8_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71548-1

  • Online ISBN: 978-3-540-71549-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics