{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:11Z","timestamp":1750306271172,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3025142","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Covert network analysis to detect key players using correlation and social network analysis"],"prefix":"10.1145","author":[{"given":"Ejaz","family":"Farooq","sequence":"first","affiliation":[{"name":"National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"given":"Shoab A.","family":"Khan","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"given":"Wasi Haider","family":"Butt","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hindawi Publishing Corporation","author":"Butt Wasi Haider","year":"2014","unstructured":"Wasi Haider Butt , M. Usman Akram , Shoab A. Khan , and Muhammad Younus Javed , \" Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier\" , Hindawi Publishing Corporation , 2014 Wasi Haider Butt, M. Usman Akram, Shoab A. Khan, and Muhammad Younus Javed, \"Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier\", Hindawi Publishing Corporation, 2014"},{"key":"e_1_3_2_1_2_1","volume-title":"Bill Dalziel and Barbara Schulman, \"Evaluating the Effectiveness of Community-Based Dementia Care Networks: The Dementia Care Networks' Study","author":"Lemieux-Charles Louise","year":"2005","unstructured":"Louise Lemieux-Charles , Larry W. Chambers , Rhonda Cockerill , Susan Jaglal , Kevin Brazil , Carole Cohen , Ken LeClair , Bill Dalziel and Barbara Schulman, \"Evaluating the Effectiveness of Community-Based Dementia Care Networks: The Dementia Care Networks' Study \", 2005 . Louise Lemieux-Charles, Larry W. Chambers, Rhonda Cockerill, Susan Jaglal, Kevin Brazil, Carole Cohen, Ken LeClair, Bill Dalziel and Barbara Schulman, \"Evaluating the Effectiveness of Community-Based Dementia Care Networks: The Dementia Care Networks' Study\", 2005."},{"key":"e_1_3_2_1_3_1","volume-title":"Sumatera Utara","author":"Mahyuddin K.","year":"2011","unstructured":"Mahyuddin K. M. Nasutionl and Maria Elfidal, \"Terrorist Network: Towards An Analysis\", PS Sistem Informasi, STTH, Medan , Sumatera Utara , Indonesia , 2011 Mahyuddin K. M. Nasutionl and Maria Elfidal, \"Terrorist Network: Towards An Analysis\", PS Sistem Informasi, STTH, Medan, Sumatera Utara, Indonesia, 2011"},{"issue":"3","key":"e_1_3_2_1_4_1","first-page":"43","article-title":"Mapping Networks of Terrorist Cells","volume":"24","author":"Krebs V. E.","year":"2002","unstructured":"V. E. Krebs , \" Mapping Networks of Terrorist Cells ,\" INSNA , vol. 24 , no. 3 , pp. 43 -- 52 , 2002 . V. E. Krebs, \"Mapping Networks of Terrorist Cells,\" INSNA, vol. 24, no. 3, pp. 43--52, 2002.","journal-title":"INSNA"},{"volume-title":"Available: http:\/\/www.orgnet.com\/sna.html. {Accessed","year":"2013","key":"e_1_3_2_1_5_1","unstructured":"\"http:\/\/www.orgnet.com\/sna.html,\" {Online}. Available: http:\/\/www.orgnet.com\/sna.html. {Accessed April 2013 }. \"http:\/\/www.orgnet.com\/sna.html,\" {Online}. Available: http:\/\/www.orgnet.com\/sna.html. {Accessed April 2013}."},{"key":"e_1_3_2_1_6_1","volume-title":"Available: http:\/\/www.insna.org\/INSNA\/na_inf.html. {Accessed","author":"Freeman L. C.","year":"2013","unstructured":"L. C. Freeman , \" The Study of Social Networks ,\" {Online}. Available: http:\/\/www.insna.org\/INSNA\/na_inf.html. {Accessed April 2013 }. L. C. Freeman, \"The Study of Social Networks,\" {Online}. Available: http:\/\/www.insna.org\/INSNA\/na_inf.html. {Accessed April 2013}."},{"key":"e_1_3_2_1_7_1","volume-title":"Theoretical And Simulation Approaches,\" SimTecT","author":"Dekker A. H.","year":"2008","unstructured":"A. H. Dekker , \" Centrality In Social Networks : Theoretical And Simulation Approaches,\" SimTecT , 2008 . A. H. Dekker, \"Centrality In Social Networks: Theoretical And Simulation Approaches,\" SimTecT, 2008."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0400087101"},{"key":"e_1_3_2_1_9_1","volume-title":"Generalizing Degree and Shortest Paths,\" Social Networks","author":"F.","year":"2010","unstructured":"F. A.,. S. Tore Opsahl , \" Node Centrality in Weighted Networks : Generalizing Degree and Shortest Paths,\" Social Networks , 2010 . F. A.,. S. Tore Opsahl, \"Node Centrality in Weighted Networks: Generalizing Degree and Shortest Paths,\" Social Networks, 2010."},{"key":"e_1_3_2_1_10_1","volume-title":"Erik Saulel and Umit V. Catalyurekl, \"Incremental Algorithms for Network Management and Analysis based on Closeness Centrality\", arXiv:1303.0422v1 {cs.DS}","author":"Sariy\u00fcce Ahmet Erdem","year":"2013","unstructured":"Ahmet Erdem Sariy\u00fcce , Kamer Kayal , Erik Saulel and Umit V. Catalyurekl, \"Incremental Algorithms for Network Management and Analysis based on Closeness Centrality\", arXiv:1303.0422v1 {cs.DS} , 2013 . Ahmet Erdem Sariy\u00fcce, Kamer Kayal, Erik Saulel and Umit V. Catalyurekl, \"Incremental Algorithms for Network Management and Analysis based on Closeness Centrality\", arXiv:1303.0422v1 {cs.DS}, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(01)00038-7"},{"issue":"3","key":"e_1_3_2_1_12_1","article-title":"Conceptual Distance in Social Network Analysis","volume":"6","author":"Dekker A.","year":"2005","unstructured":"A. Dekker , \" Conceptual Distance in Social Network Analysis ,\" Journal of Social Structure , vol. 6 , no. 3 , 2005 . A. Dekker, \"Conceptual Distance in Social Network Analysis,\" Journal of Social Structure, vol. 6, no. 3, 2005.","journal-title":"Journal of Social Structure"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(94)00248-9"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90017-N"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2011.17"},{"key":"e_1_3_2_1_16_1","volume-title":"Meeting Proceedings. RTO-MP-IST-063","author":"Larsen N. M. a. H. L.","year":"2006","unstructured":"N. M. a. H. L. Larsen , \" Investigative Data Mining Toolkit : A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks,\" in Visualising Network Information (pp. 14--1 -- 14--24) . Meeting Proceedings. RTO-MP-IST-063 , Paper 14. Neuilly-sur-Seine, France , 2006 . N. M. a. H. L. Larsen, \"Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks,\" in Visualising Network Information (pp. 14--1 -- 14--24). Meeting Proceedings. RTO-MP-IST-063, Paper 14. Neuilly-sur-Seine, France, 2006."},{"key":"e_1_3_2_1_17_1","volume-title":"The Case of Enron Email Database,\" in Illinois ACM","author":"J.","year":"2005","unstructured":"J. S. a. J. Adibi, \"Discovering Important Nodes through Graph Entropy , The Case of Enron Email Database,\" in Illinois ACM , Chicago , 2005 . J. S. a. J. Adibi, \"Discovering Important Nodes through Graph Entropy, The Case of Enron Email Database,\" in Illinois ACM, Chicago, 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"S. Karthika \"Identifying Key Players in a Covert Network using \" in IEEE International Conference on Recent Trends in Information Technology 2012.  S. Karthika \"Identifying Key Players in a Covert Network using \" in IEEE International Conference on Recent Trends in Information Technology 2012.","DOI":"10.1109\/ICRTIT.2012.6206756"},{"key":"e_1_3_2_1_19_1","volume-title":"al Qaeda,\" School of Computing Queen's University","author":"Skillicorn D. B.","year":"2004","unstructured":"D. B. Skillicorn , \" Social Network Analysis via Matrix Decompositions : al Qaeda,\" School of Computing Queen's University , 2004 . D. B. Skillicorn, \"Social Network Analysis via Matrix Decompositions : al Qaeda,\" School of Computing Queen's University, 2004."},{"key":"e_1_3_2_1_20_1","volume-title":"International Journal of Applied Information Systems (IJAIS) - ISSN : 2249--0868 Foundation of Computer Science FCS","author":"Verma Tanu","year":"2014","unstructured":"Tanu Verma , Renu and Deepti Gaur, \"Tokenization and Filtering Process in RapidMiner \", International Journal of Applied Information Systems (IJAIS) - ISSN : 2249--0868 Foundation of Computer Science FCS , New York, USA Volume 7--No. 2, 2014 . Tanu Verma, Renu and Deepti Gaur, \"Tokenization and Filtering Process in RapidMiner\", International Journal of Applied Information Systems (IJAIS) - ISSN : 2249--0868 Foundation of Computer Science FCS, New York, USA Volume 7--No. 2, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"NZCSRSC 2008","author":"Huang Anna","year":"2008","unstructured":"Anna Huang , \" Similarity Measures for Text Document Clustering\" , NZCSRSC 2008 , Christchurch, New Zealand , 2008 . Anna Huang, \"Similarity Measures for Text Document Clustering\", NZCSRSC 2008, Christchurch, New Zealand, 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-4896(03)00028-3"},{"key":"e_1_3_2_1_23_1","volume-title":"a. I. Blankers, \"Key player identification : a note on weighted,\" in International Conference on Advances in Social Networks Analysis and Mining","author":"R.","year":"2010","unstructured":"R. L. a. I. Blankers, \"Key player identification : a note on weighted,\" in International Conference on Advances in Social Networks Analysis and Mining , 2010 . R. L. a. I. Blankers, \"Key player identification : a note on weighted,\" in International Conference on Advances in Social Networks Analysis and Mining, 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7083-y"},{"key":"e_1_3_2_1_25_1","volume-title":"Portugal","author":"Narahari N. R. S. Y.","year":"2008","unstructured":"N. R. S. Y. Narahari , \" Determining the Top-k Nodes in Social Networks using the Shapley Value,\" in Int.Conf.on Autonomous Agents and Multiagent Systems , Portugal , 2008 . N. R. S. Y.Narahari, \"Determining the Top-k Nodes in Social Networks using the Shapley Value,\" in Int.Conf.on Autonomous Agents and Multiagent Systems, Portugal, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/10576100390242857"},{"key":"e_1_3_2_1_27_1","unstructured":"J. R. N. K. Kathleen M. Carley \"Destabilizing Terrorist Networks \" in NAACSOS Pittsburgh 2003.  J. R. N. K. Kathleen M. Carley \"Destabilizing Terrorist Networks \" in NAACSOS Pittsburgh 2003."},{"volume-title":"http:\/\/www.elearningpost.com\/articles\/archives\/qa_with_professor_karen_stephenson\/. {Accessed","year":"2013","key":"e_1_3_2_1_28_1","unstructured":"\"http:\/\/www.elearningpost.com\/articles\/archives\/qa_with_professor_karen_stephenson\/,\"{Online}.Available : http:\/\/www.elearningpost.com\/articles\/archives\/qa_with_professor_karen_stephenson\/. {Accessed May 2013 }. \"http:\/\/www.elearningpost.com\/articles\/archives\/qa_with_professor_karen_stephenson\/,\"{Online}.Available: http:\/\/www.elearningpost.com\/articles\/archives\/qa_with_professor_karen_stephenson\/. {Accessed May 2013}."},{"key":"e_1_3_2_1_29_1","article-title":"Document Clustering on Various Similarity Measures","author":"Sruthi K.","year":"2013","unstructured":"Ms. K. Sruthi and Mr. B. Venkateshwar Reddy , \" Document Clustering on Various Similarity Measures \", International Journal of Advanced Research in Computer Science and Software Engineering , 2013 . Ms.K.Sruthi and Mr.B.Venkateshwar Reddy, \"Document Clustering on Various Similarity Measures\", International Journal of Advanced Research in Computer Science and Software Engineering, 2013.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_3_2_1_30_1","volume-title":"CIMI2006","author":"Svenson Pontus","year":"2006","unstructured":"Pontus Svenson , Per Svensson and Hugo Tullberg , \"Social network analysis and information fusion for anti-terrorism \", CIMI2006 , 2006 . Pontus Svenson, Per Svensson and Hugo Tullberg, \"Social network analysis and information fusion for anti-terrorism\", CIMI2006, 2006."},{"issue":"4","key":"e_1_3_2_1_31_1","article-title":"Dominant Features Identification for Covert Nodes in 9\/11 attack using their Profile","volume":"4","author":"Karthika S.","year":"2012","unstructured":"S. Karthika , A. Kiruthiga and S. Bose , \" Dominant Features Identification for Covert Nodes in 9\/11 attack using their Profile \", International Journal of Network Security & Its Applications (IJNSA) , Vol. 4 , No. 4 , July 2012 . S.Karthika, A.Kiruthiga and S.Bose, \"Dominant Features Identification for Covert Nodes in 9\/11 attack using their Profile\", International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.4, July 2012.","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"e_1_3_2_1_32_1","volume-title":"1st International Symposium on Computing in Informatics and Mathematics (ISCIM 2011)","author":"Nuredini Kaltrina","year":"2011","unstructured":"Kaltrina Nuredini , Ozcan Asilkan and Atixhe Ismaili , \" An Exemplary Survey Implementation on Text Mining with Rapid Miner\" , 1st International Symposium on Computing in Informatics and Mathematics (ISCIM 2011) , 2011 . Kaltrina Nuredini, Ozcan Asilkan and Atixhe Ismaili, \"An Exemplary Survey Implementation on Text Mining with Rapid Miner\", 1st International Symposium on Computing in Informatics and Mathematics (ISCIM 2011), 2011."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556497"},{"key":"e_1_3_2_1_34_1","volume-title":"Brian Delaney and Gerald O'Leary, \"Modeling and Detection Techniques for Counter-Terror Social Network Analysis and Intent Recognition","author":"Weinstein Clifford","year":"2009","unstructured":"Clifford Weinstein , William Campbell , Brian Delaney and Gerald O'Leary, \"Modeling and Detection Techniques for Counter-Terror Social Network Analysis and Intent Recognition \", IEEE , 2009 . Clifford Weinstein, William Campbell, Brian Delaney and Gerald O'Leary, \"Modeling and Detection Techniques for Counter-Terror Social Network Analysis and Intent Recognition\", IEEE, 2009."}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3025142","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3025142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:40Z","timestamp":1750221520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3025142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":34,"alternative-id":["10.1145\/3018896.3025142","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3025142","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}