Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2013
DOI: 10.1145/2492517.2492602
|View full text |Cite
|
Sign up to set email alerts
|

Networks and network analysis for defence and security

Abstract: Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. For example, acts of terrorism and organized crime are considered one of the greatest threats to national security. In the UK alone, the social and economic costs associated… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 1 publication
0
8
0
2
Order By: Relevance
“…Fig. 11 Adapted from Edward De Bono's six thinking hats [74,75] 34 Sometimes with deadly consequences as Edward Tufte [73] concluded as part of the Challenger Space Shuttle accident investigation. 35 Parentheticals are from the Cynefin Framework H1N1, SARS, H5N1, HIV/AIDS and Ebola are part of a long list of emerging lethal diseases that comprise and challenge the notion of global health security.…”
Section: Synthesis Based Decision Makingmentioning
confidence: 99%
“…Fig. 11 Adapted from Edward De Bono's six thinking hats [74,75] 34 Sometimes with deadly consequences as Edward Tufte [73] concluded as part of the Challenger Space Shuttle accident investigation. 35 Parentheticals are from the Cynefin Framework H1N1, SARS, H5N1, HIV/AIDS and Ebola are part of a long list of emerging lethal diseases that comprise and challenge the notion of global health security.…”
Section: Synthesis Based Decision Makingmentioning
confidence: 99%
“…Then the server continuously records and creates a backlog queue to interfere with the Ack response from the client sending the Syn packet, the backlog provided is very small. In the backlog queue when it is full, the system will not accommodate other TCP Syn packets that enter, resulting in the server hangs [16]. The TCP Syn-Ack packet queue in the backlog can only be wasted when the specified time is up, TCP and shows that there is no response from the sender.…”
Section: Related Researchmentioning
confidence: 99%
“…Such an analysis requires data that, unlike the information normally employed by criminologists, bears directly on these membership ties. By examining these data, the researcher can explore in detail the social behaviour of criminal groups and organizations [ 3 12 ] and terrorists operations [ 13 – 15 ]. This focus on the ties or links between group members is what accounts for the success of social network analysis in the study of criminal organizations [ 16 – 25 ].…”
Section: Introductionmentioning
confidence: 99%