Skip to main navigation menu Skip to main content Skip to site footer


Vol. 8 (2021)

Computational Robotics: An Alternative Approach for Predicting Terrorist Networks

November 24, 2021


Increasing terrorist activities globally have attracted the attention of many researchers, policy makers and security agencies towards counterterrorism. The clandestine nature of terrorist networks have made them difficult for detection. Existing works have failed to explore computational characterization to design an efficient threat-mining surveillance system. In this paper, a computationally-aware surveillance robot that auto-generates threat information, and transmit same to the cloud-analytics engine is developed. The system offers hidden intelligence to security agencies without any form of interception by terrorist elements. A miniaturized surveillance robot with Hidden Markov Model (MSRHMM) for terrorist computational dissection is then derived. Also, the computational framework for MERHMM is discussed while showing the adjacency matrix of terrorist network as a determinant factor for its operation. The model indicates that the terrorist network have a property of symmetric adjacency matrix while the social network have both asymmetric and symmetric adjacency matrix. Similarly, the characteristic determinant of adjacency matrix as an important operator for terrorist network is computed to be -1 while that of a symmetric and an asymmetric in social network is 0 and 1 respectively. In conclusion, it was observed that the unique properties of terrorist networks such as symmetric and idempotent property conferred a special protection for the terrorist network resilience. Computational robotics is shown to have the capability of utilizing the hidden intelligence in attack prediction of terrorist elements. This concept is expected to contribute in national security challenges, defense and military intelligence.


  1. Sethuraman SC, Kompally P, Reddy S. VISU: A 3-D Printed Functional Robot for Crowd Surveillance. IEEE Consum. Electron Mag. 2021; 10(1): 17-23.
  2. Fong J, Ocampo R, Gross DP, Tavakoli M. Intelligent Robotics Incorporating Machine Learning Algorithms for Improving Functional Capacity Evaluation and Occupational Rehabilitation. J Occup Rehabil [Internet]. 2020; 30(3): 362-70.
  3. Andrew S, Bouhana N, Malthaner S, Schuurman B, Lindekilde L, Thornton A, et al. Lone-actor terrorism. In: Routledge Handbook Of Terrorism And Counterterrorism. 2018.
  4. Gao Y, Wang X, Chen Q, Al. YG et al. Suspects Prediction towards terrorist attacks based on machine learning. 2019; 10.
  5. Budur E, Lee S, Kong VS. Structural Analysis of Criminal Network and Predicting Hidden Links using Machine Learning. 2015.
  6. Taha K, Yoo PD. Using the spanning tree of a criminal network for identifying its leaders. IEEE Trans Inf Forensics Secur. 2017; 12(2): 445-53.
  7. Ogunleye J. The concepts of predictive analytics. Int J Dev Big data Anal. 2014; 1(1): 86-94.
  8. Gerdes LM. MAPPing dark networks: A data transformation method to study clandestine organizations. Netw Sci. 2014 Aug 1; 2(2): 213-53.
  9. Marciani G, Porretta M, Nardelli M, Italiano GF. A data streaming approach to link mining in criminal networks. In: Proceedings - 2017 5th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2017. 2017.
  10. Uzlov D, Vlasov O, Strukov V. Using Data Mining for Intelligence-Led Policing and Crime Analysis. In: 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc.; 2019. p. 499-502.
  11. Maza KD, Koldas U, Aksit S. Challenges of Countering Terrorist Recruitment in. 2020;
  12. Gerdes LM. Illuminating dark networks: The study of clandestine groups and organizations. Illuminating Dark Networks. Cambridge University Press; 2015. 1-255 p.
  13. Dey PJ, Medya S. Covert networks: How hard is it to hide? In: Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS. 2019.
  14. Lindelauf RHA, Borm PEM, Hamers H. Understanding Terrorist Network Topologies and Their Resilience Against Disruption. SSRN Electron J. 2011.
  15. Franzese M, Iuliano A. Hidden Markov Models. In: Encyclopedia of Bioinformatics and Computational Biology. Elsevier; 2019. p. 753-62.
  16. Saini P, Sunila Godara M. Modelling Intrusion Detection System using Hidden Markov Model: A Review. Int J Adv Res Comput Sci Softw Eng [Internet]. 2014; 4(6): 2277-128. Available from: https: //
  17. Visser I, Speekenbrink M. Package "depmixS4." CRAN. 2020.
  18. Farag MMM, Elghazaly T, Hefny HA. Face recognition system using HMM-PSO for feature selection. In: 2016 12th International Computer Engineering Conference, ICENCO 2016: Boundless Smart Societies. 2017.
  19. Yin X, Jiang XT, Chai B, Li L, Yang Y, Cole JR, et al. ARGs-OAP v2.0 with an expanded SARG database and Hidden Markov Models for enhancement characterization and quantification of antibiotic resistance genes in environmental metagenomes. In: Bioinformatics. 2018.
  20. Raghavan V, Galstyan A, Tartakovsky AG. Hidden Markov models for the activity profile of terrorist groups. Ann Appl Stat. 2013.
  21. Shuaibu SS, Salleh MA. Historical Evolution of Boko Haram in Nigeria : Causes. Proc Icic 2015. 2015; (September): 217-26.
  22. Bello HS, Galadima IS, Aliyu BI. An Assessment of the Effects of Boko-Haram Insurgency on Business Development in North-Eastern States of Nigeria. Bus Ethics Leadersh. 2018.
  23. Braynov S. Adversarial planning in networks. In: Computational Methods for Counterterrorism. 2009.
  24. Farooq E, Khan SA, Butt WH. Covert network analysis to detect key players using correlation and social network analysis. In: ACM International Conference Proceeding Series. 2017.
  25. Seidler P, Haider J, Kodagoda N, William Wong BL, Pohl M, Adderley R. Design for intelligence analysis of complex systems: Evolution of criminal networks. In: Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016. 2017.
  26. Nguyen L. Tutorial on Hidden Markov Model. Appl Comput Math. 2016; 6(4): 16.
  27. Brogi G, Di Bernardino E. Hidden Markov models for advanced persistent threats. Int J Secur Networks. 2019; 14(4): 181-90.
  28. Valleriani A, Li X, Kolomeisky AB. Unveiling the hidden structure of complex stochastic biochemical networks. J Chem Phys. 2014.
  29. Yang H, An S. Critical Nodes Identification in Complex Networks. Mdpi. 2020; 1-15.
  30. Anandravisekar. G, Anto Clinton. A, Mukesh Raj. T, Naveen. L, M. Mahendran. IoT Based Surveillance Robot. Int J Eng Res. 2018; V7(03): 84-7.
  31. Bokade AU, Ratnaparkhe VR. Video surveillance robot control using smartphone and Raspberry pi. Int Conf Commun Signal Process ICCSP 2016. 2016; 2094-7.
  32. Kaur T, Kumar D. Wireless multifunctional robot for military applications. 2015 2nd Int Conf Recent Adv Eng Comput Sci RAECS 2015. 2016; (December).
  33. Balaji M, Karthick S, Manikandan V, J BE, Ct VN. Surveillance and Target Engagement using Robots. In: Journal of Electronics and Communication Engineering. 2017; p. 1-6.
  34. Selvi S, Fathima MF, Dhivyuaa S, Mouriya S. SURVEILLANCE ROBOT USING RASPBERRY PI FOR. Int J Curr Eng Sci Res. 2019; 6(3): 394-9.
  35. Wang Y, Howard N, Kacprzyk J, Frieder O, Sheu P, Fiorini RA, et al. Cognitive Informatics. Int J Cogn Informatics Nat Intell. 2018.
  36. Dwarakanath L, Kamsin A, Rasheed RA, Anandhan A, Shuib L. Automated Machine Learning Approaches for Emergency Response and Coordination via Social Media in the Aftermath of a Disaster: A Review. IEEE Access. 2021.
  37. Hung BWK, Jayasumana AP, Bandara VW. Finding Emergent Patterns of Behaviors in Dynamic Heterogeneous Social Networks. IEEE Trans Comput Soc Syst. 2019.
  38. Tundis A, Kaleem H, Mühlhäuser M. Tracking criminal events through IoT devices and an edge computing approach. In: Proceedings - International Conference on Computer Communications and Networks, ICCCN. 2019.
  39. Chen X, Qing L, He X, Su J, Peng Y. From Eyes to Face Synthesis: A New Approach for Human-Centered Smart Surveillance. IEEE Access. 2018.
  40. Sutton Z, Willett P, Bar-Shalom Y. Target Tracking Applied to Extraction of Multiple Evolving Threats from a Stream of Surveillance Data. IEEE Trans Comput Soc Syst. 2021.
  41. Saeidi H, Wang Y. Incorporating trust and self-confidence analysis in the guidance and control of (semi) autonomous mobile robotic systems. IEEE Robot Autom Lett. 2019.
  42. Lippiello V, Siciliano B, Villani L. A grasping force optimization algorithm for multiarm robots with multifingered hands. IEEE Trans Robot. 2013.
  43. Zuo B, Zhu W, Li F, Zhuo J. Modeling and Quantitative Analysis of Terrorist Attack Task List. In: Proceedings of 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2020. 2020.
  44. Skillicorn D. Extracting Knowledge from Graph Data in Adversarial settings". In Memon. N., David F.Y., Hicks D.L., Rosenorn T. (eds) Mathematical methods in counterterrorism. J Comput Anal Appl. 2009; 34-40.
  45. KC. Okafor, "Dynamic reliability modeling of cyber- physical edge computing network", Int'l J. of Computers and App.
  46. KC. Okafor; Guinevere, E.C.; Akinyele, O.O, "Hardware Description Language (HDL): An Efficient Approach to Device Independent Designs for VLSI Market Segments", In 3rd IEEE Int'l Conf., Adaptive Science and Techy (ICAST), 2011, Abuja, 24th-26th, Nov.2011. Pp. 262- 267.