{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:18Z","timestamp":1750221078278,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301573","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Terrorist Network Analysis and Identification of Main Actors Using Machine Learning Techniques"],"prefix":"10.1145","author":[{"given":"Jawairia","family":"Rasheed","sequence":"first","affiliation":[{"name":"COMSATS University Islamabad"}]},{"given":"Usman","family":"Akram","sequence":"additional","affiliation":[{"name":"EME College NUST"}]},{"given":"Ahmed Kamran","family":"Malik","sequence":"additional","affiliation":[{"name":"COMSATS University Islamabad"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1017\/CBO9780511815478"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.socnet.2016.10.004"},{"unstructured":"C. Comito D. Falcone and D. Talia \"A peak detection method to uncover events from social media.\"  C. Comito D. Falcone and D. Talia \"A peak detection method to uncover events from social media.\"","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.2753\/JEC1086-4415150306"},{"doi-asserted-by":"crossref","unstructured":"I. McCulloh and K. M. Carley \"Detecting change in longitudinal social networks \" Military Academy West Point NY Network Science Center (NSC)2011.  I. McCulloh and K. M. Carley \"Detecting change in longitudinal social networks \" Military Academy West Point NY Network Science Center (NSC)2011.","key":"e_1_3_2_1_5_1","DOI":"10.21307\/joss-2019-031"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.chaos.2018.01.018"},{"key":"e_1_3_2_1_7_1","volume-title":"Understanding terrorism and political violence: The life cycle of birth, growth, transformation, and demise: Routledge","author":"Gupta D. K.","year":"2008","unstructured":"D. K. Gupta , Understanding terrorism and political violence: The life cycle of birth, growth, transformation, and demise: Routledge , 2008 . D. K. Gupta, Understanding terrorism and political violence: The life cycle of birth, growth, transformation, and demise: Routledge, 2008."},{"key":"e_1_3_2_1_8_1","volume-title":"tracking two identified terrorists,\" 2001a) http:\/\/www. orgnet. com\/tnet. html","author":"Krebs V.","year":"2015","unstructured":"V. Krebs , \"Connecting the dots : tracking two identified terrorists,\" 2001a) http:\/\/www. orgnet. com\/tnet. html , 2015 . V. Krebs, \"Connecting the dots: tracking two identified terrorists,\" 2001a) http:\/\/www. orgnet. com\/tnet. html, 2015."},{"key":"e_1_3_2_1_9_1","first-page":"11","article-title":"Social network analysis: An aid in conspiracy investigations","volume":"50","author":"Davis R. H.","year":"1981","unstructured":"R. H. Davis , \" Social network analysis: An aid in conspiracy investigations ,\" FBI L. Enforcement Bull. , vol. 50 , p. 11 , 1981 . R. H. Davis, \"Social network analysis: An aid in conspiracy investigations,\" FBI L. Enforcement Bull., vol. 50, p. 11, 1981.","journal-title":"FBI L. Enforcement Bull."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1186\/1756-0381-1-12"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1209\/epl\/i2003-00194-y"},{"key":"e_1_3_2_1_12_1","first-page":"509","volume-title":"Emergence of scaling in random networks,\" science","author":"Barab\u00e1si A.-L.","year":"1999","unstructured":"A.-L. Barab\u00e1si and R. Albert , \" Emergence of scaling in random networks,\" science , vol. 286 , pp. 509 -- 512 , 1999 . A.-L. Barab\u00e1si and R. Albert, \"Emergence of scaling in random networks,\" science, vol. 286, pp. 509--512, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1155\/2014\/615431"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/S0378-8733(96)00298-5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1007\/s11634-010-0079-y"},{"key":"e_1_3_2_1_16_1","volume-title":"k- core percolation on multiplex networks,\" Physical Review E","author":"Azimi-Tafreshi N.","year":"2014","unstructured":"N. Azimi-Tafreshi , J. G\u00f3mez-Gardenes , and S. Dorogovtsev , \" k- core percolation on multiplex networks,\" Physical Review E , vol. 90 , p. 032816, 2014 . N. Azimi-Tafreshi, J. G\u00f3mez-Gardenes, and S. Dorogovtsev, \"k- core percolation on multiplex networks,\" Physical Review E, vol. 90, p. 032816, 2014."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"2009 IEEE","author":"Weinstein C.","year":"2009","unstructured":"C. Weinstein , W. Campbell , B. Delaney , and G. O'Leary , \"Modeling and detection techniques for counter-terror social network analysis and intent recognition,\" in Aerospace conference , 2009 IEEE , 2009 , pp. 1 -- 16 . C. Weinstein, W. Campbell, B. Delaney, and G. O'Leary, \"Modeling and detection techniques for counter-terror social network analysis and intent recognition,\" in Aerospace conference, 2009 IEEE, 2009, pp. 1--16."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/MILCOM.2016.7795391"},{"key":"e_1_3_2_1_19_1","volume-title":"Significance of machine learning algorithms in professional blogger's classification,\" Computers & Electrical Engineering","author":"Asim Y.","year":"2017","unstructured":"Y. Asim , A. R. Shahid , A. K. Malik , and B. Raza , \" Significance of machine learning algorithms in professional blogger's classification,\" Computers & Electrical Engineering , 2017 . Y. Asim, A. R. Shahid, A. K. Malik, and B. Raza, \"Significance of machine learning algorithms in professional blogger's classification,\" Computers & Electrical Engineering, 2017."},{"key":"e_1_3_2_1_20_1","first-page":"459","volume-title":"2017 IEEE International Conference on","author":"Comito C.","year":"2017","unstructured":"C. Comito , D. Falcone , and D. Talia , \" A peak detection method to uncover events from social media,\" in Data Science and Advanced Analytics (DSAA) , 2017 IEEE International Conference on , 2017 , pp. 459 -- 467 . C. Comito, D. Falcone, and D. Talia, \"A peak detection method to uncover events from social media,\" in Data Science and Advanced Analytics (DSAA), 2017 IEEE International Conference on, 2017, pp. 459--467."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1007\/s00778-017-0467-4"},{"key":"e_1_3_2_1_22_1","volume-title":"a. S. F. E. Roberts","author":"N.","year":"2011","unstructured":"N. a. S. F. E. Roberts . ( 2011 , 15\/3\/2018). Roberts and Everton Terrorist Data: Noordin Top Terrorist Network (Subset) . Available: https:\/\/sites.google.com\/site\/sfeverton18\/research\/appendix-1 N. a. S. F. E. Roberts. (2011, 15\/3\/2018). Roberts and Everton Terrorist Data: Noordin Top Terrorist Network (Subset). Available: https:\/\/sites.google.com\/site\/sfeverton18\/research\/appendix-1"},{"key":"e_1_3_2_1_23_1","first-page":"237","volume-title":"2017 Ninth International Conference on","author":"Malik M. A.","year":"2017","unstructured":"M. A. Malik and M. Kang , \" Euclidean distance based label noise cleaning,\" in Ubiquitous and Future Networks (ICUFN) , 2017 Ninth International Conference on , 2017 , pp. 237 -- 239 . M. A. Malik and M. Kang, \"Euclidean distance based label noise cleaning,\" in Ubiquitous and Future Networks (ICUFN), 2017 Ninth International Conference on, 2017, pp. 237--239."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_25_1","volume-title":"The k-cores of a graph: Western Michigan University","author":"Bickle A.","year":"2010","unstructured":"A. Bickle , The k-cores of a graph: Western Michigan University , 2010 . A. Bickle, The k-cores of a graph: Western Michigan University, 2010."}],"event":{"sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"acronym":"ICIT 2018","name":"ICIT 2018: IoT and Smart City","location":"Hong Kong Hong Kong"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:35Z","timestamp":1750208255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":25,"alternative-id":["10.1145\/3301551.3301573","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301573","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}