Itemset Mining Based Episode Profiling of Terrorist Attacks Using Weighted Ontology

Itemset mining is a prominent research problem of data mining domain. It is extensively utilized for knowledge discovery in domains dealing with multi-component records or itemsets. Terrorism is a similar domain where every terrorist attack carries attack attributes such as location, target and attack type as components. Treatment of terrorist attack episodes as itemsets can facilitate effective pattern analysis and forecast of future attack episodes. This paper introduces a novel approach of mapping three major attributes of terrorist attacks taken place in a region in a single weighted ontology. The weighted ontology is later employed to discover and forecast useful information about possible attack episodes in the future.

[1]  Dieter Fensel,et al.  Knowledge Engineering: Principles and Methods , 1998, Data Knowl. Eng..

[2]  Uffe Kock Wiil,et al.  Notice of Violation of IEEE Publication PrinciplesDetecting New Trends in Terrorist Networks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[3]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[4]  Gary LaFree,et al.  Introducing the Global Terrorism Database , 2007 .

[5]  Asunción Gómez-Pérez,et al.  Ontology Specification Languages for the Semantic Web , 2002, IEEE Intell. Syst..

[6]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[7]  Mohammed J. Zaki,et al.  Efficient algorithms for mining closed itemsets and their lattice structure , 2005, IEEE Transactions on Knowledge and Data Engineering.

[8]  Ickjai Lee,et al.  Mining co-distribution patterns for large crime datasets , 2012, Expert Syst. Appl..

[9]  Heikki Mannila,et al.  Discovering Frequent Episodes in Sequences , 1995, KDD.

[10]  Choochart Haruechaiyasak,et al.  Ontology-Based Terrorism Event Extraction , 2009, 2009 First International Conference on Information Science and Engineering.

[11]  Ahmed Rezine,et al.  Detecting Key Players in Terrorist Networks , 2012, 2012 European Intelligence and Security Informatics Conference.

[12]  Nicolas Pasquier,et al.  Efficient Mining of Association Rules Using Closed Itemset Lattices , 1999, Inf. Syst..

[13]  E. Guild,et al.  Reflections on the Terrorist Attacks in Barcelona: Constructing a Principled and Trust-Based EU Approach to Countering Terrorism , 2017 .

[14]  Mohammad T. Khasawneh,et al.  New framework that uses patterns and relations to understand terrorist behaviors , 2017, Expert Syst. Appl..