期刊文献+

基于特征画像的恐怖组织袭击偏好研究 被引量:3

Research on Attacking Preference of Terrorist Organization Based on Feature Profiling
下载PDF
导出
摘要 为分析恐怖组织不同维度的特征数据及特征之间的内在联系,在全球恐怖主义数据库中选取5个典型国际恐怖组织,基于特征画像,运用统计学、机器学习、关联规则挖掘以及地理信息系统数据分析方法,对恐怖袭击特征属性进行分析。结果表明,5个恐怖组织偏好不同的袭击区域,但普遍偏好炸弹/炸药与枪支类武器;在特征关联上,攻击类型、目标类型和武器类型3类属性的特征关联较为明显。该方法在反恐情报分析中适用于挖掘不同涉恐人员的特征差异。 In order to effectively analyze multidimensional characteristic data of terrorist organizations and the interrelationship between the characteristic data,we select five typical international terrorist organizations from the Global Terrorism Database.Based on feature profiling,we use the method of statistics,machine learning,association rule mining and geographic information system to analyze the attacking characteristic attributes.According to the results,attacking preferences of the five typical terrorist organizations are considerably related to the attack regions but they all prefer to choose the weapons of explosives/bombs and firearms;in the association characteristic attributes,the associations of the three types of attributes,namely attack type,target type and weapon type are obviously correlated.The method is suitable for mining the characteristics of different potential terrorists in the intelligence analysis of counter-terrorism.
作者 唐正 朱衍丞 邱凌峰 郑超慧 TANG Zheng;ZHU Yan-cheng;QIU Ling-feng;ZHENG Chao-hui(School of Information Technology and Cyber Security,People's Public Security University of China;Key Laboratory of Security Technology&Risk Assessment,Ministry of public security,Beijing 102628,China)
出处 《软件导刊》 2019年第1期128-131,143,共5页 Software Guide
基金 国家自然科学基金项目(71704183)
关键词 恐怖组织 特征画像 全球恐怖主义数据库 关联规则挖掘 梯度提升决策树 terrorist organization feature profiling the global terrorism database association rule mining gradient boosting decision tree
  • 相关文献

参考文献13

二级参考文献100

  • 1欧阳常青.步态识别技术在反恐等公共安全领域中的应用[J].新疆警官高等专科学校学报,2005(3):63-64. 被引量:5
  • 2梅建明.论反恐数据挖掘[J].中国人民公安大学学报(社会科学版),2007,23(2):24-29. 被引量:16
  • 3Bendix F, Kosara R, Hauser H. Parallel Sets: Visual Analysis of Categorical Data [ C ]//Proceedings of IEEE Symposium on Information Visualization, 2005.
  • 4Eades P. Edge Crossings in Drawings of Bipartite Graphs [ J ]. Algorithmica, 1994, 11: 379-403.
  • 5LaFree G, Dugan L, Fogg H V, et al. Building a Global Terrorism Database[R]. Report to the US Department of Justice, 2006.
  • 6Wattenberg M.Baby Names,Visualization,and Social Data Analysis [C]//proceedings of IEEE Symposium on Information Visualization,2005.
  • 7Havre S, Hetzler E, Whitney P, et al. ThemeRiver: Visualizing Thematic Changes in Large Document Collections [ J ]. IEEE Transactions on Visualization and Computer Graphics, 2002, 8 (1): 9-20.
  • 8Lee J. Exploring Global Terrorism Data: A Web-based Visualization of Temporal Data[J]. Crossroads, 2008, 15(2): 7- 14.
  • 9Wang X, Miller E, Smarick K, et al. Investigative Visual Analysis of Global Terrorism[J]. Computer Graphics Forum, 2008, 27(3) : 919- 926.
  • 10郑毅.证析[M].北京:华夏出版社,2012.

共引文献190

同被引文献26

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部