On Fighting Fire with Fire Strategic Destabilization of Terrorist Networks
Terrorist organizations have social networks that enable them to recruit and operate around the world. This paper presents a novel computational framework for derivation of optimal destabilization strategies against dynamic social networks of terrorists. We develop a game-theoretic model to capture...
Uloženo v:
| Abstract | Terrorist organizations have social networks that enable them to recruit and operate around the world. This paper presents a novel computational framework for derivation of optimal destabilization strategies against dynamic social networks of terrorists. We develop a game-theoretic model to capture the distributed and complex dynamics of terrorist organizations, and introduce a technique for estimation of such dynamics from incomplete snapshots of target networks. Furthermore, we propose a mechanism for devising the optimal sequence of actions that drive the internal dynamics of targeted organizations towards an arbitrary state of instability. The performance of this framework is evaluated on a model of the Al-Qaeda network in 2001, verifying the efficacy of our proposals for counter-terrorism applications. |
|---|---|
| AbstractList | Terrorist organizations have social networks that enable them to recruit and operate around the world. This paper presents a novel computational framework for derivation of optimal destabilization strategies against dynamic social networks of terrorists. We develop a game-theoretic model to capture the distributed and complex dynamics of terrorist organizations, and introduce a technique for estimation of such dynamics from incomplete snapshots of target networks. Furthermore, we propose a mechanism for devising the optimal sequence of actions that drive the internal dynamics of targeted organizations towards an arbitrary state of instability. The performance of this framework is evaluated on a model of the Al-Qaeda network in 2001, verifying the efficacy of our proposals for counter-terrorism applications. |
| Author | Gunes, Mehmet Nourmohammadi, Amin Behzadan, Vahid Yuksel, Murat |
| Author_xml | – sequence: 1 givenname: Vahid surname: Behzadan fullname: Behzadan, Vahid email: behzadan@ksu.edu – sequence: 2 givenname: Amin surname: Nourmohammadi fullname: Nourmohammadi, Amin email: mnourmohammadi@unr.edu – sequence: 3 givenname: Mehmet surname: Gunes fullname: Gunes, Mehmet email: mgunes@unr.edu – sequence: 4 givenname: Murat surname: Yuksel fullname: Yuksel, Murat email: murat.yuksel@ucf.edu |
| BookMark | eNqNj09Lw0AQxReqUPvnLHjq0UviTGc36Ryl2CoUerHnZXcz26bVBJqAX99V8wE8PN5jhvfgN1E3TduIUvcIOaI2T4QIsDR5ctagR2qSrkCamcxYzbvuDOmPqyS6Uw_7ZrGpj6e-bo4pXGXxVfen3zRTt9F9dDIffKoOm5f39Wu222_f1s-7zCFDn0UCI6UvJLAXFNaIBReVc14oIGkC0I6WMRoW8rSqvAvel1VpArtKA01V_rfrwqf1bXvpLIL9YbEDix1YrL_WElPh8Z8F-gbcNEo4 |
| ContentType | Conference Proceeding |
| Copyright | 2017 ACM |
| Copyright_xml | – notice: 2017 ACM |
| DOI | 10.1145/3110025.3119404 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| Editor | Diesner, Jana Ferrari, Elena Xu, Guandong |
| Editor_xml | – sequence: 1 givenname: Jana surname: Diesner fullname: Diesner, Jana – sequence: 2 givenname: Elena surname: Ferrari fullname: Ferrari, Elena – sequence: 3 givenname: Guandong surname: Xu fullname: Xu, Guandong |
| EndPage | 1127 |
| GroupedDBID | 6IE 6IF 6IL 6IN AAWTH ABLEC ACM ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI IEGSK LHSKQ OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-a190t-f305e7b6ec9be1e9411696daabe3c1343004a32ff59e3b38dbacbb7d75c9ad403 |
| ISBN | 1450349935 9781450349932 |
| IngestDate | Thu Jul 10 05:53:10 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Keywords | Reinforcement Learning Network Formation Game Guided Self-Organization Counter Terrorism Dynamic Network Analysis |
| Language | English |
| License | Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org. |
| LinkModel | OpenURL |
| MeetingName | ASONAM '17: Advances in Social Networks Analysis and Mining 2017 |
| MergedId | FETCHMERGED-LOGICAL-a190t-f305e7b6ec9be1e9411696daabe3c1343004a32ff59e3b38dbacbb7d75c9ad403 |
| PageCount | 8 |
| ParticipantIDs | acm_books_10_1145_3110025_3119404 acm_books_10_1145_3110025_3119404_brief |
| PublicationCentury | 2000 |
| PublicationDate | 20170731 |
| PublicationDateYYYYMMDD | 2017-07-31 |
| PublicationDate_xml | – month: 07 year: 2017 text: 20170731 day: 31 |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY, USA |
| PublicationPlace_xml | – name: New York, NY, USA |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 ASONAM 2017 : proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : Sydney, Australia, 31 July-03 August, 2017 |
| PublicationYear | 2017 |
| Publisher | ACM |
| Publisher_xml | – name: ACM |
| SSID | ssj0002180213 |
| Score | 1.654624 |
| Snippet | Terrorist organizations have social networks that enable them to recruit and operate around the world. This paper presents a novel computational framework for... |
| SourceID | acm |
| SourceType | Publisher |
| StartPage | 1120 |
| SubjectTerms | Computer systems organization Computer systems organization -- Dependable and fault-tolerant systems and networks Computer systems organization -- Dependable and fault-tolerant systems and networks -- Redundancy Human-centered computing Human-centered computing -- Collaborative and social computing Human-centered computing -- Collaborative and social computing -- Collaborative and social computing theory, concepts and paradigms Human-centered computing -- Collaborative and social computing -- Collaborative and social computing theory, concepts and paradigms -- Social networks Information systems Information systems -- Information systems applications Information systems -- Information systems applications -- Collaborative and social computing systems and tools Information systems -- Information systems applications -- Collaborative and social computing systems and tools -- Social networking sites Information systems -- World Wide Web Information systems -- World Wide Web -- Web applications Information systems -- World Wide Web -- Web applications -- Social networks Networks Networks -- Network properties Networks -- Network properties -- Network reliability Networks -- Network types Networks -- Network types -- Overlay and other logical network structures Theory of computation Theory of computation -- Theory and algorithms for application domains Theory of computation -- Theory and algorithms for application domains -- Algorithmic game theory and mechanism design Theory of computation -- Theory and algorithms for application domains -- Algorithmic game theory and mechanism design -- Algorithmic game theory Theory of computation -- Theory and algorithms for application domains -- Algorithmic game theory and mechanism design -- Social networks |
| Subtitle | Strategic Destabilization of Terrorist Networks |
| Title | On Fighting Fire with Fire |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWqgdOtFBEW4qChMShCqzX8To-cCgVC4futoeCyinyK9qqJEWb3VLx65lxHg6rStBDL4k9iRzZM7HH45lvCHlDc5oaTGgiUiviRCY0Tg0Gu2vOuLOIseQDhU_EbJZeXMizweBXGwtz80OUZXp7K38-KKuBBszG0Nl7sLtrFAhQBqbDFdgO1zWN-M7F56wjVu35P6y-4hB3dQiecDxdswKGmD88ODiqfQK8l2wTujurPcWrAGDinTN8Zgnfdl_sTsvDCe738dkEptPa0Dvp-dh-dPPfytZ2129q3nrUo5ftalFcz1VRKOt9DI6Ky050P6-anAJTNy9C0Pb31VVV-xmAxKiajKPsqg_Y09C3v8wbtLObdgI5DTtemnCE05GM96ZcUBiHveUbquLupSFBFA2GEHkj_g7uMkEc2UdCDOuwv840N0JUPJ-RMnywRQdr6qMGJQoI79eaRDXHFD0l5XyL7ITuRkEMtsnAlU_JkzZ_R9RM58_I3mkZtcyKkEURMsuXdsjXyafz4y9xkysjVqDSLeMc5m0n9NgZqR118M_RsRxbpbRjhrIEgdUUG-U5l45pllqtjNbCCm6kssmQPScb5XXpXpCIW4fH4VSD6owFOc6lyanD13Qq1S55DR3MUOSrrI5r51kzCFkzCLvk7T_fyTRIQ773H63tk8dBNF6SjeVi5Q7IprlZXlaLV555fwD2XVTW |
| linkProvider | IEEE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+2017+IEEE%2FACM+International+Conference+on+Advances+in+Social+Networks+Analysis+and+Mining+2017&rft.atitle=On+Fighting+Fire+with+Fire&rft.au=Behzadan%2C+Vahid&rft.au=Nourmohammadi%2C+Amin&rft.au=Gunes%2C+Mehmet&rft.au=Yuksel%2C+Murat&rft.series=ACM+Conferences&rft.date=2017-07-31&rft.pub=ACM&rft.isbn=1450349935&rft.spage=1120&rft.epage=1127&rft_id=info:doi/10.1145%2F3110025.3119404 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349932/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349932/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781450349932/sc.gif&client=summon&freeimage=true |

