• We plan to include new algorithms for TNA
including detecting hidden hierarchy,
subgroup detection, and link prediction.
• We are currently looking into how link
weights can be incorporated, since not all
links are equally important. We believe that
incorporation of link weights will result in
more precise link analysis measures.
• We wish to optimize the existing TNA
algorithms to perform more efficient to be
able to analyze large networks of thousands
of nodes and links.
• We are currently including additional data
sets to test and evaluate the usefulness of the
tool more thoroughly.
REFERENCES
Baccara, M., and Bar-Isaac, H. 2009. Interrogation
methods and terror networks. Mathematical Methods
in Counterterrorism, pp. 271-290. Springer.
Batagelj, V., and Mrvar, A. 2010. Pajek – Program for
large network analysis. http://pajek.imfm.si.
Baker, W. E., and Faulkner, R. R. 1993. The social
organization of conspiracy: illegal networks in the
heavy electrical equipment industry. American
Sociological Review, 837-860.
BBC News. 2008. The Bali bombing plot.
http://news.bbc.co.uk/2/hi/asia-pacific/3157478.stm.
Brandes, U., and Wagner, D. 2003. Analysis and
visualization of social networks. Graph Drawing
Software, pages 321-340.
Carley, K. M., Lee, J. S., and Krackhardt, D. 2001.
Destabilizing networks. Connections, 24(3):31-34.
Di Battista, G., Eades, P., Tamassia, R., and Tollis. I. G.
1994. Algorithms for drawing graphs: an annotated
bibliography. Computational Geometry-Theory and
Application, 4(5):235-282.
Enders, W., and Su, X. 2007. Rational terrorists and
optimal network structure. Journal of Conflict
Resolution, 51(1):33.
Girvan, M., and Newman, M. E. J. 2002. Community
structure in social and biological networks.
Proceedings of the National Academy of Sciences,
99(12):7821-7826.
Gloor, P. A., and Zhao, Y. 2006. Analyzing actors and
their discussion topics by semantic social network
analysis. Information Visualization (IV 2006), pp.
130-135.
i2. 2010. http://www.i2group.com/template1.asp?id=5.
Latora, V., and Marchiori, M. 2004. How the science of
complex networks can help developing strategies
against terrorism. Chaos, Solitons and Fractals,
20(1):69-75.
Lindelauf, R., Borm, P., and Hamers, H. 2009. The
influence of secrecy on the communication structure
of covert networks. Social Networks, 31, 126-137.
Elsevier.
Memon, N. 2007. Investigative data mining: mathematical
models for analyzing, visualizing and destabilizing
terrorist networks. PhD thesis, Aalborg University,
Denmark.
NetMiner. 2010. http://www.netminer.com.
NWB Team. 2006. Network Workbench Tool. Indiana
University, Northeastern University, and University of
Michigan, http://nwb.slis.indiana.edu.
O'Madadhain, J., Fisher, D., Smyth, P., White, S., and
Boey, Y. B. 2005. Analysis and visualization of
network data using JUNG. Journal of Statistical
Software, VV:1-35.
Rhodes, C. J. 2009. Inference approaches to constructing
covert social network topologies. Mathematical
Methods in Counterterrorism, pp. 127-140. Springer.
SocNetV. 2010. http://socnetv.sourceforge.net.
UCINET. 2010. http://www.analytictech.com/ucinet.
VisuaLyzer. 2010. http://www.mdlogix.com/solutions.
Wasserman, S., and Faust, K. 1994. Social network
analysis: methods and applications. Cambridge
University Press.
Wiil, U. K., Gniadek, J., and Memon, N. 2010. Measuring
link importance in terrorist networks. Accepted for the
International Conference on Advances in Social
Networks Analysis and Mining (ASONAM 2010),
(Odense, Denmark, August). IEEE Computer Society
Press.
Wiil, U. K., Memon, N., and Gniadek, J. 2009.
Knowledge management processes, tools and
techniques for counterterrorism. Proceedings of the
International Conference on Knowledge Management
and Information Sharing (KMIS 2009), (Funchal,
Portugal, October), pp. 29-36. INSTICC Press.
Wise, W. 2005. Indonesia's war on terror. United States-
Indonesia Society, pp. 1-107.
KMIS 2010 - International Conference on Knowledge Management and Information Sharing
24