Three is The Answer: Combining Relationships to Analyze Multilayered Terrorist Networks
MetadataShow full item record
In this paper we introduce a methodology to create multilayered terrorist networks, taking into account that the main challenges of the data behind the networks are incompleteness, fuzzy boundaries, and dynamic behavior. To account for these dark networks' characteristics, we use knowledge sharing communities in determining the methodology to create 3-layered networks from each of our datasets. We analyze the resulting layers of three terrorist datasets and present explanations of why three layers should be used for these models. We also use the information of just one layer, to identify the Bali 2005 attack community.
The article of record as published may be found at http://dx.doi.org/10.1145/3110025.3110154
Showing items related by title, author, creator and subject.
Development of a tailored methodology and forensic toolkit for industrial control systems incident response Carr, Nicholas B. (Monterey, California: Naval Postgraduate School, 2014-06);This thesis presents a methodology for incident response to identify anomalies and malicious adversary persistence within the networks responsible for the reliable operation of modern society’s critical infrastructure. The ...
Developing a reliable methodology for assessing the computer network operations threat of North Korea Brown, Christopher (Monterey, California. Naval Postgraduate School, 2004-09);Computer network operations (CNO) can be considered a relatively new phenomenon being encount modern warfare. Computer network operation is comprised of three components, computer network attack computer network exploitation ...
Baasch, Werner K. (Monterey, California. Naval Postgraduate School, 2002-03);In a world that is increasingly more connected using networks of all types, collaboration becomes a way of leverage these connections to benefit both individuals and organizations. Currently there are numerous technologies ...