Abstract
Terrorist organizations attain their goals by attacking various targets to jeopardize human lives and intimidate governments. As new terrorist attacks almost always aim to break the mold of old plots, tracing the dynamic behaviors of terrorists becomes crucial to national defense. This paper proposes using active modeling in analyzing unconventional attacks in the design of counterterrorism system. The intelligent terrorism detection system not only detects potential threats by monitoring terrorist networks with identified threat patterns, but also continually integrates new threat features in terrorist behaviors and the varying relationships among terrorists.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Carley, K.: Dynamic Network Analysis. Committee on Human Factors, National Research Council, 133–145 (2003)
Krebs, V.: Mapping Networks of Terrorist Cells. Connections 24(3), 43–52 (2002)
Chen, P.P., Thalheim, B., Wong, L.Y.: Future Directions of Conceptual Modeling. In: Chen, P.P., Akoka, J., Kangassalu, H., Thalheim, B. (eds.) Conceptual Modeling. LNCS, vol. 1565, pp. 294–308. Springer, Heidelberg (1999)
Chen, P.P.: The entity-relationship model: toward a unified view of data. ACM TODS 1(1), 1–36 (1976)
Coffman, T., Greenblatt, S., Marcus, S.: Graph-Based Technologies for Intelligence Analysis. CACM 47(3), 45–47 (2004)
Cai, D., Shao, Z., He, X., Yan, X., Han, J.: Mining hidden community in heterogeneous social networks. In: Proceeding of Link KDD 2005 (2005)
Hollywood, J., Snyder, D., McKay, K., Boon, J.: Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior. Rand Corporation (2004)
Mukherjee, M., Holder, L.B.: Graph-based data mining on social networks. In: Link KDD 2004. Workshop on Link Analysis and Group Detection (2004)
Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intelligent Systems 15(2), 32–41 (2000)
Debole, F., Sebastiani, F.: Supervised term weighting for automated text categorization. In: 18th ACM Symposium on Applied Computing (2003)
Foggia, P., Genna, R., nad Vento, M.: Introducing Generalized Attributed Relational Graphs (GARG’s) as prototypes of ARG’s. In: GbR 1999. 2nd IAPR Workshop on Graph-based Representations (1999)
Chen, P.P., Wong, L.Y.: A Proposed Preliminary Framework for Conceptual Modeling of Learning from Surprises. In: Arabnia, H.R., Joshua, R. (eds.) ICAI 2005. Proceedings of the 2005 International Conference on Artificial Intelligence (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Su, YJ., Jiau, H.C., Tsai, SR. (2007). Using Active Modeling in Counterterrorism. In: Chen, P.P., Wong, L.Y. (eds) Active Conceptual Modeling of Learning. ACM-L 2006. Lecture Notes in Computer Science, vol 4512. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77503-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-77503-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77502-7
Online ISBN: 978-3-540-77503-4
eBook Packages: Computer ScienceComputer Science (R0)