期刊文献+

基于超图的恐怖组织网络的结构模式挖掘方法

Structural Pattern Detection in Terrorist Organization Networks Based on Hypergraph
下载PDF
导出
摘要 恐怖组织网络的结构模式发现有助于政府有效地采取反恐措施,针对一般图无法完整地刻画整个恐怖组织网络的缺陷,采用超图对恐怖组织网络进行建模,并定义超边相似性的度量,提出一种基于超边相似性的层次聚类的结构模式发现方法,并引入结构密度来度量划分结构的质量.通过案例分析说明该方法能够同时有效地探测到恐怖组织网络结构的层次模式和重叠模式. Structural pattern detection in terrorist organization networks helps the government to effectively take counter-terrorism measures.In some cases the use of simple graphs does not provide a complete description of the real-world target networks.After introducing hypergraphs to describe terrorist organization networks and defining hyper-edge similarity measurement,a Hierarchical Clustering method based on Hyper-edge Similarity is proposed to detect structure pattern,as well as using the newly introduced community density to evaluate the goodness of a community.Moreover,the method can also find both the overlapping and hierarchical properties of structure.
作者 谷宁 郑印 GU Ning;ZHENG Yin(Special Operations Department,Special Police of China,Beijing 102211,China)
出处 《指挥与控制学报》 2019年第4期344-348,共5页 Journal of Command and Control
关键词 恐怖组织网络 超图 层次聚类 结构模式 terrorist organization network hypergraph hierarchical clustering structural pattern
  • 相关文献

参考文献3

二级参考文献59

  • 1MCILLWAIN J S. Organized Crime: A .Social Network Approach [J]. Crime Law and Social Change,1999,32(4) :301 -323.
  • 2FREEMAN L C. Centrality in Social Networks Conceptual Clarifica- tion [ J ]. Social Networks, 1979,1 ( 3 ) :215 - 239.
  • 3MACQUEEN J. Some Methods for Classification and Analysis of Multivariate Observations [ C ] //Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability. 1967: 281 - 297.
  • 4GIRVAN M,NEWMAN M E J. Community Structure in Social and Biological Networks [ J ]. Proceedings of the National Academy of Sciences,2002,99 ( 12 ) :7821 - 7826.
  • 5NARAYANAM R,NARAHARI Y. A Shapley Value-Based Approach to Discover Influential Nodes in Social Networks[ J ]. IEEE Transac- tions on Automation Science and Engineering,2010,99:1 -18.
  • 6KLEINBERG J M. Authoritative Sources in A Hyperlinked Environ- ment[J]. Journal of the ACM,1999,46(5) :604 -632.
  • 7KARTHIKA S,KIRUTHIGA A, BOSE S. Identifying Key Players in A Covert Network Using Behavioral Profile[ C ] //IEEE International Conference on Recent Trends in Information Technology (ICRTIT) . 2012:22 - 27.
  • 8HUSSAIN D M. Terrorist Networks Analysis through Argument Driv- en Hypotheses Model[ C ]//The Second IEEE International Con- ference on Availability ,Reliability and Security(ARES). 2007:480 - 492.
  • 9BHOLA V,GROVER M K,SINHA M,et al. Identifying Key Players in A Social Network: Measuring the Extent of an Individual' s Neighborhood Connectivity [ C ]//IEEE International Workshop on Business Applications of Social Network Analysis( BASNA). 2010: 1-6.
  • 10HEWETT R. Toward Identification of Key Breakers in Social Cyber-Physical Networks [ C ] //IEEE International Conference on Systems, Man, and Cybernetics( SMC ). 2011:2731 - 2736.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部