2.765

2022影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

恐怖组织网络的时空演化规律

李本先 李孟军 方锦清 仰琎歆

李本先, 李孟军, 方锦清, 仰琎歆. 恐怖组织网络的时空演化规律. 自动化学报, 2013, 39(6): 770-779. doi: 10.3724/SP.J.1004.2013.00770
引用本文: 李本先, 李孟军, 方锦清, 仰琎歆. 恐怖组织网络的时空演化规律. 自动化学报, 2013, 39(6): 770-779. doi: 10.3724/SP.J.1004.2013.00770
LI Ben-Xian, LI Meng-Jun, FANG Jin-Qing, YANG Jin-Xin. Empirical Study on Spatiotemporal Evolution of Terrorism Organization Network. ACTA AUTOMATICA SINICA, 2013, 39(6): 770-779. doi: 10.3724/SP.J.1004.2013.00770
Citation: LI Ben-Xian, LI Meng-Jun, FANG Jin-Qing, YANG Jin-Xin. Empirical Study on Spatiotemporal Evolution of Terrorism Organization Network. ACTA AUTOMATICA SINICA, 2013, 39(6): 770-779. doi: 10.3724/SP.J.1004.2013.00770

恐怖组织网络的时空演化规律

doi: 10.3724/SP.J.1004.2013.00770
基金项目: 

国家自然科学基金(61174151, 60874087)和中国原子能研究院基金(YZ2011-20)资助

详细信息
    通讯作者:

    李本先

Empirical Study on Spatiotemporal Evolution of Terrorism Organization Network

Funds: 

Supported by National Natural Science Foundation of China(61174151, 60874087)and China Institute of Atomic Energy Science Foundation(YZ2011-20)

  • 摘要: 为了理解恐怖组织网络的时空演化特性及形成机理,本文运用统计物理学方法,结合Multi-agent,提出了一个恐怖组织网络的时空演化模型, 并对恐怖组织网络的演化规律进行了数值模拟研究.模拟过程中考虑了恐怖组织网络在时间与空间上节点与边的动态联结变化.研究发现:网络演化过程中, 恐怖组织的网络演化不仅兼具小世界、无标度特性和等级结构,不同级别的中心节点将网络连为一体,而且存在促进恐怖网络不断演化的主要因素, 即与恐怖分子信念的增加及环境资源的增长有关; 反恐方的选择性打击对网络的增长具有抑制作用和一定的控制效果.
  • [1] Hu Xiao-Feng. A brief survey on war complex networks studies. Complex System and Complexity Science, 2010, 7(2): 24-28(胡晓峰. 战争复杂网络研究概述. 复杂系统与复杂性科学, 2010, 7(2): 24-28)
    [2] Krebs V E. Mapping networks of terrorist cells. Connections, 2002, 24(3): 43-52
    [3] Carley K M. Destabilization of covert networks. Computational and Mathematical Organization Theory, 2006, 12(1): 51-56
    [4] Xu Xiao-Ke, Fang Jin-Qing. Applications of complex network theory in war on terrorism. Complex System and Complexity Science, 2010, 7(2): 116-119(许小可, 方锦清. 复杂网络理论在反恐战争中的应用. 复杂系统与复杂性科学, 2010, 7(2): 116-119)
    [5] Borgatti S P, Mehra A, Brass D J, Labianca G. Network analysis in the social sciences. Science, 2009, 323(5916): 892-895
    [6] Bohannon J. Counterterrorism's new tool: "metanetwork" analysis. Science, 2009, 325(5939): 409-411
    [7] Weinberger S. Web of war. Nature, 2011, 471: 566-568
    [8] Carpenter T, Karakostas G, Shallcross D. Practical issues and algorithms for analyzing terrorist networks. In: Proceedings of the 2nd International Workshop on Mobile Commerce (WMC). New York, USA: ACM, 2002. 49
    [9] Carley K M, Dombroski M, Tsvetovat M, Reminga J, Kamneva N. Destabilizing dynamic covert networks. In: Proceedings of the 8th International Command and Control Defense Research and Technology Symposium. Washington, DC, 2003. 45-89
    [10] Morselli C, Giguére C, Petit K. The efficiency/security trade-off in criminal networks. Social Networks, 2007, 29(1): 143-153
    [11] Barabasi A L. Linked: The New Science of Networks. Cambridge: Perseus Press, 2002. 222-224
    [12] Sageman M. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press, 2004. 1-147
    [13] Chen Peng, Yuan Hong-Yong. Social network analysis of crime organization structures. Journal of Tsinghua University (Science and Technology), 2011, 51(8): 15-25 (陈鹏, 袁宏永. 犯罪组织结构的社会网络分析. 清华大学学报(自然科学版), 2011, 51(8): 15-25)
    [14] Gong Kai, Tang Ming, Shang Ming-Sheng, Zhou Tao. Empirical study on spatiotemporal evolution of online public opinion. Acta Physica Sinica, 2012, 61(9): 526-532(龚凯, 唐明, 尚明生, 周涛. 在线热点事件的时空演变规律. 物理学报, 2012, 61(9): 526-532)
    [15] Zhu J F, Han X P, Wang B H. Statistical property and model for the inter-event time of terrorism attacks. Chinese Physics Letters, 2010, 27(6): 273-276
    [16] Jin Di, Liu Jie, Yang Bo, He Dong-Xiao, Liu Da-You. Genetic algorithm with local search for community detection in large-scale complex networks. Acta Automatica Sinica, 2011, 37(7): 873-882(金弟, 刘杰, 杨博, 何东晓, 刘大有. 局部搜索与遗传算法结合的大规模复杂网络社区探测. 自动化学报, 2011, 37(7): 873-882)
    [17] Liu Xu, Yi Dong-Yun. Complex network community detection by local similarity. Acta Automatica Sinica, 2011, 37(12): 1520-1529(刘旭, 易东云. 基于局部相似性的复杂网络社区发现方法. 自动化学报, 2011, 37(12): 1520-1529)
    [18] Leweling T A, Nissen M E. Defining and exploring the terrorism field: toward an intertheoretic, agent-based approach. Technological Forecasting and Social Change, 2007, 74(2): 165-192
    [19] Deng Bi-Bo. Terrorism organization elements, activity and prevention. Journal of PLA Nanjing Institute of Politics, 2009, 25(5): 78-80(邓碧波. 恐怖主义组织的要素、活动及其预防. 南京政治学院学报, 2009, 25(5): 78-80)
    [20] Li Zhi-Hui. Counter-terrorism Study. Beijing: People's Press, 2003. 35-41(李智慧. 反恐学. 北京: 人民出版社, 2003. 35-41)
    [21] Crutchfield J P. Between order and chaos. Nature Physics, 2002, 8: 17-24
    [22] Gan Min, Peng Hui, Huang Yun-Zhi, Dong Xue-Ping. Initial distribution search algorithm for self-organizing state space model. Acta Automatica Sinica, 2012, 38(9): 1538-1543(甘敏, 彭辉, 黄云志, 董学平. 自组织状态空间模型参数初始分布搜索算法. 自动化学报, 2012, 38(9): 1538-1543)
    [23] Cui Ai-Xiang, Fu Yan, Shang Ming-Sheng, Chen Duan-Bing, Zhou Tao. Emergence of local structures in complex network: common neighborhood drives the network evolution. Acta Physica Sinica, 2011, 60(3): 803-808(崔爱香, 傅彦, 尚明生, 陈端兵, 周涛. 复杂网络局部结构的涌现: 共同邻居驱动网络演化. 物理学报, 2011, 60(3): 803-808)
    [24] Barabási A L, Albert R. Emergence of scaling in random networks. Science, 1999, 286(5439): 509-512
    [25] Albert R, Barabási A L. Topology of evolving networks: local events and universality. Physical Review Letters, 2000, 85(24): 5234-5237
    [26] Albert R, Barabási A L. Statistical mechanics of complex networks. Reviews of Modern Physics, 2002, 74(1): 76-85
    [27] Enders W, Su X J. Rational terrorists and optimal network structure. Journal of Conflict Resolution, 2007, 51(1): 33-57
    [28] Fenstermacher L, Kuznar C L, Rieger T. Protecting the homeland from international and domestic terrorism threats: individual and group mechanisms. RAND, 2010: 82-91
    [29] Kossinets G, Watts D J. Empirical analysis of an evolving social network. Science, 2006, 311(5757): 88-90
    [30] Wasserman S, Faust K. Social Network Analysis: Methods and Applications. England: Cambridge University Press, 1994. 178-179
    [31] White J R. Terrorism: An Introduction. White Californian: Wadsworth Thomson Learning, 2002. 21-135
    [32] Mei Jian-Ming. Counterterrorism Intelligence and Crisis Management. Beijing: Qunzhong Press, 2007. 66-67(梅建明. 反恐情报与危机管理. 北京: 群众出版社, 2007. 66-67)
    [33] Zawodny J K. Infrastructure of Terrorist Organizations. In: Freedman L Z, Alexander Y. Perspectives on Terrorism. Delaware, Wilmington: Scholarly Resources, 1983
    [34] Krebs V E. Uncloaking terrorist network. First Monday, 2002, 7(4): 1-4
  • 加载中
计量
  • 文章访问数:  1588
  • HTML全文浏览量:  46
  • PDF下载量:  2101
  • 被引次数: 0
出版历程
  • 收稿日期:  2012-10-10
  • 修回日期:  2012-10-26
  • 刊出日期:  2013-06-20

目录

    /

    返回文章
    返回