An Efficient Methodology to Predict the Terrorist Threat using Data Fusion Approach for Warning Indications
- Authors
-
-
Saurabh Singh
Author -
Dinkar Dubey
Author -
Akhilesh Tiwari
Author
-
- Abstract
-
Terrorist network analysis is important for predicting terror attacks and for obtaining significant data from unauthenticated data available. Graphical analysis is the most instructive tool for interpreting complex terror networks. In the proposed study, the data set from the 26/11 Mumbai attack terrorist was considered for analyzing the terrorist network by employing a data fusion approach. The study also focuses on identifying the key node to predict the terror threat accurately. From the measurement analysis, it was found that Wassi was predominant in leading the attack and was a prominent controlling agent. The data was in alignment with the report obtained from the government.
- References
-
[1] Roper, W. E. (2003). Spatial Data Fusion
for Infrastructure Condition Assessment
(pp. 270-288). Technical Memorandum of
Public Works Research Institute.
[2] Steinberg, A. N. (2005, July). An
approach to threat assessment. In 2005 7th
International Conference on Information
Fusion (Vol. 2, pp. 8-pp). IEEE.
[3] Chen, G., Shen, D., Kwan, C., Cruz, J. B.,
and Kruger, M. (2006, July). Game
theoretic approach to threat prediction and situation awareness. In 2006 9th
International Conference on Information
Fusion (pp. 1-8). IEEE.
[4] Benavoli, A., Ristic, B., Farina, A.,
Oxenham, M., and Chisci,L. (2007, July).
An approach to threat assessment based
on evidential network In 2007 10th
International Conference on Information
Fusion (pp. 1-8). IEEE.
[5] Liang, Y. (20017, August). An
approximate reasoning model for situation
and threat assessment. In Fourth
International Conference on Fuzzy
Systems and Knowledge Discovery
(FSKD 2007) (Vol.4, pp. 246-250). IEEE.
[6] Najgebauer, A., Antkiewicz, R.,
Chmielewski, M., and Kasprzak, R.
(2008). The prediction of terrorist threat
on the basis of semantic association
acquisition and complex network
evolution. Journal of Telecommunication
and Information Technology, 14-20.
[7] Sambhoos, K., Nagi, R., Sudit, M., and
Stotz, A. (2010). Enhancement to high
level data fusion using graph matching
and state space search. Information
Fusion, 11(4), 351-364.
[8] McDaniel, D., and Schaefer, G. (2014,
May). A data fusion approach to
indications and warnings of terrorist
attacks. In Next-Generation Analyst II
(Vol. 9122, p. 912204). International
Society for Optics and Photonics.
[9] Xuan, D., Yu, H., and Wang, J. (2014,
December). A novel method of centrality
in terrorist network. In 2014 Seventh
International Symposium on
computational Intelligence and Design
(Vol. 2, pp. 144-149). IEEE.
[10] Petris, S., Georgoulis, C., Soldatos, J.,
Giordani, I., Sormani, R., and Djordjevic,
D.(2014). Predicting terroristic attacks in urban environments: an internet-of-things
approach. International Journal of
Security and its Applications, 8(4), 195-
218.
[11] Singh, S., Verma, S., and Tiwari, A.
(2018). An innovative approach for
identification of pivotal node in terrorist
network using promethee method (an antiterrorism approach). International Journal
of Engineering and Technology, 7(1), 95-
99
[12] Saidi,F., Trabelsi, Z., and Ghazela, H. B.
(2018, May). A novel approach for
terrorist sub-communities detection based
on constrained evidential clustering. In
218 12th International Conference on
Research Challenges in Information
Science (RCIS) (pp. 1-8). IEEE.
[13] Basu, K., Zhou, C., Sen, A., and Goliber,
V. H. (2018, December). A Novel Graph
Analytic Approach to Monitor Terrorist
Networks. In 2018 IEEE Intl Conf on
Parallel and Distributed Processing with
Applications, Ubiquitous Computing and
Communications, Big Data and Cloud
Computing, Social Computing and
Networking, Sustainable Computing and
Communications (ISPA/IUCC/BDCloud/
SocialCom/SustainCom) (pp. 1159-1166).
IEEE.
[14] Saurabh Singh, Shashikant Verma,
Akhilesh Tiwari. (2019). Identification of
Pivotal node in Terrorist Network using
TOPSIS Method. International Journal of
Innovative Technology and Exploring
Engineering (IJITEE) ISSN: 2278-3075,
Volume-8 Issue-9.
[15] Berzinji, A., Kaati, L., and Rezine, A.
(2012, August). Detecting key players in
terrorist networks. In 2012 European
Intelligence and Security Informatics
Conference (pp. 297-302). IEEE.
[16] Campedelli, G. M., Cruickshank, I., and
Carley, K. M. (2019). A complex
networks approach to find latent clusters
of terrorist groups. Applied Network
Science, 4(1), 59.
[17] Yusof, N., and Rahman, A. A. (2009,
April). Students' interactions in online
asynchronous discussion forum: A Social
Network Analysis. In 2009 International
Conference on Education Technology and
Computer (pp. 25-29). IEEE.
[18] Choudhary, P., and Singh, U. (2015). A
survey on social network analysis for
counter-terrorism. International Journal of
Computer Applications, 112(9), 24-29.
[19] A report on Mumbai attack, “Mumbai
terrorist attack (Nov. 26-29, 2008)”, Govt.
of India, 2009.
[20] Everett, M., and Borgatti, S. P. (2005).
Ego network betweenness. Social
networks, 27(1), 31-38.
[21] Lv, L., Zhang, K., Zhang, T., Bardou, D.,
Zhang, J., and Cai, Y. (2019). PageRank
centrality for temporal networks. Physics
Letters A, 383(12), 1215-1222.
[22] Landherr, A., Friedl, B., and Heidemann,
J. (2010). A critical review of centrality
measures in social networks. Business and
Information Systems Engineering, 2(6),
371-385.
- Downloads
- Published
- 2026-03-10
- Section
- Articles
How to Cite
Most read articles by the same author(s)
- Dinkar Dubey, Han Jian Ting, Sahil Patel, Optimizing the Inventory System in Fuzzy Environment Using Ramp Type Demand Function , Journal of Integrated Engineering Innovation & Applications: Vol. 1 No. 4 (2025): Inaugural Issue