Please use this identifier to cite or link to this item: http://dspace.iitrpr.ac.in:8080/xmlui/handle/123456789/2949
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGera, R.-
dc.contributor.authorMiller, R.-
dc.contributor.authorMirandaLopez, M.-
dc.contributor.authorSaxena, A.-
dc.contributor.authorWarnke, S.-
dc.date.accessioned2021-10-09T06:05:41Z-
dc.date.available2021-10-09T06:05:41Z-
dc.date.issued2021-10-09-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/2949-
dc.description.abstractIn this paper we introduce a methodology to create multilayered terrorist networks, taking into account that the main challenges of the data behind the networks are incompleteness, fuzzy boundaries, and dynamic behavior. To account for these dark networks’ characteristics, we use knowledge sharing communities in determining the methodology to create 3-layered networks from each of our datasets. We analyze the resulting layers of three terrorist datasets and present explanations of why three layers should be used for these models. We also use the information of just one layer, to identify the Bali 2005 attack communityen_US
dc.language.isoen_USen_US
dc.titleThree is the answer: Combining relationships to analyze multilayered terrorist networksen_US
dc.typeArticleen_US
Appears in Collections:Year-2017

Files in This Item:
File Description SizeFormat 
Full Text.pdf2.47 MBAdobe PDFView/Open    Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.