Abstract
The wide scope of Social network analysis has led the law require agencies to study the performance of social network. The main objective of this study is to identify the key nodes (suspicious nodes) present in the network. Recently, Terrorist Network Mining (special branch of Social Network Analysis) has gained considerable prominence in the data mining community because of its relevance to the real scenario situation and need. This paper proposes a new Fuzzy based optimization mechanism. The proposed optimization mechanism is appropriate for operative optimization of big social network holding non terrorist and terrorist nodes. At the time of the optimization procedure elimination of nonterrorist nodes from the network has been performed and the optimization resultant represents only the reduced / optimized graph holding only the collection of potential nodes. Fuzzy Rule based system for the security of the cyber is a system that contains a rule depository and a mechanism for the accessing and also running the rules. The depository is generally created with a group of the related rule sets. The goal of this study is to progress of a fuzzy rule based practical indicator for the security of cyber with the use of an skillful method which is named System of the Fuzzy Rule Based Cyber Expert. Rule based systems employ fuzzy rule to the automate complex procedures. A common cyber threats expected for the cyber specialists are used as linguistic variables in this paper. However, these algorithm results in fruitful outcomes, there is a need to propose a typical algorithm for destabilization. In consideration to this, the present paper proposes a novel algorithm for destabilization of terrorist network revealing the hidden hierarchy followed by the network.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.