Identifying individuals associated with organized criminal networks: A social network analysis

K Basu, A Sen - Social Networks, 2021 - Elsevier
The past couple of decades has witnessed an unprecedented rise in organized crime. This
rise, coupled with increasing intricacies of organized crime, poses significant and evolving …

Interoperability and Targeted Attacks on Terrorist Organizations Using Intelligent Tools from Network Science

AZ Spyropoulos, E Ioannidis, I Antoniou - Information, 2023 - mdpi.com
The early intervention of law enforcement authorities to prevent an impending terrorist attack
is of utmost importance to ensuring economic, financial, and social stability. From our …

Are active users the most central to hacker social networks? A comparative analysis of public and private online network structures among hackers

O Smirnova, TS Hyslip, TJ Holt - Deviant Behavior, 2024 - Taylor & Francis
The last decade witnessed significant research of user behavior and social networks within
online hacker forums and illicit markets. Researchers have used the quantifiable nature of …

DCGAN based spectrum sensing data enhancement for behavior recognition in self-organized communication network

K Cheng, L Zhu, C Yao, L Yu, X Wu… - China …, 2021 - ieeexplore.ieee.org
Communication behavior recognition is an issue with increasingly importance in the anti-
terrorism and national defense area. However, the sensing data obtained in actual …

Presenting new collaborative link prediction methods for activity recommendation in Facebook

A Shahmohammadi, E Khadangi, A Bagheri - Neurocomputing, 2016 - Elsevier
One of the common methods used in recommender systems is collaborative filtering
methods. In these methods, same-interest users' preferences are often recommended to …

Approaches to analyze cyber terrorist communities: Survey and challenges

F Saidi, Z Trabelsi, K Salah, HB Ghezala - Computers & Security, 2017 - Elsevier
Cyber terrorism has become a major threat to world peace and global economic prosperity.
The exponential growth of cyber terrorist communities has given rise to the need for the …

A novel graph analytic approach to monitor terrorist networks

K Basu, C Zhou, A Sen… - … IEEE Intl Conf on Parallel & …, 2018 - ieeexplore.ieee.org
Terrorist attacks all across the world have become a major source of concern for almost all
national governments. The United States Department of State's Bureau of Counter …

Squeeze-Excitation Based Communication Behavior Recognition Approach for Spectrum Sensing Data

K Cheng, L Zhu, C Yao, L An… - 2021 7th International …, 2021 - ieeexplore.ieee.org
Communication behavior recognition under electronic countermeasures conditions has
become an increasingly important topic for communication security and military application …

Utjecaj terorizma na međunarodno poslovanje

A Paris - 2024 - repository.fthm.uniri.hr
Smanjenje učinka terorizma na međunarodno poslovanje zahtijeva implementaciju ključnih
strategija, među kojima se ističu osiguranje i mjere otpornosti. Osiguranje protiv terorističkih …

CCSAE-Based Un-Cooperative Communication Behavior Recognition Scheme

K Cheng, L Zhu, W Wang… - 2022 7th International …, 2022 - ieeexplore.ieee.org
The task of non-cooperative communication behavior recognition (CBR) usually faces a
complex electromagnetic environment, and the interfered monitoring data will affect the …