[1]
P.M. Kamath, "Terrorism in India: Impact on national security", J. Strat. Anal., Taylor and Francis, vol. 25, pp. 1081-1987, 2001.
[2]
Report of global peace index-2018 Available from:, http:// visionofhumanity.org/app/uploads/2018/06/Global-Peace-Index-2018-2.pdf
[3]
R. Clarke, "Lashkar-i-taiba: The fallacy of subservient proxies and
the future of islamist terrorism in india", In: Crime-Terror Nexus in
South Asia, pp. 74-119. 2011.
[4]
Annual Report of Ministry of Home Affairs Government of India
2017-18 Available from:, https://mha.gov.in/sites/default/files/MINISTRY% 20OF%20HOME%20AFFAIR%20AR%202017- 18%20FOR%20WEB.pdf
[5]
Global Terrorism Database Available from:, https://www. start.umd.edu/gtd/
[6]
RAND Database of Worldwide Terrorism Incidents Available from:, https://www.rand.org/nsrd/projects/terrorism-incidents.html
[7]
MIPT Terrorism Knowledge Base Available from:, https://www. mtholyoke.edu/~lhgarner/worldpolitics/tkbsite.htm
[8]
C. Martinez-Cruz, I.J. Blanco, and M.A. Vila, "Ontologies versus relational databases: Are they so different? A comparison", Artif. Intell. Rev., vol. 38, pp. 271-290, 2012.
[9]
P. Hitzler, M. Krotzsch, and S. Rudolph, Foundations of semantic web technologies., 1st ed Chapman and Hall/CRC, 2009.
[10]
J. Davies, R. Studer, and P. Warren, Semantic Web technologies: trends and research in ontology-based systems., 1st ed John Wiley & Sons, 2006.
[11]
X. Wang, R. Gorlitsky, and J.S. Almeida, "From XML to RDF: how semantic web technologies will change the design of’omic’standards", Nat. Biotechnol., vol. 23, pp. 1099-1103, 2005.
[12]
J. Domingue, D. Fensel, and J.A. Hendler, Handbook of semantic web technologies.Springer Science & Business Media, .Vol. 1, 2011.
[13]
H.L. Kim, H.G. Kim, and S. Decker, "Semantic documentation
using semantic web technologies and social web services", Next
Generation Web Services Practices, pp. 27-32, 2006.
[14]
South Asia Terrorism Portal Available from:, http://www.satp.org/
[15]
Esri Terrorist attack Available from:, https://storymaps.esri.com/ stories/terrorist-attacks/
[16]
I. Kollia, B. Glimm, and I. Horrocks, "SPARQL query answering over OWL ontologies", In: Extended Semantic Web Conference, Springer: Berlin, Heidelberg, pp. 382-396. 2011.
[17]
O. Hartig, C. Bizer, and J.C. Freytag, "Executing SPARQL queries over the web of linked data", In: International Semantic Web Conference, Springer: Berlin, Heidelberg, pp. 293-309. 2009.
[18]
S. Abburu, and S.B. Golla, "Ontology storage models and tools: An authentic survey", J. Intel. Sys., vol. 25, pp. 539-553, 2016.
[19]
C. Nédellec, and A. Nazarenko, "Ontology and Information Extraction: A Necessary Symbiosis", In: Ontology Learning from Text: Methods, Evaluation and Applications., IOS Press Publication, 2005.
[20]
X. Li, T. Qiu, Q. Liu, and X. Bai, "Ontology building from incomplete information system based on granular computing", International
Conference on Granular Computing, IEEE, 2010.
[21]
N. Drummond, and R. Shearer, "The open world assumption", In: eSI Workshop: The Closed World of Databases meets the Open
World of the Semantic Web, vol. 15. 2006.
[22]
G. Antoniou, and F.V. Harmelen, "Web ontology language: OWL", In: Handbook on ontologies., Springer: Berlin, Heidelberg, pp. 91-110. 2009.
[23]
E. Sirin, B. Parsia, B.C. Grau, A. Kalyanpur, and Y. Katz, "Pellet: A practical owl-dl reasoned", Web Semantics: Science, services
and agents on the World Wide Web, vol. 5, pp. 51-53, 2007.
[24]
R. Jackson, "The Study of Terrorism: A New Approach"Arch.
Quarterly, vol. 4. 6th ed pp. 92-95. 2010.
[25]
G. LaFree, "The Global Terrorism Database (GTD) Accomplishments and Challenges", Perspect. Terror., vol. 4, pp. 24-46, 2010.
[26]
Annual Report of Global Terrorism Index- 2017 Available from:, http://visionofhumanity.org/app/uploads/2017/11/Global-Terrorism-Index-2017.pdf
[27]
Annual report of Patterns of Global Terrorism-2016 Available from:, https://www.state.gov/j/ct/rls/crt/2016/272233.htm#INDIA
[28]
R. Kiran, "India’s War on Terrorism and International Cooperation", Society for the Study of Peace and Conflict, 2017.
[29]
C. Deaton, B. Shepard, C. Klein, C. Mayans, B. Summers, A. Brusseau, W. Michael, and D. Lenat, "The comprehensive terrorism knowledge base in cyc", International Conference on Intelligence Analysis, 2005.
[30]
J. Wilkerson, T. Wang, H. Chen, and R.P. Schumaker, "Terror tracker system: a web portal for terrorism research", 5th ACM/IEEE-CS Joint Conference on Digital Libraries, p. 416, 2005.
[31]
N. Toppo, "Nature of terrorism in india: Islamic extremism and terrorism", International Conference On Lastest Innovation In Arts, Social Science & Humanities, 2017.
[32]
J. Wigle, "Introducing the worldwide incidents tracking system (WITS)", Perspect. Terror., vol. 4, pp. 3-23, 2010.
[33]
B. Schuurman, "Research on Terrorism, 2007–2016: A Review of
Data, Methods, and Authorship"Terror. Politic. Viol, Taylor and Francis, pp. 1-16. 2018.
[34]
F. Ding, Q. Ge, D. Jiang, J. Fu, and M. Hao, "Understanding the dynamics of terrorism events with multiple-discipline datasets and machine learning approach", PLoS One, vol. 12, . e0179057 2017.
[35]
A. Khan, M.A.R. Estrada, and Z. Yusof, "Terrorism and India: An economic perspective", Qual. Quant., vol. 50, pp. 1833-1844, 2016.
[36]
D. Knoke, "Emerging trends in social network analysis of terrorism
and counterterrorism", Emerging Trends in the Social and Behavioral
Sciences: An Interdisciplinary, Searchable, and Linkable Resource, pp. 1-15, 2015.
[37]
E. Gilbert, "Victim compensation for acts of terrorism and the limits of the state", Critical Studies on Terrorism, Taylor and Francis, vol. 11, pp. 199-218, 2018.
[38]
M. Guruswamy, and Z.D. Singh, India China relations: the border issue and beyond., Viva Books, 2009.
[39]
National Terrorism Advisory System (NTAS) Available from:, https://www.dhs.gov/national-terrorism-advisory-system
[40]
S. Ressler, "Social network analysis as an approach to combat
terrorism: Past, present, and future research", Homel. Secur. Aff., vol. 2, 2006.
[41]
E. Reid, J. Qin, W. Chung, J. Xu, Y. Zhou, R. Schumaker, S. Marc, and H. Chen, "Terrorism knowledge discovery project: A
knowledge discovery approach to addressing the threats of terrorism"In International Conference on Intelligence and Security Informatics, Springer: Berlin, Heidelberg, pp. 125-145. 2004.
[42]
Victims of Terrorism Support Portal Available from:, https://www.un.org/counterterrorism/ctitf/en/victims-terrorism-support-portal
[43]
Israeli Security Agency - Terrorism portal Available from:, https://www.shabak.gov.il/english/pages/terror.html#=1
[44]
Terrorism and Extremist Violence in the United States (TEVUS) portal Available from:, http://www.start.umd.edu/
[45]
B.K. Houghton, "Terrorism Knowledge Base: A Eulogy (2004-2008)", Persp. Terror., vol. 2, 2010.
[46]
T. Tudorache, N.F. Noy, S. Tu, and M.A. Musen, "Supporting
collaborative ontology development in Protégé", In: International
Semantic Web Conference, Springer: Berlin, Heidelberg, pp. 17-32. 2008.
[47]
N.F. Noy, M. Crubézy, R.W. Fergerson, H. Knublauch, S.W. Tu, J. Vendetti, and M.A. Musen, "Protégé-2000: An open-source ontology-
development and knowledge-acquisition environment", In: Annual Symposium proceedings, AMIA Symposium, American Medical
Informatics Association, Vol. 2003, pp. 953-953. 2003.
[48]
H. Knublauch, R.W. Fergerson, N.F. Noy, and M.A. Musen, "The Protégé OWL plugin: An open development environment for semantic web applications", In: International Semantic Web Conference, Springer: Berlin, Heidelberg, pp. 229-243. 2004.
[49]
V. Jain, and M. Singh, "Ontology development and query retrieval
using protégé tool", Int. J. Intel. Sys. Appl., pp. 67-75, 2013.
[50]
M.R. Khondoker, and P. Mueller, ""Comparing ontology development tools based on an online survey"", World Cong. Eng London 2010.
[51]
S. Jain, "“Intelligent Decision Support for Unconventional Emergencies”, In Exploring Intelligent", Decis. Support Syst., pp. 199-219, 2018.
[52]
S. Jain, C. Gupta, and A. Bhardwaj, "Research directions under the parasol of ontology based semantic web structure", In: International Conference on Soft Computing and Pattern Recognition, pp. 644-655. December 2016.
[53]
A. Patel, and S. Jain, "Formalisms of Representing Knowledge", Procedia Comput. Sci., vol. 125, pp. 542-549, 2018.
[54]
D.L. McGuinness, and F.V. Harmelen, "OWL web ontology language
overview", W3C Recommend, vol. 10, 2004.
[55]
N.F. Noy, and D.L. McGuinness, "Ontology development 101: A guide to creating your first ontology", 2001.
[56]
N. Guarino, D. Oberle, and S. Staab, "What is an ontology?", In: Handbook on ontologies., Springer: Berlin, Heidelberg, pp. 1-17. 2009.
[57]
S. Staab, and R. Studer, Handbook on ontologies., Springer Science & Business Media, 2010.
[58]
C. Martinez-Cruz, I.J. Blanco, and M.A. Vila, "Ontologies versus relational databases: Are they so different? A comparison", Artif. Intell. Rev., vol. 38, pp. 271-290, 2012.
[59]
H. Hlomani, and D. Stacey, "Approaches, methods, metrics, measures, and subjectivity in ontology evaluation: A survey", Semantic Web J., vol. 1, pp. 1-11, 2014.
[60]
A. Lozano-Tello, and A. Gómez-Pérez, "Ontometric: A method to choose the appropriate ontology", J. Database Manag. (JDM), vol. 15, pp. 1-18, 2004.
[61]
S. Tartir, I.B. Arpinar, M. Moore, A.P. Sheth, and B. Aleman-Meza, "OntoQA: Metric-based ontology quality analysis", 2005.
[62]
S. Tartir, and I.B. Arpinar, "Ontology evaluation and ranking using OntoQA", In: International Conference on Semantic Computing, pp. 185-192. 2007.
[63]
B. Lantow, "OntoMetrics: Application of on-line ontology metric
calculation", In: BIR Workshops, 2016.
[64]
B. Lantow, "Onto metrics: Putting metrics into use for ontology evaluation", In: KEOD, pp. 186-191. 2016.
[65]
M. Poveda-Villalón, A. Gómez-Pérez, and M.C. Suárez-Figueroa, "Oops! (ontology pitfall scanner!): An on-line tool for ontology evaluation", Int. J. Semantic Web Inf. Sys. (IJSWIS), vol. 10, pp. 7-34, 2014.
[66]
M. Poveda-Villalón, M.C. Suárez-Figueroa, and A. Gómez-Pérez, "Validating ontologies with oops!", In: International Conference on Knowledge Engineering and Knowledge Management, Springer: Berlin, Heidelberg, pp. 267-281. 2012.
[67]
A. Gómez-Pérez, "Did You Validate Your Ontology? OOPS!" The
Semantic Web: ESWC 2012 Satellite Events: ESWC 2012 Satellite
Events Heraklion, Crete: Greece, . 2015.
[68]
C.M. Keet, M.C. Suárez-Figueroa, and M. Poveda-Villalón, "The current landscape of pitfalls in ontologies", 2013.
[69]
M.C. Suarez-Figueroa, M. Kamel, and M. Poveda-Villalon, "Benefits
of natural language techniques in ontology evaluation: The
OOPS! Case", 2013.
[70]
S. Mishra, and S. Jain, "Towards a semantic knowledge treasure for
military intelligence"Proceedings of the International Conference
on Emerging Technologies in Data Mining and Information
Security (IEMIS 2018), Advances in Intelligent Systems and
Computing (AISC) Springer Cham, . 2018.
[71]
S. Jain, and V. Meyer, "Evaluation and refinement of emergency situation ontology", Int. J. Inf. Educ. Technol., vol. 8, pp. 713-719, 2018.
[72]
A. Patel, and S. Jain, "A Partition based framework for large scale ontology matching", Recent Pat. on Eng., 2019.
[73]
A. Patel, and S. Jain, "Present and future of semantic web technologies:
A research statements"Int. J. Comput. Appl. Talyor and Francis, . 2019.