{"id":"https://openalex.org/W4238265136","doi":"https://doi.org/10.1109/asonam.2014.6921660","title":"Understanding South Asian Violent Extremist Group-group interactions","display_name":"Understanding South Asian Violent Extremist Group-group interactions","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W4238265136","doi":"https://doi.org/10.1109/asonam.2014.6921660"},"language":"en","primary_location":{"id":"doi:10.1109/asonam.2014.6921660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam.2014.6921660","pdf_url":null,"source":{"id":"https://openalex.org/S4363608209","display_name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006135009","display_name":"David B. Skillicorn","orcid":"https://orcid.org/0000-0003-0605-4029"},"institutions":[{"id":"https://openalex.org/I4210154901","display_name":"Kingston University","ror":"https://ror.org/0517ce304","country_code":"US","type":"education","lineage":["https://openalex.org/I4210154901"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"D.B. Skillicorn","raw_affiliation_strings":["Queen's University Faculty of Health Sciences, Kingston, ON, CA"],"affiliations":[{"raw_affiliation_string":"Queen's University Faculty of Health Sciences, Kingston, ON, CA","institution_ids":["https://openalex.org/I4210154901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045206246","display_name":"Francesca Spezzano","orcid":"https://orcid.org/0000-0002-0361-9728"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"F. Spezzano","raw_affiliation_strings":["Department of Computer Science, University of Maryland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Maryland","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038893350","display_name":"V.S. Subrahmanian","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V.S. Subrahmanian","raw_affiliation_strings":["Department of Computer Science, University of Maryland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Maryland","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001974176","display_name":"M. Garber","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Garber","raw_affiliation_strings":["Department of Computer Science, University of Maryland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Maryland","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006135009"],"corresponding_institution_ids":["https://openalex.org/I4210154901"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.39240506,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"687","last_page":"694"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9753000140190125,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/betweenness-centrality","display_name":"Betweenness centrality","score":0.8734830617904663},{"id":"https://openalex.org/keywords/pagerank","display_name":"PageRank","score":0.6715397834777832},{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.6531161069869995},{"id":"https://openalex.org/keywords/agency","display_name":"Agency (philosophy)","score":0.6329435706138611},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.6018426418304443},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.5852886438369751},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.480343222618103},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.46150046586990356},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.46144455671310425},{"id":"https://openalex.org/keywords/social-network-analysis","display_name":"Social network analysis","score":0.423002690076828},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3056606650352478},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.25678831338882446},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.1911325454711914},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16977128386497498},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15274715423583984},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.10418075323104858},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.10216227173805237}],"concepts":[{"id":"https://openalex.org/C117045392","wikidata":"https://www.wikidata.org/wiki/Q4899215","display_name":"Betweenness centrality","level":3,"score":0.8734830617904663},{"id":"https://openalex.org/C2779172887","wikidata":"https://www.wikidata.org/wiki/Q184316","display_name":"PageRank","level":2,"score":0.6715397834777832},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.6531161069869995},{"id":"https://openalex.org/C108170787","wikidata":"https://www.wikidata.org/wiki/Q3951828","display_name":"Agency (philosophy)","level":2,"score":0.6329435706138611},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.6018426418304443},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.5852886438369751},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.480343222618103},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46150046586990356},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.46144455671310425},{"id":"https://openalex.org/C114713312","wikidata":"https://www.wikidata.org/wiki/Q7551269","display_name":"Social network analysis","level":3,"score":0.423002690076828},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3056606650352478},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.25678831338882446},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.1911325454711914},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16977128386497498},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15274715423583984},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.10418075323104858},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.10216227173805237},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asonam.2014.6921660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asonam.2014.6921660","pdf_url":null,"source":{"id":"https://openalex.org/S4363608209","display_name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W95514945","https://openalex.org/W200966413","https://openalex.org/W235862709","https://openalex.org/W1519212267","https://openalex.org/W1854214752","https://openalex.org/W1997092589","https://openalex.org/W2021004096","https://openalex.org/W2083611382","https://openalex.org/W2094826395","https://openalex.org/W2129107602","https://openalex.org/W2132914434","https://openalex.org/W2219845730","https://openalex.org/W2482756632","https://openalex.org/W2801906765","https://openalex.org/W4240882611","https://openalex.org/W4300122763"],"related_works":["https://openalex.org/W1973509935","https://openalex.org/W4389076551","https://openalex.org/W2107855069","https://openalex.org/W2241641394","https://openalex.org/W2097992793","https://openalex.org/W2140653560","https://openalex.org/W2348831795","https://openalex.org/W4312461432","https://openalex.org/W2514739320","https://openalex.org/W2611574733"],"abstract_inverted_index":{"The":[0],"South":[1,13],"Asian":[2,14],"Violent":[3],"Extremist":[4],"Group":[5],"(SAVE)":[6],"dataset":[7],"describes":[8],"500":[9],"interactions":[10,26],"between":[11,27],"30":[12],"terrorist":[15],"groups":[16,29],"over":[17],"a":[18],"20-year":[19],"period.":[20],"We":[21,62],"analyze":[22],"4":[23,36],"types":[24],"of":[25,48,59,80,97],"these":[28],"(financial,":[30],"logistical,":[31],"operational,":[32],"and":[33,41,51,53,71,93,110],"political)":[34],"via":[35],"network-theoretic":[37],"techniques:":[38],"spectral":[39],"decomposition":[40],"Simmelian":[42],"ties":[43],"in":[44,67,91],"an":[45],"undirected":[46],"version":[47],"the":[49,60,64,69,72,86,102,107],"network,":[50],"PageRank":[52],"betweenness":[54],"centrality":[55],"on":[56],"directed":[57],"versions":[58],"network.":[61],"identify":[63],"major":[65],"players":[66],"both":[68],"provision":[70],"flows":[73],"through":[74],"this":[75],"network":[76],"for":[77],"each":[78],"type":[79],"support.":[81],"Our":[82],"analysis":[83],"shows":[84],"that":[85],"five":[87],"entities":[88],"most":[89],"involved":[90],"providing":[92],"facilitating":[94],"all":[95],"forms":[96],"support":[98],"are":[99],"Al":[100],"Qaeda,":[101],"Pakistani":[103],"Inter-Services":[104],"Intelligence":[105],"Agency,":[106],"Taliban,":[108],"Lashkar-e-Taiba,":[109],"Tehreek-e-Taliban":[111],"Pakistan.":[112]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
