Skip to main content

Using Active Modeling in Counterterrorism

  • Conference paper
Active Conceptual Modeling of Learning (ACM-L 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4512))

Included in the following conference series:

  • 593 Accesses

Abstract

Terrorist organizations attain their goals by attacking various targets to jeopardize human lives and intimidate governments. As new terrorist attacks almost always aim to break the mold of old plots, tracing the dynamic behaviors of terrorists becomes crucial to national defense. This paper proposes using active modeling in analyzing unconventional attacks in the design of counterterrorism system. The intelligent terrorism detection system not only detects potential threats by monitoring terrorist networks with identified threat patterns, but also continually integrates new threat features in terrorist behaviors and the varying relationships among terrorists.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carley, K.: Dynamic Network Analysis. Committee on Human Factors, National Research Council, 133–145 (2003)

    Google Scholar 

  2. Krebs, V.: Mapping Networks of Terrorist Cells. Connections 24(3), 43–52 (2002)

    Google Scholar 

  3. Chen, P.P., Thalheim, B., Wong, L.Y.: Future Directions of Conceptual Modeling. In: Chen, P.P., Akoka, J., Kangassalu, H., Thalheim, B. (eds.) Conceptual Modeling. LNCS, vol. 1565, pp. 294–308. Springer, Heidelberg (1999)

    Google Scholar 

  4. Chen, P.P.: The entity-relationship model: toward a unified view of data. ACM TODS 1(1), 1–36 (1976)

    Article  Google Scholar 

  5. Coffman, T., Greenblatt, S., Marcus, S.: Graph-Based Technologies for Intelligence Analysis. CACM 47(3), 45–47 (2004)

    Article  Google Scholar 

  6. Cai, D., Shao, Z., He, X., Yan, X., Han, J.: Mining hidden community in heterogeneous social networks. In: Proceeding of Link KDD 2005 (2005)

    Google Scholar 

  7. Hollywood, J., Snyder, D., McKay, K., Boon, J.: Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior. Rand Corporation (2004)

    Google Scholar 

  8. Mukherjee, M., Holder, L.B.: Graph-based data mining on social networks. In: Link KDD 2004. Workshop on Link Analysis and Group Detection (2004)

    Google Scholar 

  9. Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intelligent Systems 15(2), 32–41 (2000)

    Article  Google Scholar 

  10. Debole, F., Sebastiani, F.: Supervised term weighting for automated text categorization. In: 18th ACM Symposium on Applied Computing (2003)

    Google Scholar 

  11. Foggia, P., Genna, R., nad Vento, M.: Introducing Generalized Attributed Relational Graphs (GARG’s) as prototypes of ARG’s. In: GbR 1999. 2nd IAPR Workshop on Graph-based Representations (1999)

    Google Scholar 

  12. Chen, P.P., Wong, L.Y.: A Proposed Preliminary Framework for Conceptual Modeling of Learning from Surprises. In: Arabnia, H.R., Joshua, R. (eds.) ICAI 2005. Proceedings of the 2005 International Conference on Artificial Intelligence (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Peter P. Chen Leah Y. Wong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Su, YJ., Jiau, H.C., Tsai, SR. (2007). Using Active Modeling in Counterterrorism. In: Chen, P.P., Wong, L.Y. (eds) Active Conceptual Modeling of Learning. ACM-L 2006. Lecture Notes in Computer Science, vol 4512. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77503-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77503-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77502-7

  • Online ISBN: 978-3-540-77503-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics