SpyNetMiner: An Outlier Analysis to Tag Elites in Clandestine Social Networks

SpyNetMiner: An Outlier Analysis to Tag Elites in Clandestine Social Networks

S. Karthika, S. Bose, A. Kannan
Copyright: © 2014 |Pages: 23
DOI: 10.4018/ijdwm.2014010103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality of the nodes is analyzed based on the profile generated using enhanced selection strategies. It further justifies the findings by presenting layman understandable explanation through feature extraction and semantic rule convertors. An event that brought a worldwide attention towards terrorism is the unforgettable 9/11 disaster. The covert network involved in this attack is used as dataset for SpyNetMiner. The performance of SpyNetMiner is compared to a similar system called as UNICORN and other conventional algorithms. The results evidently show that SpyNetMiner outperforms all existing methodologies in covert network analysis.
Article Preview

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 6 Issues (2023)
Volume 18: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing