{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T16:09:39Z","timestamp":1776614979112,"version":"3.51.2"},"reference-count":38,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004054","name":"King Abdulaziz University","doi-asserted-by":"publisher","award":["DF-461-156-1441"],"award-info":[{"award-number":["DF-461-156-1441"]}],"id":[{"id":"10.13039\/501100004054","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2020,4,22]]},"abstract":"<jats:p>One of the most important threats to today\u2019s civilization is terrorism. Terrorism not only disturbs the law and order situations in a society but also affects the quality of lives of humans and makes them suppressed physically and emotionally and deprives them of enjoying life. The more the civilizations have advanced, the more the people are working towards exploring different mechanisms to protect the mankind from terrorism. Different techniques have been used as counterterrorism to protect the lives of individuals in society and to improve the quality of life in general. Machine learning methods have been recently explored to develop techniques for counterterrorism based on artificial intelligence (AI). Since deep learning has recently gained more popularity in machine learning domain, in this paper, these techniques are explored to understand the behavior of terrorist activities. Five different models based on deep neural network (DNN) are created to understand the behavior of terrorist activities such as is the attack going to be successful or not? Or whether the attack is going to be suicide or not? Or what type of weapon is going to be used in the attack? Or what type of attack is going to be carried out? Or what region is going to be attacked? The models are implemented in single-layer neural network (NN), five-layer DNN, and three traditional machine learning algorithms, i.e., logistic regression, SVM, and Na\u00efve Bayes. The performance of the DNN is compared with NN and the three machine learning algorithms, and it is demonstrated that the performance in DNN is more than 95% in terms of accuracy, precision, recall, and F1-Score, while ANN and traditional machine learning algorithms have achieved a maximum of 83% accuracy. This concludes that DNN is a suitable model to be used for predicting the behavior of terrorist activities. Our experiments also demonstrate that the dataset for terrorist activities is big data; therefore, a DNN is a suitable model to process big data and understand the underlying patterns in the dataset.<\/jats:p>","DOI":"10.1155\/2020\/1373087","type":"journal-article","created":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T23:30:33Z","timestamp":1587598233000},"page":"1-16","source":"Crossref","is-referenced-by-count":67,"title":["Prediction of Future Terrorist Activities Using Deep Neural Networks"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1355-3881","authenticated-orcid":true,"given":"M. Irfan","family":"Uddin","sequence":"first","affiliation":[{"name":"Institute of Computing, Kohat University of Science and Technology, Kohat, Pakistan"}]},{"given":"Nazir","family":"Zada","sequence":"additional","affiliation":[{"name":"Center for Excellence in IT, Institute of Management Sciences, Peshawar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0906-1323","authenticated-orcid":true,"given":"Furqan","family":"Aziz","sequence":"additional","affiliation":[{"name":"Center for Excellence in IT, Institute of Management Sciences, Peshawar, Pakistan"}]},{"given":"Yousaf","family":"Saeed","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of Haripur, Haripur, Pakistan"}]},{"given":"Asim","family":"Zeb","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Abbotabad University of Science and Technology, Havelian, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4275-9731","authenticated-orcid":true,"given":"Syed Atif","family":"Ali Shah","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Information Technology, Northern University, Nowshehra, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1698-0237","authenticated-orcid":true,"given":"Mahmoud Ahmad","family":"Al-Khasawneh","sequence":"additional","affiliation":[{"name":"Faculty of Computer & Information Technology, Al-Madinah International University, Kuala Lumpur, Malaysia"}]},{"given":"Marwan","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"King Abdulaziz University, Jeddah, Saudi Arabia"}]}],"member":"311","reference":[{"key":"1","volume-title":"A conjoint application of data mining techniques for analysis of global terrorist attacks\u2014prevention and prediction for combating terrorism","year":"2019"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1080\/1057610x.2013.802973"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11127-010-9601-1"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1177\/2516606918765494"},{"key":"5","first-page":"571","volume":"8","year":"2018","journal-title":"International Journal of Machine Learning and Computing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2895832"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5843932"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.4236\/ojmsi.2015.34017"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.7603\/s40601-014-0021-9"},{"key":"13","first-page":"25","volume-title":"Prediction of unsolved terrorist attacks using group detection algorithms","year":"2009"},{"key":"14","first-page":"229","volume-title":"A neural network for counter-terrorism","year":"2011"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.4172\/2167-0374.1000115"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0179057"},{"key":"21","first-page":"06","volume":"119","year":"2018","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5676712"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi7090354"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi8030133"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.a1768.109119"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.d7590.118419"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0185-6"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5192861"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9428612"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/1357853"},{"key":"33","first-page":"761","volume":"8","year":"2007","journal-title":"Journal of Machine Learning Research"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"issue":"17","key":"35","first-page":"1","volume":"18","year":"2017","journal-title":"Journal of Machine Learning Research"},{"key":"36","year":"1998"},{"key":"37","year":"1997"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/bf02551274"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/s0893-6080(98)00116-6"},{"issue":"2","key":"43","first-page":"26","volume":"4","year":"2012","journal-title":"COURSERA: Neural Networks for Machine Learning"},{"key":"45","year":"2016"},{"key":"46","year":"2014"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1021\/acs.molpharmaceut.5b00982"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.038"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2018.091064"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2018.090973"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/1373087.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/1373087.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/1373087.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T23:30:38Z","timestamp":1587598238000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2020\/1373087\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,22]]},"references-count":38,"alternative-id":["1373087","1373087"],"URL":"https:\/\/doi.org\/10.1155\/2020\/1373087","relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,22]]}}}