Social Networking, 2013, 2, 19-31
http://dx.doi.org/10.4236/sn.2013.21003 Published Online January 2013 (http://www.scirp.org/journal/sn)
Terrorist Networks, Network Energy and Node Removal:
A New Measure of Centrality Based on Laplacian Energy
Xingqin Qi1,4, Robert D. Duval2, Kyle Christensen3,
Edgar Fuller4, Arian Spahiu2, Qin Wu5, Yezhou Wu4,
Wenliang Tang4, Cunquan Zhang4*
1School of Mathematics and Statistics Shandong University (Weihai), Weihai, China
2Department of Political Science West Virginia University, Morgantown, USA
3Department of Political Science Columbus State University, Columbus, USA
4Department of Mathematics West Virginia University, Morgantown, USA
5School of IOT Engineering Jiangnan University, Wuxi, China
Email: *cqzhang@math.wvu.edu
Received November 8, 2012; revised November 11, 2012; accepted January 9, 2013
ABSTRACT
In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a
general framework for the centrality of a vertex based on the idea that the importance (or centrality) of a vertex is re-
lated to the ability of the network to respond to the deactivation or removal of that vertex from the network. In particu-
lar, the Laplacian centrality of a vertex is defined as the relative drop of Laplacian energy caused by the deactivation of
this vertex. The Laplacian energy of network with
n
vertices is defined as G

2
=1
=n
L
i
i
EG
, where i
is the
eigenvalue of the Laplacian matrix of . Other dynamics-based measures such as that of Masuda and Kori and Pag-
eRank compute the importance of a node by analyzing the way paths pass through a node while our measure captures
this information as well as the way these paths are “redistributed” when the node is deleted. The validity and robustness
of this new measure are illustrated on two different terrorist social network data sets and 84 networks in James Moody’s
Add Health in-school friendship nomination data, and is compared with other standard centrality measures.
G
Keywords: Network; Centrality; Laplacian Energy; 9/11 Hijacking; Bali Bombing; Terrorism
1. Introduction
The recent growth in the use of Social Network Analysis
(SNA) to understand complex networks demonstrates the
importance of the implicit connections within groups that
arise from day to day social activity. Similarly, our in-
creasing interest in observing, detecting and analyzing
terrorist networks leads us to be extremely interested in
understanding who is central to the functionality of these
groups that form around the common goal of engaging in
terrorist activities. As a result, researchers and analysts
from several areas have a strong interest in understanding
centrality within networks for both academic and opera-
tional reasons.
SNA provides us tools for mapping and measuring re-
lationships and flows between people, groups, organiza-
tions, computers, URLs, and many other connected bits
of information/knowledge. The vertices in political net-
works, of which terrorist networks have emerged as one
of the most salient, are typically people, organizations, or
groups while the edges show relationships, connections,
or flows between the vertices. SNA provides both a vis-
ual and a mathematical analysis of these interrelation-
ships. Recent studies of networks in political science
range from such diverse topics as international conflict
[1], terrorism [2] and policy networks [3] to disciplinary
introspection about job placement in political science [4].
To understand network structure and the entities being
studied, we often start with an evaluation of their loca-
tion relative to all other actors in the network. For net-
works, the most readily examined measure of location
means how close is the object to the center, or centrality.
The finding of some important vertices with high central-
ities in order to characterize the properties of the net-
works has significant uses in many fields. These include
synchronization transition, the spread of epidemics, and
the transmission of information. For example, in diffu-
sive systems the vertices with large degree play a crucial
role, which are decisive in resolving the traffic jam at a
bottleneck [5].
The ability to measure centrality in social networks
*Corresponding author.
C
opyright © 2013 SciRes. SN
X. Q. QI ET AL.
20
has been a particularly useful development. These ideas
have materialized in many well known centrality meas-
ures such as degree centrality, along with closeness, be-
tweenness, eigenvector, subgraph centrality, Katz pres-
tige and Bonacich centrality, etc. These measures are
certainly not the only measures of centrality, and it is
clear that these measures capture different aspects of the
positioning of the nodes [6]. Given how varied networks
can be, it is not surprising that there are many different
ways of viewing position, centrality or power in a net-
work. But note that these standard methods also have
their own weakness. For example, as have been stated,
“The simplicity of degree method is an advantage and
also is an disadvantage: only the local structure around a
vertex is calculated and it does not take into considera-
tion the global structure of the network; for example,
although a vertex might be connected to many others, it
might not be in a position to reach others quickly to ac-
cess resources, such as information or knowledge [7]”;
“Betweenness method considers the global network
structure and also can be applied to networks with dis-
connected components, but it is not without limitations;
for example, vertices in a network that generally do not
lie on a shortest path between any two other vertices will
receive the same score of zero [7]”. Katz prestige and
Bonacich centrality both depend on the choice of pa-
rameters heavily. Besides, these existing measures de-
scribe either the local environment around a vertex (e.g.,
degree centrality) or the global position of a vertex in the
network (e.g., closeness, betweenness and subgraph cen-
trality). For example, from its definition, “subgraph cen-
trality” tends to find the center (s) of an entire network
when in fact we are really interested in finding the center
for each community within the network. If the network
consists of more than two communities with dramatically
different sizes, the nodes in the smaller community
would exhibit lower “subgraph centrality” ranks than the
ones in larger community, so that the leader in smaller
community will not rank highly overall. Thus, an inter-
mediate (between local and global) characterization of
the vertex centrality has been claimed as a necessity for
the study of, for example, the food web in [8,9] if species
to community relations are to be understood. An inter-
mediate centrality approach is also suggested to be the
most appropriate if the relative importance of vertex is to
be quantified in social networks.
In this paper, based in part on the basic idea of spectral
graph theory, we present a novel centrality method that
takes into account the Laplacian energy of the graph, a
quantity introduced in [10] which reflects the graph's
internal connectivity. In particular, the Laplacian central-
ity of a vertex is defined as the relative drop of Laplacian
energy in the network caused by the deactivation of this
vertex from the network. Theorem 1 makes precise the
way in which the Laplacian centrality of a vertex can be
used to reveal its importance in a network. This result
says that the Laplacian centrality of a vertex not only
takes the local environment around it into account but
also the larger environment around its neighbors, making
it an intermediate between the global and local charac-
terizations of the position of a vertex in a network. We
investigate the validity and robustness of this new meas-
ure by illustrating this method on three social network
data sets of strong theoretical and substantial policy in-
terest. Examining two terrorists networks (those involv-
ing the Bali Nightclub bombing in 2002 [11] and the
9/11 hijackers network [12]) and all the 84 networks in
the Add Health in-school friendship nomination data
from James Moody, we compare the results of our
Laplacian centrality measure to other standard centrality
measures and show its reliability.
This paper is organized as follows. We first give some
notations and terminology in Section 2. In Section 3, we
introduce the new measure—Laplacian centrality, whose
simple calculation is presented in Section 4 based on
some structural studies of graph theory. Analytical and
numerical results on two different networks will be
shown in Section 5, where the rankings of vertices for
different centrality measures are presented. By compar-
ing with outputs of other methods, the effectiveness of
Laplacian centrality method is supported by both known
facts (intelligence information) and statistical analysis
(consensus comparison), see both Section 5 and Section
6. The computational complexity of various centrality
methods are further compared and discussed in Section 7,
which will show that Laplacian method has the lower
time complexity making it quite advantageous for large
scale networks. Conclusions will be reported in Section
8.
2. Graph Theory Notation and Terminology
In most contexts, a social network can be effectively
represented by a graph where the vertices are the indi-
viduals, and the edges represent the social links (connec-
tion). In this paper, we consider the symmetric case
where social networks are represented by undirected
graphs.
Let be an undirected graph, consisting of a set of
vertices
G
n
12
=,,,n
VGvvv and a set of
edges. The number of edges that are incident to a vertex
is called the degree of the vertex. Let
m

,
=
ij nn
AG a
be the adjacency matrix of the graph , where the ele-
ment equals 1 if there is an edge between vertices
and , and 0 if there is not.
G
,ij
aji
Copyright © 2013 SciRes. SN
X. Q. QI ET AL. 21
3. Laplacian Centrality
In the following, we will first introduce the definition of
Laplacian matrix and Laplacian energy for a graph, then
define the Laplacian centrality for a vertex.
Let G be a simple graph (without graph loops or mul-
tiple edges) of vertices, and
n


1
2
12
00
00
=,,,=
....
00
n
n
d
d
DGdiagd dd
d






be the diagonal matrix with the vertex degrees
of its vertices 12 . Define
as the Laplacian matrix of the
graph (note that the adjacency matrix
12
,,,
n
dd d

=LG DG
G
,,,n
vv v
 
AG
A
G is
defined in Section 2).
The following is a short list of some properties about
the Laplacian matrix [13].

LG
Properties
1) is symmetric, singular and positive semi-
definite.

LG
2) All eigenvalues i
are real and nonnegative.
3) The smallest eigenvalue =0
n
.
4) The multiplicity of zero eigenvalues equals the
number of connected components of .
G
Definition 1 If G is a graph of vertices, and
12
n
,,,n

are the eigenvalues of its Laplacian matrix.
The Laplacian energy of is defined as the following
invariant: G

2
=1
=
n
L
i
i
EG
.
Lemma 1 [10] For any graph G on vertices
with vertex degrees , we have n
12
,,,n
dd d


2
=1
=
n
L
ii
i
EGd d.
Lemma 2 [10] If H is an arbitrary subgraph of a
graph G, then .
 
LL
EH EG
We will see from the above lemmas Laplacian energy
reflects the internal connectivity of a network. Thus, the
relative drop of Laplacian energy in the network caused
by the deactivation of this vertex from the network can
be easily regarded as a “signal” to show the importance
of the removing vertex in the whole network .
Definition 2 If is a graph on vertices
12 , let Gn
{,,, }n
vv v
H
be the graph obtained by remov-
ing vertex from . The Laplacian centrality
i
v G
L
i
C
of vertex is defined as
i
v


==
L
iL
i
CEEGEH
L
Obviously, by Lemma 2, must be
nonnegative.
 
LL
EG EH
4. Calculation of Laplacian Centrality, a
Graph Theory Result
4.1. Graph Theoretical Descriptions
Theorem 1 If is a graph of vertices, then the
Laplacian centrality with respect to is
Gnv


2
== 2
L
vGG
vvNv
i
CEdv dvdv

Gi
,
where
Nv is the set of neighbors of in G and v
iG
dv
is the degree of in .
i
v G
Proof. Assume that the vertex set of is
12 , and there are edges in . It is well
known that . Then
G
,,,
n
vv vm
mG
nn

=1 =2
n
Gi
idv

 


22
=1 1
==2
L
Gi GiGi
ii
EGdvdvmdv


.
Without loss of generality, assume
1
=
H
Gv.
Note that there are
1
n vertices and

2,,n
vv
1
G
md v edges in
H
.

 




2
2
2
12
2
LH
iHi
i
n
GH
i
EHd vd v
md vdv

 
n
i
Let
1
Nv be the neighborhood of vertex in G,
the following is obvious: 1
v



1
0, =1;
=1,
,.

Hi Gii
Gi
if i
dv dvifvNv
d votherwise
;
So








11
2
1
22
12
22
1
2
2
2
L
n
Gi
i
n
GGi
i
GGi
vNvvNv
ii
EG
mdv
md vd v
md vd vd v


 
 

2
Gi
and
















11
11
2
12
22
1
22
1
2
2
21
L
n
GHi
i
GHiHi
vNvvNv
ii
GGi
vNvvNv
ii
EH
md vdv
mdvd vd v
md vd vd v


 
 
 


Gi
Thus, the drop of Laplacian energy with respect to
is 1
v
Copyright © 2013 SciRes. SN
X. Q. QI ET AL.
22

 
 



 


 

 


1
1
1
1
2
22
11
211
2111
()
1
211
21
221
22
2
LL
GGGi Gi
vNv
i
GG Gi
vNv
i
GGGGi
vNv
i
GG Gi
vNv
i
E
EG EH
dvdvdv dv
dv dvdv
dvdv dvdv
dv dvdv

 

 

 

From Theorem 1, we notice the following facts:
First, the Laplacian centrality agrees with the standard
measures on assignment of extremes. For example, it
gives the maximum value to the central vertex of a star,
and equal value to the vertices of a cycle or a complete
graph.
Second, it is well known that the degree centrality of
only considers the information contained in the num-
ber of vertices which can be reachable from directly.
The Laplacian centrality of a vertex involves the infor-
mation of vertices that can be reachable to within two
steps and as a result the Laplacian centrality of a vertex
takes not only the local environment around it into ac-
count but also the larger immediate environment around
its neighbors. It is thus an intermediate measure between
global and local characterizations of the position of a
vertex within networks. Because of this we should an-
ticipate that it will reveal differences in network structure
that emerge out of significant local influence upon areas
of the graph. Intuitively, this means that we should ex-
pect the Laplacian centrality to yield a more useful vertex
characterization when the overall graph structure has
subgroups that contribute disproportionately to the over-
all goals of the network. Hence we should see an increase
in the relative importance of actors whose removal from
the network would do the most damage to the graph
structure. In the case of monitoring terrorist groups, La-
placian centrality may offer significant operational coun-
terintelligence benefits due to its strong association with
vertex inactivation. These expectations have been veri-
fied by the experimental results in Section 5.
vv
v
4.2. Comparison with Local and Global
Centrality Methods
In this section, we will give two simple examples to
show the differences between Laplacian methods with
the popular existing centrality measures respectively.
Here, degree method and subgraph method are chose to
represent local and global standard method respectively.
Please see Figure 1 for the first example. Based on
degree centrality, has higher ranking than v be-
cause the degree of is 4 while the degree of is 3.
uu
v
Figure 1. Example 1 for comparison of degree centrality
and Laplacian centrality method.
But based on Laplacian method, would have higher
ranking than because v
u


223
GG Gi
uvNu
i
Edudu dv
 
6


224
GG Gi
vvNv
i
Edvdv dv
 
2
Please see Figure 2 for the second example. Centrality
method based on global characterization of network
tends to find the center(s) of whole network. But at the
most time what we are really interested is to find the
center for each community in the network. If the network
is consist of more than two communities and with dra-
matically different sizes, the nodes in smaller community
would get lower ranks than the ones in larger community,
so that the leader in smaller community will not come up
with high rank. We specify this fact by the example in
Figure 2. The network is consisting of two communities
with centers 60 and 10 respectively. From the following
table, we will see that based on Laplacian method, we
always can find the two communities’ centers (#10 and
60), but with subgraph centrality method, all nodes in
the left bigger community all get higher ranks than nodes
in right smaller community, which will regard node
11 as the second center of the network wrongly.
#
#
node# Laplacian method subgraph method
60 1st 1st
10 2nd 51st
11 3rd 2nd
Here we only present particular examples which show
that sometimes local or global centrality methods can not
give the reliable results. Thus in practice, we need inter-
mediate method often.
5. Applications and Experimental Results
To demonstrate the effectiveness of Laplacian centrality,
we will test it on two terrorist networks: the Jemaah
Islamiyah Network collected by Stuart Koschade [11],
Copyright © 2013 SciRes. SN
X. Q. QI ET AL.
Copyright © 2013 SciRes. SN
23
Figure 2. Example 2 for comparison of subgraph centrality and Laplacian centrality method.
and the 9/11 hijacker network assembled by Valdis
Krebs [12], and all the 84 networks in the Add Health
in-school friendship nomination data. We compare the
Laplacian results with the most classical methods in-
cluding degree, closeness, eigenvector and betweenness
centrality methods except Katz prestige and Bonacich
centrality methods, because the latter two all depend on
the parameters users choice heavily, which means dif-
ferent choice of parameter would affect the results sig-
nificantly.
5.1. Data set 1: Jemaah Islamiyah Graph—Bali
2002 Terrorist Attack
Th e Jemaa h Is lamiya h ne twork is co mpri sed of 17 mem-
bers of the group that participated in the nightclub bomb-
ing on December 2002, Bali, Indonesia. The network is a
good example of a tight network with two clear clusters
(cliques) and a significant actor with strong measures of
betweenness and closeness. This terrorist attack was also
studied intensively in [14].
5.1.1. Output Analysis Based on Known Evidence
The information provided by the four standard centrality
measures and our Laplacian centrality measure as applied
to the 17 members of the terrorist group directly involved
in the operation are provided in Table 1, where the cen-
trality scores are normalized (dividing by the highest
score of each method). We also list the rank for each
terrorist. Note that frequently actors will exhibit the same
scores for a number of measures. In the case when ties
occur, we usually assign them the same rank. For exam-
ple, Sarijo, Imron, Dulmatin, Azahari, Patek and Ghoni
all get the same Laplacian score 0.5778, thus we will
rank all of them No. 3 since there are only two scores
1.000 0 ( S a mudra ) and 0.6 222 (I dr i s) greater than 0.5778.
The terrorist Samudra, in fact, provides the only link
between the bomb makers and Team Lima, the group
setting off the bombs (see Figure 3), and not surprisingly
scores rather high based on Laplacian and all other four
standard centrality methods. Idris, in his role as logistics
commander, yielded a high centrality score also, al-
though it is not as significant as that of Samudra. He is
ranked as the second most central actor in the network
based on Laplacian, degree, closeness and betweenness
centrality methods, but is ranked 8 th on eigenvector cen-
trality. And we also find that the members in the bomb
construction team (for example, Sarijo, Imron, Dulmatin,
etc.) also get high scores based on Laplacian centrality,
which support Koschade’s conclusion that “the members
of the Palau Manjangan residence (bomb construction
team) seemingly the center of the operation [11]”. We
also find that Mubarok is given the lowest rank on
Laplacian method, which is consistent with the conclu-
sion in [11] that “the lowest centrality scores were re-
served for the contingency members who were kept to
the periphery except when called upon for assistance.
Mubarok had the lowest scores as he was kept very iso-
lated and did not play any significant part in this stage of
the operation.” Lastly, the two actual suicide bombers,
Feri and Arnasan, have their highest combined rank us-
X. Q. QI ET AL.
24
ing Laplacian centrality. To see the different rankings among the five centrality
Table 1. The scores and ranks based on five centrality methods for the 17 actors in Jemaah Islamiyah’s network
Scores Ranks
Names Laplacian Degree Betweenness ClosenessEigenvectorLaplacianDegreeBetweenness Closeness EigenvectorConsensus
Samudra 1.0000 1.0000 1.0000 1.0000 1.0000 1 1 1 1 1 1
Idris 0.6222 0.6667 0.1008 0.7727 0.8917 2 2 2 2 8 2
Imron 0.5778 0.6000 0.0381 0.7391 0.8946 3 3 3 3 2 2
Sarijo 0.5778 0.6000 0.0273 0.7391 0.8946 3 3 4 3 2 2
Dulmatin 0.5778 0.6000 0.0273 0.7391 0.8946 3 3 4 3 2 2
Azahari 0.5778 0.6000 0.0273 0.7391 0.8946 3 3 4 3 2 2
Patek 0.5778 0.6000 0.0273 0.7391 0.8946 3 3 4 3 2 2
Ghoni 0.5778 0.6000 0.0273 0.7391 0.8946 3 3 4 3 2 2
Muklas 0.5689 0.6000 0.0273 0.7391 0.8661 9 3 4 3 9 9
Junaedi 0.2222 0.3333 0.0000 0.6071 0.2108 11 11 11 10 13 10
Hidayat 0.2222 0.3333 0.0000 0.6071 0.2108 11 11 11 10 13 10
Octavia 0.2222 0.3333 0.0000 0.6071 0.2108 11 11 11 10 13 10
Rauf 0.2222
0.3333 0.0000 0.6071 0.2108 11 11 11 10 13 10
Arnasan 0.2222 0.3333 0.0000 0.6071 0.2108 11 11 11 10 13 10
Feri 0.3333 0.4000 0.0000 0.5152 0.6125 10 10 11 17 10 15
Amrozi 0.2089 0.2667 0.0055 0.5862 0.3447 16 16 10 15 11 16
Mubarok 0.1556 0.2000 0.0000 0.5667 0.2536 17 17 11 16 12 17
LaplacianDegreeBetweennessCloseness Eigenvector
diviation36 72 139 48 156
Figure 3. Stuart Koschade’s (2006) data on Jemaah Islamiyah’s attack on the Bali nightclub in 2002.
Copyright © 2013 SciRes. SN
X. Q. QI ET AL. 25
measurements visually, we plot the scores for each me-
thod in Figure 4. Ranks obtained by all centrality mea-
sures generally agree with each other for this data set.
Some noticeable minor disagreements are the ranks of
terrorists Muklas and Feri. However, the ranks by Lapla-
cian centrality are consistent with the majority of other
measurements.
5.2. Data Set 2: Valdis Krebs’ (2002) Data on the
9/11 Hijackers
Another widely discussed example of network analysis
of terrorist activity is Krebs’ now classic analysis of the
9/11 hijackers [12]. Through public data, the network
centered around the 19 hijackers of these events were
examined by Krebs [12]. We use the larger network (Fi-
gure 4 in [12]) which contains numerous additional indi-
viduals involved in the support network behind the 19
hijackers who actually conducted the suicide mission.
These co-conspirators were conduits for money, commu-
nications routes, and provided needed skills and know-
ledge. Figure 5 shows the hijackers and their network
neighborhood—their direct and indirect associates.
The ranking of actors based on four standard centrality
measures and Laplacian centrality measure are provided
in Table 2, where we only list the centrality scores for
these 19 hijackers. The values are normalized (dividing
by the highest score of each method). We also rank these
19 hijackers according to their scores and when ties hap-
pen we use the same criterion as used in the Jemaah
Islamiyah network.
5.2.1. Output Analysis Based on Known Evidence
(Team Leaders of Hijacking Groups).
There were four commercial airplanes hijacked in this
Figure 4. Plots of normalized scores for 17 actors in Bali
Operation under five centrality measurements.
terror plot. The following is the list of all hijackers on
these airplanes.
American Airlines (AA11): Mohamed Atta (pilot),
Abdulaziz al-Omari, Satam al-Suqami, Wail al-Shehri,
Waleed al-Shehri.
American Airlines (AA77): Hani Hanjour (pilot),
Nawaf al-Hazmi, Salem al-Hazmi, Khalid al-Mihdhar,
Majed Moqed.
United Airlines (UA175): Marwan al-Shehhi (pilot),
Fayez Ahmed, Hamza al-Ghamdi, Ahmed al-Ghamdi,
Mohand al-Shehri.
United Airlines (UA93): Ziad Jarrah (pilot), Ahmed
al-Haznawi, Saeed al-Ghamdi, Ahmed al-Nami.
We can see from Table 2, Mohamed Atta (AA11) is
unanimously identified as the most important actor by all
measures. This result is consistent with the findings of
The 9/11 Commission Report [15] and verified by state-
ments of Osama bin Laden.
However, beyond that, we observe a significant dif-
ference between the Laplacian measure and the other
traditional measures (degree, betweenness, closeness and
eigenvector centrality). While Mohamed Atta (AA11),
Marwan Al-Shehhi (UA175), and Hani Hanjour (AA77)
are also the top three in the traditional centrality scores,
the increased prominence of Ziad Jarrah (UA93) in
Laplacian centrality is striking and noteworthy. Based on
Laplacian centrality, the four most important centers
comprise all four pilots of the different flights. However,
Ziad Jarrah (UA93) scores as either the 5th (degree cen-
trality), 6th (betweenness), or 9th (closeness) most im-
portant actor in traditional measures. Eigenvector cen-
trality also places Ziad Jarrah in the top 4, but does so at
considerable cost to the assessment of Nawaf Alhazmi.
Alhazmi is in the top 5 of the other four centrality meas-
ures, and is second in betweenness, indicating his impor-
tance as a communications conduit. Eigenvector central-
ity moves him to 11th place, perhaps too great a reduc-
tion for an individual who also trained as a pilot, and met
several times with Atta in the planning of the attack. The
Laplacian results are somewhat more intuitively appeal-
ing.
The normalized values of the five measures provided
in Figure 6 shows more variation in various measures,
relative to the Laplacian measure. In fact, certain indi-
viduals, such as, Ziad Jarrah (UA93) and Nawaf Al-
Hazmi (AA77) shift substantially from index to index.
Unlike the Bali data, these are noticeable shifts in the
relative importance of various members of the terrorist
network.
5.3. The Add Health in-School Friendship
Nomination Data
The third data set we use here is the Add Health in-
school friendship nomination data, which are constructed
Copyright © 2013 SciRes. SN
X. Q. QI ET AL.
26
Figure 5. Valdis Krebs’ (2002) data on the 9/11 hijackers. Hijackers in different flights can be distinguished by their different
node shapes. Square: hijac kers in Flight AA11; Up triangle: hijackers in Flight AA77; Box: hijackers in Flight UA93; Cycle
in box: hijackers in Flight UA175. Larger size nodes are the pilots on each flight.
Figure 6. Normalized ranking for 19 actors in 9/11 under
five centrality measurements.
from the In-School questionnaire. Each student was
given a paper-and-pencil questionnaire and a copy of a
roster listing every student in the school and one “sis-
ter” school if it has. The question was, “List your closest
(male/female) friends. List your best (male/female)
friend first, then your next best friend, and so on.
(Girls/Boys) may include (boys/girls) who are friends
and (boy/girl) friends.” Students listed the names and
corresponding numbers across a grid. Because nomina-
tions to friends in the sister school were allowed, the
networks are given at the “school-pair” level. The whole
data set contains 84 valued networks covering 75,871
nodes (students) in a total of 129 unique schools.
From above information, we construct the corre-
sponding undirected networks by taking each student as a
node, adding an edge between two nodes if there are
nominated relationship between them. We test all five
centrality methods including Laplacian method on all of
these 84 networks1. To savere we just present space, he
-
1Most of the networks are composed with a dominated connected com-
p
onent and several isolated vertices which have no edges with others,
thus during the practical process, we actually test on the biggest con-
nected component for each network so that we can get the two popula
r
methods—betweenness and closeness which only work on connected
graphs included to c ompare.
Copyright © 2013 SciRes. SN
X. Q. QI ET AL. 27
Table 2. The centrality scores based on five methods for the 19 hijackers in 9/11 network; the ranks and the consensus rank.
Scores Ranks
Names Laplacian Degree Betweenness ClosenessEigenvectorLaplacianDegreeBetweennessCloseness Eigenvector Consensus
rank
Mohamed Atta 1.0000 1.00001.0000 1.0000 1.0000 1 1 1 1 1 1
Marwan-
Al-Shehhi 0.7628 0.81820.1495 0.7939 0.9684 2 2 4 2 2 2
Hani Hanjour 0.4817 0.59090.2147 0.7591 0.6044 3 3 3 3 4 3
Ziad Jarrah 0.3716 0.45450.0289 0.7222 0.6262 4 5 9 5 3 4
Nawaf Alhazmi 0.3472 0.50000.2617 0.7536 0.3495 5 4 2 4 11 4
Abdul Aziz
Al-Omari 0.3399 0.40910.0387 0.7222 0.5752 6 6 7 5 5 6
Satam Suqami 0.2738 0.36360.0857 0.6980 0.4660 7 7 5 7 7 7
Fayez Ahmed 0.2714 0.36360.0438 0.6933 0.4879 9 7 6 8 6 8
Salem Alhazmi 0.2738 0.36360.0217 0.6228 0.4296 7 7 11 11 9 9
Wail Alshehri 0.2249 0.27270.0042 0.6842 0.4466 10 11 15 9 8 10
Hamza Alghamdi 0.1883 0.31820.0376 0.6154 0.2379 11 10 8 12 12 10
Waleed Alshehri 0.1809 0.27270.0013 0.5714 0.3762 12 11 16 14 10 12
Ahmed Al
Haznawi 0.1345 0.18180.0260 0.6797 0.2282 15 16 10 10 13 13
Khalid
Al-Mihdhar 0.1540 0.27270.0095 0.5652 0.1966 13 11 14 15 15 14
Ahmed Alghamdi 0.1369 0.22730.0118 0 .5778 0.2257 14 15 13 13 14 15
Saeed Alhazmi 0.1296 0.27270.0198 0.5652 0.1238 16 11 12 15 17 16
Majed Moqed 0.1174 0.18180.0000 0.5591 0.1820 17 16 18 17 16 17
Ahmed Alnami 0.0733 0.13640.0000 0.5503 0.0825 18 18 18 18 18 18
Mohand Alshehri 0.0440 0.09090.0009 0.5306 0.0825 19 19 17 19 18 19
LaplacianDegreeBetweennessCloseness Eigenvector
Diviation13 52 125 30 73
Figure 7. Net1 in the Add Health in-school friendship nomination data.
Copyright © 2013 SciRes. SN
X. Q. QI ET AL.
28
Table 3. The centrality scores based on five methods for top 15 vertices in Net 1; their ranks and consensus rank in all 69
vertices.
Scores Ranks
Node
number Laplacian Degree Betweenness ClosenessEigenvectorLaplacianDegreeBetweenness Closeness EigenvectorConsensus
#34 1 1 0.8902 0.9869 1 1 1 2 2 1 1
#51 0.9306 0.9286 1 1 0.8879 2 2 1 1 3 2
#66 0.7269 0.7857 0.4303 0.9379 0.8048 5 4 7 4 4 3
#61 0.7546 0.7857 0.3080 0.9379 0.9034 3 4 19 4 2 4
#33 0.7546 0.8571 0.7181 0.8118 0.5134 3 3 3 17 11 5
#29 0.5787 0.7143 0.3812 0.8728 0.6311 9 7 10 6 7 6
#31 0.6204 0.6429 0.3219 0.9497 0.7546 7 10 18 3 6 7
#54 0.5278 0.6429 0.4113 0.8629 0.5562 13 10 8 9 10 8
#43 0.5185 0.6429 0.4357 0.8436 0.3713 14 10 6 14 13 9
#60 0.6759 0.7857 0.3557 0.8297 0.3157 6 4 13 16 20 10
#16 0.4815 0.6429 0.1666 0.8032 0.4308 19 10 24 18 12 11
#35 0.4630 0.5714 0.4587 0.8678 0.2510 20 19 5 8 32 12
#8 0.6157 0.7143 0.2147 0.7947 0.2948 8 7 21 23 26 13
#26 0.3935 0.5000 0.3599 0.8629 0.3558 25 25 12 9 16 14
#36 0.5509 0.7143 0.3395 0.7989 0.2422 10 7 15 21 35 15
LaplacianDegreeBetweennessCloseness Eigenvector
Diviation3314 4071 7182 5267 5854
the results for the first network Net1, which contains 71
nodes totally (a big component with 69 vertices and two
isolated vertices), detailed see Figure 7. Table 3 shows
all the centrality scores and ranks for 15 of these 71 ver-
tices.
Since we are lacking of the background information of
this school, it is hard for us to discuss these centrality
results from known evidence. Thus in next section, we
will use “deviation from consensus rank” for each cen-
trality method to evaluate its performance. The outper-
formance of Laplacian method is illustrated in Table
3—the smallest deviation. For example, degree method
can not distinguish the importance between node
and since they have the same number of immediate
neighbors, but they are distinguished by Laplacian me-
thod because Laplacian method considers the bigger en-
vironment (neighbors with 2 steps) around them.
#66
#61
6. Consensus Analysis and Degree of
Deviation
Consensus analysis of outputs is a widely used method in
bioinformatics for finding “consensus DNA or RNA (sub)
sequence(s)” [16,17]. A similar consensus method is
adapted here to evaluate the performence of various
methods and, therefore, to verify the validity of Lapla-
cian centrality method. Outputs from several standard
methods are taken in consideration, and would be further
compared with the consensus result. A method is re-
garded as more robust and has greater confidence if its
output is closer (smaller deviation, or better matching) to
the consensus result. Here, to save space, we demonstrate
the consensus analysis only for the 9/11 hijackers.
6.1. Consensus Rank
Different from DNA sequences whose terms are nucleo-
tides
,,,
A
CGT2. The ranking of hijackers are nu-
merically scored (natural numbers). Hence, the subjects
for consensus are rather different. In this research project,
we adapt the similar ideas and principles of consensus
applied in bioinformation in the ranking study of social
networks. The consensus ranks are calculated as follows.
At first, for each terrorist, we calculate the mean of its
five ranks from various methods. For example, Marwan
Al-Shehhi (UA175) gets ranks
from five
2,2,4,2,2
2Abbreviations of nucleotides: =
A
adenine , , =Ccytosine
=Gguanine , . =Tthymine
Copyright © 2013 SciRes. SN
X. Q. QI ET AL. 29
centrality methods respectively, thus its mean of rank is
2.4 (a fractional number); secondly, we sort the mean
values of these 19 hijackers from smallest to largest, the
output of order is defined as the consensus rank of these
19 hijackers. Note that when ties happen (i.e., more than
one hijackers have the same mean value) we follows the
same criterion as used in Jemaah Islamiyah network and
9/11 network. We list the consensus rank of these 19
hijackers at the last column of Table 2.
6.2. Deviation of Each Method from Consensus
Result
To further analyze, we use the following “deviation”
score to numerically evaluate the distance from the out-
put based on each centrality method to the consensus
rank:
 
19 2
=1
=
C
i
deviation Crankiconsensus i
where is the rank of -th terrorist based on
centrality measurement ( {Laplacian, degree,
closeness, betweenness, eigenvector centrality}), and
is the consensus rank of -th terrorist.

C
rank i

ensus i
i
C C
cons i
Clearly, the smaller the deviation, the better is the
output. A method with the smallest deviation is regarded
as the one with “the best fit”. The deviations for all cen-
trality methods are presented at the last two rows of Ta-
ble 2, which shows that Laplacian method has the small-
est deviation. That is, Laplacian centrality method has
the best fit to the consensus ranking results, which is a
further evidence of its effectiveness and reliability to
identify major players in social network.
We apply the same strategy on the Jemaah Islamiyah
data set, and find that Laplacian method also has the
smallest deviation, see Table 1.
We also apply the same strategy on all the 84 networks
in the Add Health in-school friendship nomination data.
We find that Laplacian method’s deviations for all these
84 networks are always the minimum, which imply
Laplacian method is the most fit centrality method for all
these 84 networks. This is another strong evidence that
shows the Laplacian method’s advantages.
Remark The validity and robustness of Laplacian
centrality measure have been illustrated on two different
terrorist social network data sets and 84 networks in
James Moody’s Add Health in-school friendship nomi-
nation data, and is compared with other standard central-
ity measures. Note that this method also could be applied
on large networks (e.g. number of nodes ) with
high effectiveness (and low time-consuming) because
Laplacian centrality measure has low computational
complexity, and we will see in the following Section 7.
>1000
7. Computational Complexity
In this section, we discuss the computational complexity
of Laplacian centrality method. By glancing at the defi-
nition of Laplacian centrality (Definition 2), one might
initially guess that the computational complexity would
be relatively high since it involves the calculation of ei-
genvalues. However, by applying an algebraic graph
theory result (Theorem 1), we are able to design a very
fast algorithm. Theorem 1 provides a structural result that
graphically describes the Laplacian centrality.
For the sake of comparison, we first present the com-
plexity of all standard methods. Let be a graph with
vertices and edges. The data structure of the in-
put graph is the adjacency list of , which presents the
adjacency relation of all edges of the input graph .
G
nm GG
Closeness and Betweeness Centralities. The most basic
step in these two algorithms is the search for the shortest
paths between every pair of vertices. Computing the
shortest paths between any two vertices is the necessary
step. Its fastest algorithm is Floyd-Warshall algorithm
whose time complexity is [18]. Hence, the total
time complexity for either closeness method or between-
ness method is at least

3
On
3
On .
Eigenvector Centrality. Given a graph, there are sev-
eral approaches for estimating the eigenvector. One of
the most popular approaches involves the inverses of
matrices. Computational complexity is at least
3
On
for the computation of inverses [19].
Laplacian centrality. The degrees of all vertices and
the corresponding neighborhood are estimated by scan-
ning the adjacency list. That is, the time complexity for
this step is at most
Om. Then, by Theorem 1, Lapla-
cian centralities for each one vertex needs
v
2
dv
additive operations and 2 multiplication operations, thus
the computations of centrality scores for all vertices can
be finished in
4n2Om units of time. Thus, the
computational complexity of Laplacian method is
Om.
Degree Centralities. Though degree measuring is
rather intuitively heuristic and its processing is pretty
straightforward, the time complexity remains
Om, not
smaller than that of Laplacian centrality.
To summary, we present the following table showing
the time complexity of each method. We would see that
Laplacian centrality offers substantial advantages to the
other measures when examining large scale networks.
We admit that degree method run faster than Laplacian
method, but it only supplies us very local information for
each vertex, which is less reliable.
time complexity
laplacian

Om
eigenvalue

3
On
betweenness

3
On
closeness

3
On
degree

On
Copyright © 2013 SciRes. SN
X. Q. QI ET AL.
30
8. Concluding Remarks
In this final section, we survey some properties of the
new method: its balanced global/local measurement quai-
lties, its accuracy and effectiveness, efficiency, and its
future applications. The review is conducted from several
very different angles: graph structure, verification of
known facts from experimental testing, and the consen-
sus for comparison.
From the graph theoretical point of view, graph cen-
trality measurements can be roughly classified as two
types: local or global. Degree centrality is a typical ex-
ample of local measurement since it only considers the
information of the number of vertices which are reach-
able from directly, while betweeness, closeness and
eigenvector, are more global. Laplacian centrality reveals
more connection information beyond its immediate sur-
rounding neighborhood, thus serves as an intermediate
between global and local characterizations.
v
Centrality measurement based on shortest path calcu-
lations (such as, betweeness, closeness, etc.) are powerful
tools for the detection of bottlenecks in networks—the
cut-vertices of connected graphs. Consequently, these
types of vertices are scored more favorably if global con-
nectivity is relatively low. In these lower connectivity
examples, Laplacian centrality will provide a more ba-
lanced measurement, which takes both bottleneck infor-
mation and local density information into account. As we
discussed above, from a graph theoretical point of view
different methods reveal different measurements of im-
portance due to their different structural emphasis.
Test results from some benchmark data sets also sup-
port the conclusion that Laplacian centrality is a balanced
global/local measurement. It is able to identify not only
the cut point of the network of the connection, but also
the leaders or key personnel in each cluster, such as the
team pilot of each 911 hijacking group and the suicide
bombers of bomb delivery group in the Bali nightclub
attack.
Applying the new method along with other popularly
used methods to two terrorist networks and all 84 friend-
ship networks yields strong evidence that the Laplacian
method provides a better performance as a network ana-
lysis tool. This is supported by two different approaches:
confirmation of analyses based on known intelligence
information, and consensus comparison, where the study
shows that the Laplacian method has the smallest devia
tion from the consensus result, providing additional
evaluation of the reliability of Laplacian centrality.
In situations where scarce resources must be commit-
ted to counterterrorism programs, diversion of monitor-
ing and surveillance from one actor to another may be a
critical decision. A relatively effective and reliable me-
thod is needed for such analysis and decision making.
Based on our graph theore tical analysis, testing of bench-
mark data, and statistical comparisons, this newly de-
signed method is a potentially significant candidate for a
reliable tool to be used in the identification of major
players in future terrorist attacks.
We have illustrated the similarities and dissimilarities
with respect to the standard measures adopted in socio-
metry by considering some important examples of po-
litical networks. As we know, for any particular research
project we will have to identify which centrality measure
is most meaningful or useful. It remains to be seen, in the
light of further empirical work, if and in which cases the
new measure is clearly more appropriate than the others.
Yet at this preliminary exposition, Laplacian centrality
provides results that seem potentially compelling in cer-
tain situations where the overall degradation of the net-
work based on vertex deletion may yield superior results.
Network analysis in support of counterterrorism might
well be an area where Laplacian centrality rises to such
importance.
9. Acknowledgements
This research project is partially supported by a WV
EPSCoR grant and an NSA grant H98230-12-1-0233.
This work is also su pported partly by Sh andong Pro vince
Natural Science Foundation of China with No.
ZR2010AQ018 and No. ZR2011FQ010, partly by Inde-
pendent Innovation Foundation of Shandong University
with No. 2010ZRJQ005, Q. Wu’s wo rk is also suppo rted
by National Natural Science Foundation of China (NO.
61202312).
REFERENCES
[1] Z. Maoz, D. Kuperman, L. Terris and I. Talmud, “Struc-
tural Equivalence and International Conflict: A Social
Networks Analysis,” Journal of Conflict Resolution, Vol.
50, No. 5, 2006, pp. 664-689.
doi:10.1177/0022002706291053
[2] M. Sageman, “Understanding Terror Networks,” Phila-
delphia, University of Pennsylvania Press. 2004.
[3] J. T. Scholz, R. Berardo and B. Kile, “Do Networks En-
hance Cooperation? Credibility, Search, and Collabora-
tion,” Journal of Politics, Vol. 70, No. 2, 2008, pp.
393-406.
[4] J. Fowler, B. Grofman and N. Masuoka, “Social Net-
works in Political Science: Hiring and Placement of Ph.
Ds, 1960-2002. Political Science: 2007, pp. 727-739.
[5] S. Sreenivasan, R. Cohen, E. Lopez, Z. Toroczkai and H.
E. Stanley 2007. Phys. Rev. E 75, 036105.
doi:10.1103/PhysRevE.75.036105
[6] M. O. Jackson, “Presenting and Measuring networks,”
Chapter 2, Social and Economic Networks, Princeton
University Press, Princeton, 2008.
[7] T. Opsahl, F. Agneessens and J. Skvoretz, “Node Cen-
trality in Weighted Networks: Generalizing Degree and
Copyright © 2013 SciRes. SN
X. Q. QI ET AL.
Copyright © 2013 SciRes. SN
31
Shortest Paths,” Social Networks, Vol. 32, No. 3, 2010,
pp. 245-251. doi:10.1016/j.socnet.2010.03.006
[8] F. Jordan and I. Scheuring, “Network Ecology: Topo-
logical Constraints on Ecosystems Dynamics,” Physics of
Life Reviews, Vol. 1, No. 3, 2004, pp. 139-172.
doi:10.1016/j.plrev.2004.08.001
[9] F. Jordan, W. C. Liu and A. J. Davis, “Topological Key-
stone Species: Measures of Positional Importance in Food
Webs,” Oikos, Vol. 112, No. 3, 2006, pp. 535-546.
doi:10.1111/j.0030-1299.2006.13724.x
[10] M. Lazic, “On the Laplacian Energy of a Graph,” Cze-
choslovak Mathematical Journal, Vol. 56, No. 131, 2006,
pp. 1207-1213.
[11] S. Koschade, “A Social Network Analysis of Jemaah
Islamiyah: The Applications to Counterterrorism and In-
telligence,” Studies in Conflict and Terrorism, Vol. 29,
No. 6, 2006, pp. 559-575.
doi:10.1080/10576100600798418
[12] V. Krebs, “Uncloaking Terrorist Networks,” First Mon-
day, Vol. 7, No. 4, 2002, 1st April.
[13] F. Chung, “Spectral Graph Theory,” American Mathe-
matical Society, USA1997..
[14] J. Magouirk, S. Atran and M. Sageman, “Connecting
Terrorist Networks,” Studies in Conflict and Terrorism,
Vol. 31, No. 1, 2008, pp. 1-16.
[15] T. H. Kean et al., “The 9/11 Commission Report,” W. W.
Norton and Company, New York, 2004.
[16] M. Hamada, K. Sato and K. Asai, “Improving the Accu-
racy of Predicting Secondary Structure for Aligned RNA
Sequences,” Nucleic Acids Research, 1-10. 2010.
[17] M. Xu, Z. Su, “Computational Prediction of cAMP Re-
ceptor Protein (CRP) Binding Sites in Cyanobacterial
Genomes,” BMC Genomics, 10-23. 2009.
[18] S. Pemmaraju and S. Skiena, “All-Pairs Shortest Paths
and Transitive Closure and Reduction. In: Computational
Discrete Mathematics: Combinatorics and Graph Theory
in Mathematica. Cambridge, England, Cambridge Uni-
versity Press, 2003. pp. 330-331 and 353-356.
[19] B. C. Csaji, R. M. Jungers and V. D. Blondel, “Pagerank
Optimization by Edge Selection,” The Computing Re-
search Repository abs/0911.2280. 2009.