期刊文献+

恐怖组织网络的实证研究 被引量:7

Empirical study of terrorist organizations network
下载PDF
导出
摘要 文章利用复杂网路分析方法,结合数据挖掘相关理论,对包含1998—2004年间世界范围内发生的3 411起恐怖袭击事件的数据库进行数据分析,提取相关信息整理后按照一定规则建立起恐怖组织网络,绘制其网络拓扑结构图并计算其复杂网络特征参数,得出其符合小世界网络特征的结论,网络的度分布符合无标度特征,标度指数γ≈2.7。 Data analysis of the database containing 3 411 terrorist attacks that took place around the world between 1998 and 2004 was conducted in this paper utilizing complex networkanalysis method and combining relative data mining theory. Terrorist organizations network was established after extracting relevant information according to certain rules. After network topology map was mapped and characteristic parameters of the complex networks were calculated, a conclusion was obtained that the network was in line with the small-world network, and the degree distribution of the network was in line with the scale-free characteristics and its degree exponent γ≈2.7.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第2期242-244,292,共4页 Journal of Hefei University of Technology:Natural Science
基金 国家科技重大专项基金资助项目(2008ZX10004-013) 国家自然科学基金重大研究计划资助项目(90924019)
关键词 复杂网络 恐怖组织 度分布 complex network terrorist organization degree distribution
  • 相关文献

参考文献9

二级参考文献134

  • 1李?,山秀明,任勇.具有幂率度分布的因特网平均最短路径长度估计[J].物理学报,2004,53(11):3695-3700. 被引量:18
  • 2李兵,王浩,李增扬,何克清,余敦辉.基于复杂网络的软件复杂性度量研究[J].电子学报,2006,34(B12):2371-2375. 被引量:38
  • 3Fenton N E, Pfleeger S L. Software Metrics A Rigorous and Practical Approach. Second Edition. Boston:PWS Pub. , 1997
  • 4Chidamber S R,Kemerer C F. A Metrics Suite for Object-oriented Design. IEEE Trans. on Soft. Eng. , 1994,20 (6) : 476-493
  • 5Brito e Abreu F. The MOOD Metrics Set//Proc. of ECOOP'95 Workshop on Metrics. Aarhus, Denmark, 1995
  • 6Strogatz S H. Exploring complex networks. Nature, 2001,410:268-276
  • 7Albert R , Barabasi A - L. Statistical mechanics of complex net works. Rev. Mod. Phys. , 2002,74 : 47-97
  • 8Dorogovtsev S N, Mendes J F F. Evolution of Networks: From Biological Nets to the Internet and WWW. Oxford:Oxford University Press, 2003
  • 9Newman M E J. The structure and function of complex net - works. SIAM Review,2003,45:167-256
  • 10Potanin A,Noble J, Frean M, et al. Scale-free Geometry in Object-oriented Programs. Comm. ACM, 2005,48 : 99-103

共引文献69

同被引文献61

  • 1Chen, Xiaodong, Li, Jianfeng, Huang, Yanbo.Network analysis using organizational risk analyzer[J].Journal of Southeast University(English Edition),2008,24(S1):104-108. 被引量:2
  • 2刘威,唐常杰,乔少杰,温粉莲,左劼.基于概念邮件系统的犯罪数据挖掘新方法[J].计算机科学,2007,34(2):213-215. 被引量:4
  • 3Gjelten T. US 'connects the dots' to catch roadside bombers[DB/OL]. [2013 -09 -021. http://www, npr. org/2010/ 12/03/131755378/u-s-connects-the-dots-to-catch-roadside-bombers? sc= 17 ~f= 1001.
  • 4苏北.网络恐怖主义挑战国家信息安全[DB/OL].[2013-09-02].http://news.sina.com.cn/o/2005-05-28/12016013679s.shtml.
  • 5张凡.新疆党委副秘书长郭永辉解读新疆稳定之本[DB/OL].[2013-09-02].http://news.qq.com/a/20110901/001053.htm.
  • 6Arquilla J, Ronfeldt D F. Networks and Netwars: the Future of Terror, Crime, and Militancy I-M~. Santa Monica, Cali fornia: RAND, 2001:10 - 60.
  • 7Bohannon J. Counterterrorism's new tool: metanetwork analysisrJ~. Science, 2009, 325(5939): 409- 411.
  • 8Barabdsi A L, Frangos J. Linked.. a New Science of NetworkEM~. Cambridge: Persus Press,2002: 220- 224.
  • 9Koschade S A. A social network analysis of Jemaah Islamiyah: the applications to counterterrorism and intelligence[J]. Studies in Conflict ~ Terrorism, 2009, 29(6) :559 - 575.
  • 10Ressler S. Social network analysis as an approach to combat terrorism: past, present, and future research[-J~. Homeland Security Affairs, 2006, 2(2) =1 - 10.

引证文献7

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部