
regions comparatively as in (Islam and Nguyen, 2020;
Makiya and Shibwabo, 2022), and by exploring the
concept of self-sustainable multi-agent systems, eval-
uate the model’s sustainability to different financial
transactions and evolving terrorist financing methods.
REFERENCES
Bakry, A. N., Alsharkawy, A. S., Farag, M. S., and Raslan,
K. R. (2024). Combating financial crimes with unsu-
pervised learning techniques: Clustering and dimen-
sionality reduction for anti-money laundering. Al-
Azhar Bulletin of Science, 35.
Cao, D. K. and Do, P. (2012). Applying data mining in
money laundering detection for the vietnamese bank-
ing industry.
Chu, Y., Wang, X., Ma, J., Jia, K., Zhou, J., and Yang, H.
(2021). Inductive granger causal modeling for multi-
variate time series.
de Jes
´
us Rocha-Salazar, J., Segovia-Vargas, M. J., and del
Mar Camacho-Mi
˜
nano, M. (2021). Money launder-
ing and terrorism financing detection using neural net-
works and an abnormality indicator. Expert Systems
with Applications, 169.
Devendra, R., Chopra, R., and Appaiah, K. (2023). Granger
causality detection via sequential hypothesis testing.
Donoho, S. (2004). Early detection of insider trading in
option markets.
Drezewski, R., Sepielak, J., and Filipkowski, W. (2015).
The application of social network analysis algorithms
in a system supporting money laundering detection.
Information Sciences, 295:18–32.
Gohar, F., Haider, W., Qamar, U., and Butt, W. H. (2014).
Terrorist Group Prediction Using Data Classification
Data Cleansing Algorithm View project Blood glucose
monitoring and suggesting quantity of insulin for di-
abetic type one patient OR artificial pancreas (AP).
View project Terrorist Group Prediction Using Data
Classification.
Hewamalage, H., Bergmeir, C., and Bandara, K. (2021).
Recurrent neural networks for time series forecast-
ing: Current status and future directions. International
Journal of Forecasting, 37(1):388–427.
Islam, M. R. and Nguyen, N. (2020). Comparison of finan-
cial models for stock price prediction. Journal of Risk
and Financial Management, 13.
Kader, N. I. A., Yusof, U. K., Khalid, M. N. A., and Husain,
N. R. N. (2023). A review of long short-term memory
approach for time series analysis and forecasting. In
Al-Sharafi, M. A., Al-Emran, M., Al-Kabi, M. N., and
Shaalan, K., editors, Proceedings of the 2nd Interna-
tional Conference on Emerging Technologies and In-
telligent Systems, pages 12–21, Cham. Springer Inter-
national Publishing.
Koschade, S. (2006). A social network analysis of je-
maah islamiyah: The applications to counterterrorism
and intelligence. Studies in Conflict and Terrorism,
29:559–575.
Labib, N. M., Rizka, M. A., and Shokry, A. E. M. (2020).
Survey of machine learning approaches of anti-money
laundering techniques to counter terrorism finance. In
Ghalwash, A. Z., El Khameesy, N., Magdi, D. A., and
Joshi, A., editors, Internet of Things—Applications
and Future, pages 73–87, Singapore. Springer Singa-
pore.
Liu, R., Qian, X.-l., Mao, S., and Zhu, S.-z. (2011). Re-
search on anti-money laundering based on core de-
cision tree algorithm. In 2011 Chinese Control and
Decision Conference (CCDC), pages 4322–4325.
Liu, X. and Zhang, P. (2010). A scan statistics based sus-
picious transactions detection model for anti-money
laundering (aml) in financial institutions. pages 210–
213.
Makiya, D. and Shibwabo, B. (2022). A model for forex
market price prediction using deep learning. In 2022
International Conference on Innovation and Intelli-
gence for Informatics, Computing, and Technologies,
3ICT 2022, pages 195–202. Institute of Electrical and
Electronics Engineers Inc.
Mbiva, S. M. and Correa, F. M. (2024). Machine learning to
enhance the detection of terrorist financing and suspi-
cious transactions in migrant remittances. Journal of
Risk and Financial Management, 17.
of Portugal, C.-B. (2015). National risk assessment of
money laundering and terrorism assessment.
Ozgul, F., Erdem, Z., and Bowerman, C. (2009). Prediction
of unsolved terrorist attacks using group detection al-
gorithms.
Phua, C., Lee, V., Smith, K., and Gayler, R. (2010). A
comprehensive survey of data mining-based fraud de-
tection research.
Primer, T. I. (2023). U.s. sweeping sanctions on hezbollah
network.
Saidi, F., Trabelsi, Z., and Ghazela, H. B. (2018). A
novel approach for terrorist sub-communities detec-
tion based on constrained evidential clustering. vol-
ume 2018-May, pages 1–8. IEEE Computer Society.
Soltani, R., Nguyen, U. T., Yang, Y., Faghani, M., Yagoub,
A., and An, A. (2016). A new algorithm for money
laundering detection based on structural similarity. In-
stitute of Electrical and Electronics Engineers Inc.
Tang, J. and Yin, J. (2005). Developing an intelligent data
discriminating system of anti-money laundering based
on svm. pages 3453–3457.
U.S-Treasury (2022). 2022 national terrorist financing risk
assessment.
US-Treasury (2024a). 2024-national-terrorist-financing-
risk-assessment.
US-Treasury (2024b). February 2024 2024 national prolif-
eration financing risk assessment.
Wang, S.-N. and Yang, J.-G. (2007). A money laundering
risk evaluation method based on decision tree. In 2007
International Conference on Machine Learning and
Cybernetics, volume 1, pages 283–286.
ICAART 2025 - 17th International Conference on Agents and Artificial Intelligence
638