Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/16121
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsmail, A.A.-
dc.contributor.authorGaniyu, S.O.-
dc.contributor.authorAlabi, I.O.-
dc.contributor.authorAbdulrazaq, A.A.-
dc.contributor.authorMuritala, S.-
dc.date.accessioned2022-12-27T04:46:10Z-
dc.date.available2022-12-27T04:46:10Z-
dc.date.issued2018-04-
dc.identifier.citationIsmail A. A., Ganiyu, S. O., Alabi, I. O., Abdulrazaq, A. A., & Muritala S. (2018). Hierarchy extraction for covert network destabilization and counterterrorism mechanism. Proceedings of the 1st International Conference on ICT For National Development and Its Sustainability, pp 290 – 302: Ilorin, Nigeria.en_US
dc.identifier.issn2141-3959 ; eISSN: 2141-3959-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/16121-
dc.description.abstractReduction of incessant crimes is the utmost priority of security agencies. Use of intelligence has potential to bring crime rate under minimal control but, organizational structure imbibes by criminal groups has been keeping and protecting covert members. However, extraction of covert members from flat organization structure has some challenges especially in identifying and analyzing high ranking criminals. Therefore, this paper proposed the used of eigenvector centrality for extraction of high rank members that social network analysis considered passive. Furthermore, this approach could offer a robust platform to detect clandestine nodes that attempt to escape detection.en_US
dc.language.isoenen_US
dc.publisherICT4NDS 2018en_US
dc.relation.ispartofseriesICT4NDS;-
dc.subjectcounterterrorismen_US
dc.subjecthierarchyen_US
dc.subjectnetwork destabilizationen_US
dc.subjectnetwork builderen_US
dc.titleHIERARCHY EXTRACTION FOR COVERT NETWORK DESTABILIZATION AND COUNTERTERRORISM MECHANISMHIERARCHY EXTRACTION FOR COVERT NETWORK DESTABILIZATION AND COUNTERTERRORISM MECHANISMen_US
dc.typeArticleen_US
Appears in Collections:Information and Media Technology

Files in This Item:
File Description SizeFormat 
Hierrachy extraction4covert network.pdf306.13 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.