Networks model of the East Turkistan terrorism

作者: Ben-xian Li , Jun-fang Zhu , Shun-guo Wang

DOI: 10.1016/J.PHYSA.2014.10.022

关键词: Network modelChinaComputer scienceShortest path problemSocial network analysisOperations researchSocial network analysis (criminology)Structure (mathematical logic)Computer securitySmall-world networkTerrorism

摘要: Abstract The presence of the East Turkistan terrorist network in China can be traced back to rebellions on BAREN region Xinjiang April 1990. This article intends research networks and offer a panoramic view. events, terrorists their relationship are described using matrices. Then social analysis is adopted reveal type structure characteristics. We also find crucial leader. Ultimately, some results show that has big hub nodes small shortest path, follows pattern world with hierarchical structure.

参考文章(14)
Jianbin Ma, Guifa Teng, Shuhui Chang, Xiaoru Zhang, Ke Xiao, Social Network Analysis Based on Authorship Identification for Cybercrime Investigation Intelligence and Security Informatics. pp. 27- 35 ,(2011) , 10.1007/978-3-642-22039-5_3
S. N. Dorogovtsev, A. V. Goltsev, J. F. F. Mendes, k -Core Organization of Complex Networks Physical Review Letters. ,vol. 96, pp. 040601- ,(2006) , 10.1103/PHYSREVLETT.96.040601
Luciano Telesca, Michele Lovallo, Are global terrorist attacks time-correlated? Physica A-statistical Mechanics and Its Applications. ,vol. 362, pp. 480- 484 ,(2006) , 10.1016/J.PHYSA.2005.08.030
Ramón Spaaij, The Enigma of Lone Wolf Terrorism: An Assessment Studies in Conflict & Terrorism. ,vol. 33, pp. 854- 870 ,(2010) , 10.1080/1057610X.2010.501426
Linton C. Freeman, Centrality in social networks conceptual clarification Social Networks. ,vol. 1, pp. 215- 239 ,(1978) , 10.1016/0378-8733(78)90021-7
Stanley Wassermann, Katherine Faust, Social Network Analysis: Methods and Applications ,(1994)
Jennifer J. Xu, Hsinchun Chen, CrimeNet explorer: a framework for criminal network knowledge discovery ACM Transactions on Information Systems. ,vol. 23, pp. 201- 226 ,(2005) , 10.1145/1059981.1059984
John Bohannon, Investigating Networks: The Dark Side Science. ,vol. 325, pp. 410- 411 ,(2009) , 10.1126/SCIENCE.325_410
Alain Barrat, Luca Dall'asta, Alessandro Vespignani, J. I. Alvarez-hamelin, Large scale networks fingerprinting and visualization using the k-core decomposition neural information processing systems. ,vol. 18, pp. 41- 50 ,(2005)
Serge Galam, Global physics: from percolation to terrorism, guerilla warfare and clandestine activities Physica A: Statistical Mechanics and its Applications. ,vol. 330, pp. 139- 149 ,(2003) , 10.1016/J.PHYSA.2003.08.035