On Fighting Fire with Fire Strategic Destabilization of Terrorist Networks

Terrorist organizations have social networks that enable them to recruit and operate around the world. This paper presents a novel computational framework for derivation of optimal destabilization strategies against dynamic social networks of terrorists. We develop a game-theoretic model to capture...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 s. 1120 - 1127
Hlavní autoři: Behzadan, Vahid, Nourmohammadi, Amin, Gunes, Mehmet, Yuksel, Murat
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: New York, NY, USA ACM 31.07.2017
Edice:ACM Conferences
Témata:
ISBN:1450349935, 9781450349932
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Terrorist organizations have social networks that enable them to recruit and operate around the world. This paper presents a novel computational framework for derivation of optimal destabilization strategies against dynamic social networks of terrorists. We develop a game-theoretic model to capture the distributed and complex dynamics of terrorist organizations, and introduce a technique for estimation of such dynamics from incomplete snapshots of target networks. Furthermore, we propose a mechanism for devising the optimal sequence of actions that drive the internal dynamics of targeted organizations towards an arbitrary state of instability. The performance of this framework is evaluated on a model of the Al-Qaeda network in 2001, verifying the efficacy of our proposals for counter-terrorism applications.
AbstractList Terrorist organizations have social networks that enable them to recruit and operate around the world. This paper presents a novel computational framework for derivation of optimal destabilization strategies against dynamic social networks of terrorists. We develop a game-theoretic model to capture the distributed and complex dynamics of terrorist organizations, and introduce a technique for estimation of such dynamics from incomplete snapshots of target networks. Furthermore, we propose a mechanism for devising the optimal sequence of actions that drive the internal dynamics of targeted organizations towards an arbitrary state of instability. The performance of this framework is evaluated on a model of the Al-Qaeda network in 2001, verifying the efficacy of our proposals for counter-terrorism applications.
Author Gunes, Mehmet
Nourmohammadi, Amin
Behzadan, Vahid
Yuksel, Murat
Author_xml – sequence: 1
  givenname: Vahid
  surname: Behzadan
  fullname: Behzadan, Vahid
  email: behzadan@ksu.edu
– sequence: 2
  givenname: Amin
  surname: Nourmohammadi
  fullname: Nourmohammadi, Amin
  email: mnourmohammadi@unr.edu
– sequence: 3
  givenname: Mehmet
  surname: Gunes
  fullname: Gunes, Mehmet
  email: mgunes@unr.edu
– sequence: 4
  givenname: Murat
  surname: Yuksel
  fullname: Yuksel, Murat
  email: murat.yuksel@ucf.edu
BookMark eNqNj09Lw0AQxReqUPvnLHjq0UviTGc36Ryl2CoUerHnZXcz26bVBJqAX99V8wE8PN5jhvfgN1E3TduIUvcIOaI2T4QIsDR5ctagR2qSrkCamcxYzbvuDOmPqyS6Uw_7ZrGpj6e-bo4pXGXxVfen3zRTt9F9dDIffKoOm5f39Wu222_f1s-7zCFDn0UCI6UvJLAXFNaIBReVc14oIGkC0I6WMRoW8rSqvAvel1VpArtKA01V_rfrwqf1bXvpLIL9YbEDix1YrL_WElPh8Z8F-gbcNEo4
ContentType Conference Proceeding
Copyright 2017 ACM
Copyright_xml – notice: 2017 ACM
DOI 10.1145/3110025.3119404
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Editor Diesner, Jana
Ferrari, Elena
Xu, Guandong
Editor_xml – sequence: 1
  givenname: Jana
  surname: Diesner
  fullname: Diesner, Jana
– sequence: 2
  givenname: Elena
  surname: Ferrari
  fullname: Ferrari, Elena
– sequence: 3
  givenname: Guandong
  surname: Xu
  fullname: Xu, Guandong
EndPage 1127
GroupedDBID 6IE
6IF
6IL
6IN
AAWTH
ABLEC
ACM
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
GUFHI
IEGSK
LHSKQ
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-a190t-f305e7b6ec9be1e9411696daabe3c1343004a32ff59e3b38dbacbb7d75c9ad403
ISBN 1450349935
9781450349932
IngestDate Thu Jul 10 05:53:10 EDT 2025
IsPeerReviewed false
IsScholarly false
Keywords Reinforcement Learning
Network Formation Game
Guided Self-Organization
Counter Terrorism
Dynamic Network Analysis
Language English
License Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org.
LinkModel OpenURL
MeetingName ASONAM '17: Advances in Social Networks Analysis and Mining 2017
MergedId FETCHMERGED-LOGICAL-a190t-f305e7b6ec9be1e9411696daabe3c1343004a32ff59e3b38dbacbb7d75c9ad403
PageCount 8
ParticipantIDs acm_books_10_1145_3110025_3119404
acm_books_10_1145_3110025_3119404_brief
PublicationCentury 2000
PublicationDate 20170731
PublicationDateYYYYMMDD 2017-07-31
PublicationDate_xml – month: 07
  year: 2017
  text: 20170731
  day: 31
PublicationDecade 2010
PublicationPlace New York, NY, USA
PublicationPlace_xml – name: New York, NY, USA
PublicationSeriesTitle ACM Conferences
PublicationTitle Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017
ASONAM 2017 : proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : Sydney, Australia, 31 July-03 August, 2017
PublicationYear 2017
Publisher ACM
Publisher_xml – name: ACM
SSID ssj0002180213
Score 1.654624
Snippet Terrorist organizations have social networks that enable them to recruit and operate around the world. This paper presents a novel computational framework for...
SourceID acm
SourceType Publisher
StartPage 1120
SubjectTerms Computer systems organization
Computer systems organization -- Dependable and fault-tolerant systems and networks
Computer systems organization -- Dependable and fault-tolerant systems and networks -- Redundancy
Human-centered computing
Human-centered computing -- Collaborative and social computing
Human-centered computing -- Collaborative and social computing -- Collaborative and social computing theory, concepts and paradigms
Human-centered computing -- Collaborative and social computing -- Collaborative and social computing theory, concepts and paradigms -- Social networks
Information systems
Information systems -- Information systems applications
Information systems -- Information systems applications -- Collaborative and social computing systems and tools
Information systems -- Information systems applications -- Collaborative and social computing systems and tools -- Social networking sites
Information systems -- World Wide Web
Information systems -- World Wide Web -- Web applications
Information systems -- World Wide Web -- Web applications -- Social networks
Networks
Networks -- Network properties
Networks -- Network properties -- Network reliability
Networks -- Network types
Networks -- Network types -- Overlay and other logical network structures
Theory of computation
Theory of computation -- Theory and algorithms for application domains
Theory of computation -- Theory and algorithms for application domains -- Algorithmic game theory and mechanism design
Theory of computation -- Theory and algorithms for application domains -- Algorithmic game theory and mechanism design -- Algorithmic game theory
Theory of computation -- Theory and algorithms for application domains -- Algorithmic game theory and mechanism design -- Social networks
Subtitle Strategic Destabilization of Terrorist Networks
Title On Fighting Fire with Fire
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWqgdOtFBEW4qChMShCqzX8To-cCgVC4futoeCyinyK9qqJEWb3VLx65lxHg6rStBDL4k9iRzZM7HH45lvCHlDc5oaTGgiUiviRCY0Tg0Gu2vOuLOIseQDhU_EbJZeXMizweBXGwtz80OUZXp7K38-KKuBBszG0Nl7sLtrFAhQBqbDFdgO1zWN-M7F56wjVu35P6y-4hB3dQiecDxdswKGmD88ODiqfQK8l2wTujurPcWrAGDinTN8Zgnfdl_sTsvDCe738dkEptPa0Dvp-dh-dPPfytZ2129q3nrUo5ftalFcz1VRKOt9DI6Ky050P6-anAJTNy9C0Pb31VVV-xmAxKiajKPsqg_Y09C3v8wbtLObdgI5DTtemnCE05GM96ZcUBiHveUbquLupSFBFA2GEHkj_g7uMkEc2UdCDOuwv840N0JUPJ-RMnywRQdr6qMGJQoI79eaRDXHFD0l5XyL7ITuRkEMtsnAlU_JkzZ_R9RM58_I3mkZtcyKkEURMsuXdsjXyafz4y9xkysjVqDSLeMc5m0n9NgZqR118M_RsRxbpbRjhrIEgdUUG-U5l45pllqtjNbCCm6kssmQPScb5XXpXpCIW4fH4VSD6owFOc6lyanD13Qq1S55DR3MUOSrrI5r51kzCFkzCLvk7T_fyTRIQ773H63tk8dBNF6SjeVi5Q7IprlZXlaLV555fwD2XVTW
linkProvider IEEE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+2017+IEEE%2FACM+International+Conference+on+Advances+in+Social+Networks+Analysis+and+Mining+2017&rft.atitle=On+Fighting+Fire+with+Fire&rft.au=Behzadan%2C+Vahid&rft.au=Nourmohammadi%2C+Amin&rft.au=Gunes%2C+Mehmet&rft.au=Yuksel%2C+Murat&rft.series=ACM+Conferences&rft.date=2017-07-31&rft.pub=ACM&rft.isbn=1450349935&rft.spage=1120&rft.epage=1127&rft_id=info:doi/10.1145%2F3110025.3119404
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349932/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349932/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349932/sc.gif&client=summon&freeimage=true