Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNet
نویسندگان
چکیده
Homeland security researchers and analysts more than ever must process large volumes of textual information. Information extraction techniques have been proposed to help alleviate the burden of information overload. Information extraction techniques, however, require retraining and/or knowledge re-engineering when document types vary as in the homeland security domain. Also, while effectively reducing the volume of the information, information extraction techniques do not point researchers to unanticipated interesting relationships identified within the text. We present the Arizona TerrorNet, a system that utilizes less specified information extraction rules to extract less choreographed relationships between known terrorists. Extracted relations are combined in a network and visualized using a network visualizer. We processed 200 unseen documents using the TerrorNet which extracted over 200 relationships between known terrorists. An Al Qaeda network expert made a preliminary inspection of the network and confirmed many of the network links.
منابع مشابه
Preserving State Government Web Publications - First-Year Experiences
Government information publishing on the web encounters differing expectations concerning the permanence of documents. Presumptions of informality in web authoring and publishing widely persist. But, terms like "government documents" convey, at least to the layman, an expectation of formality, official content, and permanence. If permanent, searchable archives of electronic documents are to be ...
متن کاملUsing Trust and Provenance for Content Filtering on the Semantic Web
Social networks are a popular movement on the web. Trust can be used effectively on the Semantic Web as annotations to social relationships. In this paper, we present a two level approach to integrating trust, provenance, and annotations in Semantic Web systems. We describe an algorithm for inferring trust relationships using provenance information and trust annotations in Semantic Web-based so...
متن کاملTerrorism Networks and Trade
We study the impact of transnational terrorism diffusion on security and trade. We set a simple theoretical model predicting that the closer a country to a source of terrorism, the higher the negative spillovers on its trade. The idea is that security measures, which impede trade, are directed both against the source country of terror and its neighbor countries where terrorism may diffuse. In c...
متن کاملA Framework for Transformations of XML within the Binary Domain
Since XML-formatted content and data is becoming the medium of communication par excellence on intranets and the Internet, the requirements to minimize the network load caused by XML-based traffic and the processing time is more and more important. Due to the verbosity of XML, the need for an efficient serialization of XML data becomes more relevant. In order to reduce this overhead, MPEG-7 Sys...
متن کاملInvestigating the Impact of Authors’ Rank in Bibliographic Networks on Expertise Retrieval
Background and Aim: this research investigates the impact of authors’ rank in Bibliographic networks on document-centered model of Expertise Retrieval. Its purpose is to find out what kind of authors’ ranking in bibliographic networks can improve the performance of document-centered model. Methodology: Current research is an experimental one. To operationalize research goals, a new test colle...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005