American Journal of Operations Research

Volume 4, Issue 4 (July 2014)

ISSN Print: 2160-8830   ISSN Online: 2160-8849

Google-based Impact Factor: 0.84  Citations  

Using Mathematical Models in Decision Making Methodologies to Find Key Nodes in the Noordin Dark Network

HTML  Download Download as PDF (Size: 1067KB)  PP. 255-267  
DOI: 10.4236/ajor.2014.44025    3,574 Downloads   4,954 Views  Citations

ABSTRACT

A Dark Network is a network that cannot be accessed through tradition means. Once uncovered, to any degree, dark network analysis can be accomplished using the SNA software. The output of SNA software includes many measures and metrics. For each of these measures and metric, the output in ORA additionally provides the ability to obtain a rank ordering of the nodes in terms of these measures. We might use this information in decision making concerning best methods to disrupt or deceive a given dark network. In the Noordin Dark network, different nodes were identified as key nodes based upon the metric used. Our goal in this paper is to use methodologies to identify the key players or nodes in a Dark Network in a similar manner as we previously proposed in social networks. We apply two multi-attribute decision making methods, a hybrid AHP & TOPSIS and an average weighted ranks scheme, to analyze these outputs to find the most influential nodes as a function of the decision makers’ inputs. We compare these methods by illustration using the Noordin Dark Network with seventy-nine nodes. We discuss sensitivity analysis that is applied to the criteria weights in order to measure the change in the ranking of the nodes.

Share and Cite:

Fox, W. and Everton, S. (2014) Using Mathematical Models in Decision Making Methodologies to Find Key Nodes in the Noordin Dark Network. American Journal of Operations Research, 4, 255-267. doi: 10.4236/ajor.2014.44025.

Cited by

[1] Graph-based modeling using association rule mining to detect influential users in social networks
Expert Systems with Applications, 2022
[2] A complex network-based approach for security and governance in the smart green city
Expert Systems with …, 2022
[3] Identification of Pivotal node in Terrorist Network using TOPSIS Method
2020
[4] A Layered Network Collapse Method in Cyber Terrorism
2020
[5] A fuzzy based integrated model for identification of vital node in terrorist network using logarithmic concept
2020
[6] Advanced Problem Solving Using Maple™: Applied Mathematics, Operations Research, Business Analytics, and Decision Analysis
2020
[7] A Methodological Perspective on Lawful Internet Surveillance
2020
[8] A Case Study Of The Noordin Network
2019
[9] HWMSCB: A community-based hybrid approach for identifying influential nodes in the social network
2019
[10] An innovative approach for identification of pivotal node in terrorist network using promethee method (an anti-terrorism approach)
2018
[11] A hybrid algorithm based on community detection and multi attribute decision making for influence maximization
Computers & Industrial Engineering, 2018
[12] Cluster head selection based on Minimum Connected Dominating Set and Bi-Partite inspired methodology for energy conservation in WSNs
Journal of King Saud University - Computer and Information Sciences, 2018
[13] CARVER 2.0: integrating the Analytical Hierarchy Process's multi-attribute decision-making weighting scheme for a center of gravity vulnerability analysis for US …
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 2017
[14] An Integrative Model for the Identification of Key Players of Cancer Networks
Applied Mathematical Modelling, 2017
[15] Mathematical modeling and analysis of a dark money network
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 2016
[16] Applied Game Theory to Improve Strategic and Tactical Military Decisions
2016
[17] Ranking terrorist targets using a hybrid AHP–TOPSIS methodology
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 2015
[18] An Alternative Approach to the Lottery Method in Utility Theory for Game Theory
American Journal of Operations Research, 2015
[19] Using Multi-Attribute Decision Methods in Mathematical Modeling to Produce an Order of Merit List of High Valued Terrorists
American Journal of Operations Research, 2014

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.