Security

Dominant Features Identification for Covert Nodes in 9/11 Attack Using Their Profile

Download Now Free registration required

Executive Summary

In recent days terrorism poses a threat to homeland security. The major problem faced in network analysis is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The existing centrality based and graph theoretic approach are more concerned about the network structure rather than the node attributes. In this paper an unsupervised framework SoNMine has been developed to identify the key players in 9/11 network using their behavioral profile. The behaviors of nodes are analyzed based on the behavioral profile generated.

  • Format: PDF
  • Size: 405 KB