Proceedings of the 2015 International Conference on Recent Advances in Computer Systems

Influence of Key Player Detection and Removal on Efficiency and Performance of Covert Networks using Social Network Analysis

Authors
Aisha Ahmad, Anam Shahjahan, Wasi Butt, Qamar Usman
Corresponding Author
Aisha Ahmad
Available Online November 2015.
DOI
https://doi.org/10.2991/racs-15.2016.1How to use a DOI?
Keywords
Terrorist networks; Social network analysis; centrality measures; efficiency; performance
Abstract
Terrorist network is particular type of social network with prominence on efficiency and performance. In order to propose successful approaches for terrorist organizations destabilization, identification and understanding of structural properties of network is essential. This paper presents a brief survey of centrality measures from social network analysis using optimizing standards to those based on information performance, efficiency and overall performance
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
International Conference on Recent Advances in Computer Systems
Part of series
Advances in Computer Science Research
Publication Date
November 2015
ISBN
978-94-6252-146-9
ISSN
2352-538X
DOI
https://doi.org/10.2991/racs-15.2016.1How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Aisha Ahmad
AU  - Anam Shahjahan
AU  - Wasi Butt
AU  - Qamar Usman
PY  - 2015/11
DA  - 2015/11
TI  - Influence of Key Player Detection and Removal on Efficiency and Performance of Covert Networks using Social Network Analysis
BT  - International Conference on Recent Advances in Computer Systems
PB  - Atlantis Press
SN  - 2352-538X
UR  - https://doi.org/10.2991/racs-15.2016.1
DO  - https://doi.org/10.2991/racs-15.2016.1
ID  - Ahmad2015/11
ER  -