Article ID Journal Published Year Pages File Type
5126767 Social Networks 2017 11 Pages PDF
Abstract

•Graph database theory is applied to map covert networks•Open source media data is collected for the Islamic State (IS) network in Europe•The network is mapped and compared to other covert networks•Robust differences are found between IS and Al-Qaida networks

This paper proposes a new framework, based on graph database theory, for encoding complex data on covert networks, mapping their structure, and conducting a sensitivity analysis. The framework is then applied to reconstruct the terrorist network of the 2015-2016 attacks in Paris and Brussels, and related plots in Europe by the Islamic State group. The resulting network was found to be qualitatively different from the ideologically-related Al-Qaeda network, having a lower secrecy and a lower mean degree, under different network-generating assumptions.

Related Topics
Physical Sciences and Engineering Mathematics Statistics and Probability
Authors
, ,