Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/15662
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsmail, A. A.-
dc.contributor.authorGaniyu, S. O-
dc.contributor.authorAlabi, I. O-
dc.contributor.authorAbdulrazaq, A. A.-
dc.contributor.authorMuritala, S.-
dc.date.accessioned2022-12-20T16:41:34Z-
dc.date.available2022-12-20T16:41:34Z-
dc.date.issued2018-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/15662-
dc.description.abstractReduction of incessant crimes is the utmost priority of security agencies. Use of intelligence has potential to bring crime rate under minimal control but, organizational structure imbibes by criminal groups has been keeping and protecting covert members. However, extraction of covert members from flat organization structure has some challenges especially in identifying and analyzing high ranking criminals. Therefore, this paper proposed the used of eigenvector centrality for extraction of high rank members that social network analysis considered passive. Furthermore, this approach could offer a robust platform to detect clandestine nodes that attempt to escape detection.en_US
dc.language.isoenen_US
dc.publisher1st International Conference on ICT for National Development and Its Sustainability, Faculty of Communication and Information Sciences, University of Ilorin, Ilorinen_US
dc.subjectcounterterrorismen_US
dc.subjecthierarchyen_US
dc.subjectnetwork destabilizationen_US
dc.subjectnetwork builderen_US
dc.titleHierarchy Extraction for Covert Network Destabilization and Counterterrorism Mechanismen_US
dc.typeArticleen_US
Appears in Collections:Information and Media Technology

Files in This Item:
File Description SizeFormat 
Hierarchy extraction for covert network destabilization and counterterrorism mechanism.pdf304.88 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.