{"id":"https://openalex.org/W3190107248","doi":"https://doi.org/10.1109/iccta45985.2018.9499167","title":"Towards a Multidimensional Model for Terrorist Attacks Analysis and Mining","display_name":"Towards a Multidimensional Model for Terrorist Attacks Analysis and Mining","publication_year":2018,"publication_date":"2018-10-30","ids":{"openalex":"https://openalex.org/W3190107248","doi":"https://doi.org/10.1109/iccta45985.2018.9499167","mag":"3190107248"},"language":"en","primary_location":{"id":"doi:10.1109/iccta45985.2018.9499167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta45985.2018.9499167","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 28th International Conference on Computer Theory and Applications (ICCTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006845093","display_name":"Firas Saidi","orcid":null},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Firas Saidi","raw_affiliation_strings":["RIADI Laboratory, National School of Computer Sciences, Manouba, Tunisia"],"affiliations":[{"raw_affiliation_string":"RIADI Laboratory, National School of Computer Sciences, Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011728448","display_name":"Zouheir Trabelsi","orcid":"https://orcid.org/0000-0001-8686-8975"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Zouheir Trabelsi","raw_affiliation_strings":["College of Information, Technology UAE university"],"affiliations":[{"raw_affiliation_string":"College of Information, Technology UAE university","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113495421","display_name":"Henda Ben Gh\u00e9zala","orcid":null},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Henda Ben Ghezala","raw_affiliation_strings":["RIADI Laboratory, National School of Computer Sciences, Manouba, Tunisia"],"affiliations":[{"raw_affiliation_string":"RIADI Laboratory, National School of Computer Sciences, Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006845093"],"corresponding_institution_ids":["https://openalex.org/I83259278"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51915884,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"8","issue":null,"first_page":"55","last_page":"59"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.9348152875900269},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6821810007095337},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.5063287019729614},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.49572432041168213},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4544156491756439},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.43210530281066895},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1270458698272705},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.11841315031051636},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0892549455165863}],"concepts":[{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.9348152875900269},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6821810007095337},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.5063287019729614},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.49572432041168213},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4544156491756439},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.43210530281066895},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1270458698272705},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.11841315031051636},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0892549455165863},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccta45985.2018.9499167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta45985.2018.9499167","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 28th International Conference on Computer Theory and Applications (ICCTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1495859460","https://openalex.org/W1955698171","https://openalex.org/W1972596204","https://openalex.org/W1979033903","https://openalex.org/W2043712200","https://openalex.org/W2099267588","https://openalex.org/W2107798527","https://openalex.org/W2159837087","https://openalex.org/W2187779531","https://openalex.org/W2284361950","https://openalex.org/W2567905529","https://openalex.org/W6676140698"],"related_works":["https://openalex.org/W4205240985","https://openalex.org/W2314597598","https://openalex.org/W1527183021","https://openalex.org/W3124239800","https://openalex.org/W2365977737","https://openalex.org/W1577024311","https://openalex.org/W4387399630","https://openalex.org/W1494001639","https://openalex.org/W2370590861","https://openalex.org/W4255088821"],"abstract_inverted_index":{"Terrorist":[0,84,142],"attacks":[1,143],"are":[2,52,67,145],"in":[3],"exponentially":[4],"growth":[5],"and":[6,11,37,41,56,73,95,118,140,201],"cause":[7],"daily":[8],"dire":[9],"human":[10],"material":[12],"damages.":[13],"Analyzing":[14],"potential":[15],"terrorism":[16],"data":[17,126,144],"is":[18,135],"without":[19],"doubt":[20],"an":[21],"indispensable":[22],"task":[23],"not":[24],"only":[25],"to":[26,45,70,92,107,166,174,193],"understand":[27],"these":[28],"terrorist":[29,32,50,65,90,109,159],"events,":[30],"mainly":[31],"implicated":[33,119],"actors,":[34],"their":[35,38],"communities":[36],"operation":[39],"methods":[40],"tactics,":[42],"but":[43],"also":[44],"predict":[46],"future":[47],"attacks.":[48,63],"However,":[49],"events":[51,66,160],"commonly":[53],"conducted":[54,173],"differently":[55],"rarely":[57],"fit":[58],"the":[59,124,176,179,188],"models":[60],"of":[61,169,178],"conventional":[62],"Thus,":[64],"usually":[68],"hard":[69],"analyze,":[71],"mine":[72],"investigate.":[74],"In":[75],"this":[76],"paper,":[77],"we":[78],"propose":[79],"a":[80,152],"multidimensional":[81,130,198],"model,":[82],"named":[83],"Data":[85],"Warehouse":[86],"(TerDW),":[87],"for":[88,98],"allowing":[89],"investigators":[91,121,192],"perform":[93],"interesting":[94],"specific":[96,108],"analysis":[97],"decision-making":[99],"objectives.":[100],"Practically,":[101],"while":[102],"consulting":[103],"gathered":[104],"information":[105,157],"relative":[106],"attacks,":[110],"such":[111],"as":[112],"attacks'":[113],"locations,":[114],"dates,":[115],"used":[116],"weapons,":[117],"attackers,":[120],"can":[122],"query":[123],"proposed":[125,133,180,189],"warehouse":[127],"(TerDW)":[128],"using":[129],"queries.":[131],"The":[132,182],"model":[134,190],"based":[136],"on":[137],"consistent":[138],"dimensions":[139],"measures.":[141],"extracted":[146],"from":[147,164],"Global":[148],"Terrorism":[149],"Database":[150],"(GTD),":[151],"well-known":[153],"database":[154],"that":[155,161,187],"includes":[156],"about":[158],"took":[162],"place":[163],"1970":[165],"2017.":[167],"Examples":[168],"queries":[170],"have":[171],"been":[172],"evaluate":[175],"efficiency":[177],"model.":[181],"queries'":[183],"results":[184],"demonstrate":[185],"clearly":[186],"allows":[191],"carry":[194],"out":[195],"more":[196],"appropriate":[197],"analysis,":[199],"investigations":[200],"decisions.":[202]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
