logo

An Efficient Methodology to Predict the Terrorist Threat using Data Fusion Approach for Warning Indications

Authors
  • Saurabh Singh

    Author
  • Dinkar Dubey

    Author
  • Akhilesh Tiwari

    Author
Abstract

Terrorist network analysis is important for predicting terror attacks and for obtaining significant data from unauthenticated data available. Graphical analysis is the most instructive tool for interpreting complex terror networks. In the proposed study, the data set from the 26/11 Mumbai attack terrorist was considered for analyzing the terrorist network by employing a data fusion approach. The study also focuses on identifying the key node to predict the terror threat accurately. From the measurement analysis, it was found that Wassi was predominant in leading the attack and was a prominent controlling agent. The data was in alignment with the report obtained from the government. 

References

[1] Roper, W. E. (2003). Spatial Data Fusion

for Infrastructure Condition Assessment

(pp. 270-288). Technical Memorandum of

Public Works Research Institute.

[2] Steinberg, A. N. (2005, July). An

approach to threat assessment. In 2005 7th

International Conference on Information

Fusion (Vol. 2, pp. 8-pp). IEEE.

[3] Chen, G., Shen, D., Kwan, C., Cruz, J. B.,

and Kruger, M. (2006, July). Game

theoretic approach to threat prediction and situation awareness. In 2006 9th

International Conference on Information

Fusion (pp. 1-8). IEEE.

[4] Benavoli, A., Ristic, B., Farina, A.,

Oxenham, M., and Chisci,L. (2007, July).

An approach to threat assessment based

on evidential network In 2007 10th

International Conference on Information

Fusion (pp. 1-8). IEEE.

[5] Liang, Y. (20017, August). An

approximate reasoning model for situation

and threat assessment. In Fourth

International Conference on Fuzzy

Systems and Knowledge Discovery

(FSKD 2007) (Vol.4, pp. 246-250). IEEE.

[6] Najgebauer, A., Antkiewicz, R.,

Chmielewski, M., and Kasprzak, R.

(2008). The prediction of terrorist threat

on the basis of semantic association

acquisition and complex network

evolution. Journal of Telecommunication

and Information Technology, 14-20.

[7] Sambhoos, K., Nagi, R., Sudit, M., and

Stotz, A. (2010). Enhancement to high

level data fusion using graph matching

and state space search. Information

Fusion, 11(4), 351-364.

[8] McDaniel, D., and Schaefer, G. (2014,

May). A data fusion approach to

indications and warnings of terrorist

attacks. In Next-Generation Analyst II

(Vol. 9122, p. 912204). International

Society for Optics and Photonics.

[9] Xuan, D., Yu, H., and Wang, J. (2014,

December). A novel method of centrality

in terrorist network. In 2014 Seventh

International Symposium on

computational Intelligence and Design

(Vol. 2, pp. 144-149). IEEE.

[10] Petris, S., Georgoulis, C., Soldatos, J.,

Giordani, I., Sormani, R., and Djordjevic,

D.(2014). Predicting terroristic attacks in urban environments: an internet-of-things

approach. International Journal of

Security and its Applications, 8(4), 195-

218.

[11] Singh, S., Verma, S., and Tiwari, A.

(2018). An innovative approach for

identification of pivotal node in terrorist

network using promethee method (an antiterrorism approach). International Journal

of Engineering and Technology, 7(1), 95-

99

[12] Saidi,F., Trabelsi, Z., and Ghazela, H. B.

(2018, May). A novel approach for

terrorist sub-communities detection based

on constrained evidential clustering. In

218 12th International Conference on

Research Challenges in Information

Science (RCIS) (pp. 1-8). IEEE.

[13] Basu, K., Zhou, C., Sen, A., and Goliber,

V. H. (2018, December). A Novel Graph

Analytic Approach to Monitor Terrorist

Networks. In 2018 IEEE Intl Conf on

Parallel and Distributed Processing with

Applications, Ubiquitous Computing and

Communications, Big Data and Cloud

Computing, Social Computing and

Networking, Sustainable Computing and

Communications (ISPA/IUCC/BDCloud/

SocialCom/SustainCom) (pp. 1159-1166).

IEEE.

[14] Saurabh Singh, Shashikant Verma,

Akhilesh Tiwari. (2019). Identification of

Pivotal node in Terrorist Network using

TOPSIS Method. International Journal of

Innovative Technology and Exploring

Engineering (IJITEE) ISSN: 2278-3075,

Volume-8 Issue-9.

[15] Berzinji, A., Kaati, L., and Rezine, A.

(2012, August). Detecting key players in

terrorist networks. In 2012 European

Intelligence and Security Informatics

Conference (pp. 297-302). IEEE.

[16] Campedelli, G. M., Cruickshank, I., and

Carley, K. M. (2019). A complex

networks approach to find latent clusters

of terrorist groups. Applied Network

Science, 4(1), 59.

[17] Yusof, N., and Rahman, A. A. (2009,

April). Students' interactions in online

asynchronous discussion forum: A Social

Network Analysis. In 2009 International

Conference on Education Technology and

Computer (pp. 25-29). IEEE.

[18] Choudhary, P., and Singh, U. (2015). A

survey on social network analysis for

counter-terrorism. International Journal of

Computer Applications, 112(9), 24-29.

[19] A report on Mumbai attack, “Mumbai

terrorist attack (Nov. 26-29, 2008)”, Govt.

of India, 2009.

[20] Everett, M., and Borgatti, S. P. (2005).

Ego network betweenness. Social

networks, 27(1), 31-38.

[21] Lv, L., Zhang, K., Zhang, T., Bardou, D.,

Zhang, J., and Cai, Y. (2019). PageRank

centrality for temporal networks. Physics

Letters A, 383(12), 1215-1222.

[22] Landherr, A., Friedl, B., and Heidemann,

J. (2010). A critical review of centrality

measures in social networks. Business and

Information Systems Engineering, 2(6),

371-385.

Cover Image
Cover image of Inaugural Issue
Downloads
Published
2026-03-10
Section
Articles

How to Cite

An Efficient Methodology to Predict the Terrorist Threat using Data Fusion Approach for Warning Indications. (2026). Journal of Integrated Engineering Innovation & Applications, 1(4). https://joieia.com/index.php/home/article/view/15