Limits...
Covert network analysis for key player detection and event prediction using a hybrid classifier.

Butt WH, Akram MU, Khan SA, Javed MY - ScientificWorldJournal (2014)

Bottom Line: National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe.Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events.As a proof of concept, the proposed framework has been implemented and tested using different case studies including two publicly available datasets and one local network.

View Article: PubMed Central - PubMed

Affiliation: Department of Computer Engineering, College of Electrical and Mechanical Engineering, National University of Sciences and Technology, Islamabad 44000, Pakistan.

ABSTRACT
National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events. In this paper, we present a novel method to predict key players from a covert network by applying a hybrid framework. The proposed system calculates certain centrality measures for each node in the network and then applies novel hybrid classifier for detection of key players. Our system also applies anomaly detection to predict any terrorist activity in order to help law enforcement agencies to destabilize the involved network. As a proof of concept, the proposed framework has been implemented and tested using different case studies including two publicly available datasets and one local network.

Show MeSH

Related in: MedlinePlus

ROC curves of proposed framework for key player detection.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4127216&req=5

fig10: ROC curves of proposed framework for key player detection.

Mentions: The statistical analysis of proposed system is done with the help of ROC curves which are plots of sensitivity versus 1-specificity. This analysis is done for performance evaluation of proposed hybrid classifier (HC). Figure 10 shows the averaged ROC curves for all three case studies.


Covert network analysis for key player detection and event prediction using a hybrid classifier.

Butt WH, Akram MU, Khan SA, Javed MY - ScientificWorldJournal (2014)

ROC curves of proposed framework for key player detection.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4127216&req=5

fig10: ROC curves of proposed framework for key player detection.
Mentions: The statistical analysis of proposed system is done with the help of ROC curves which are plots of sensitivity versus 1-specificity. This analysis is done for performance evaluation of proposed hybrid classifier (HC). Figure 10 shows the averaged ROC curves for all three case studies.

Bottom Line: National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe.Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events.As a proof of concept, the proposed framework has been implemented and tested using different case studies including two publicly available datasets and one local network.

View Article: PubMed Central - PubMed

Affiliation: Department of Computer Engineering, College of Electrical and Mechanical Engineering, National University of Sciences and Technology, Islamabad 44000, Pakistan.

ABSTRACT
National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events. In this paper, we present a novel method to predict key players from a covert network by applying a hybrid framework. The proposed system calculates certain centrality measures for each node in the network and then applies novel hybrid classifier for detection of key players. Our system also applies anomaly detection to predict any terrorist activity in order to help law enforcement agencies to destabilize the involved network. As a proof of concept, the proposed framework has been implemented and tested using different case studies including two publicly available datasets and one local network.

Show MeSH
Related in: MedlinePlus