Muutke küpsiste eelistusi

Handbook of Computational Approaches to Counterterrorism 2013 ed. [Kõva köide]

  • Formaat: Hardback, 578 pages, kõrgus x laius: 235x155 mm, XVIII, 578 p., 1 Hardback
  • Ilmumisaeg: 11-Dec-2012
  • Kirjastus: Springer-Verlag New York Inc.
  • ISBN-10: 1461453100
  • ISBN-13: 9781461453109
Teised raamatud teemal:
  • Kõva köide
  • Hind: 95,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 111,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 578 pages, kõrgus x laius: 235x155 mm, XVIII, 578 p., 1 Hardback
  • Ilmumisaeg: 11-Dec-2012
  • Kirjastus: Springer-Verlag New York Inc.
  • ISBN-10: 1461453100
  • ISBN-13: 9781461453109
Teised raamatud teemal:

Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour.

Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book’s website.

This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.

Part I Data and Data Acquisition
The Global Terrorism Database, 1970-2010
3(20)
Gary LaFree
Laura Dugan
Automated Coding of Political Event Data
23(28)
Philip A. Schrodt
David Van Brackle
Automatic Extraction of Events from Open Source Text for Predictive Forecasting
51(18)
Elizabeth Boschee
Premkumar Natarajan
Ralph Weischedel
Automated Coding of Decision Support Variables
69(14)
Massimiliano Albanese
Marat Fayzullin
Jana Shakarian
V.S. Subrahmanian
Part II Behavioral Models and Forecasting
Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst
83(16)
Aaron Mannes
SOMA: Stochastic Opponent Modeling Agents for Forecasting Violent Behavior
99(30)
Amy Sliva
Gerardo Simari
Vanina Martinez
V.S. Subrahmanian
Data-based Computational Approaches to Forecasting Political Violence
129(34)
Philip A. Schrodt
James Yonamine
Benjamin E. Bagozzi
Using Hidden Markov Models to Predict Terror Before it Hits (Again)
163(18)
Vladimir B. Petroff
Joe H. Bond
Doug H. Bond
Forecasting Group-Level Actions Using Similarity Measures
181(20)
Gerardo I. Simari
Damon Earp
Maria Vanina Martinez
Amy Sliva
V.S. Subrahmanian
Forecasting the Use of Violence by Ethno-Political Organizations: Middle Eastern Minorities and the Choice of Violence
201(24)
Kihoon Choi
Victor Asal
Jonathan Wilkenfeld
Krishna R. Pattipati
Forecasting Changes in Terror Group Behavior
225(20)
Maria Vanina Martinez
Amy Sliva
Gerardo I. Simari
V.S. Subrahmanian
Using Temporal Probabilistic Rules to Learn Group Behavior
245(24)
John P. Dickerson
Gerardo I. Simari
V.S. Subrahmanian
Part III Terrorist Network Analysis
Leaderless Covert Networks: A Quantitative Approach
269(14)
Bart Husslage
Roy Lindelauf
Herbert Hamers
Link Prediction in Highly Fractional Data Sets
283(18)
Michael Fire
Rami Puzis
Yuval Elovici
Data Analysis Based Construction and Evolution of Terrorist and Criminal Networks
301(22)
Khaled Dawoud
Tamer N. Jarada
Wadhah Almansoori
Alan Chen
Shang Gao
Reda Alhajj
Jon Rokne
CrimeFighter Investigator: Criminal Network Sense-Making
323(40)
Rasmus Rosenqvist Petersen
Uffe Kock Wiil
Part IV Systems, Frameworks, and Case Studies
The NOEM: A Tool for Understanding/Exploring the Complexities of Today's Operational Environment
363(38)
John J. Salerno
Jason E. Smith
Warren M. Geiler
Patrick K. McCabe
Aleksey V. Panasyuk
Walter D. Bennette
Adam Kwiat
A Multi-Method Approach for Near Real Time Conflict and Crisis Early Warning
401(18)
Sean P. O'Brien
A Realistic Framework for Counter-terrorism in Multimedia
419(22)
Durat-ul-Ain Mirza
Nasrullah Memon
PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response
441(24)
Eric Shieh
Bo An
Rong Yang
Milind Tambe
Craig Baldwin
Joseph DiRenzo
Ben Maule
Garrett Meyer
Kathryn Moretti
Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies
465(24)
Laura Dugan
Erica Chenoweth
Part V New Directions
A CAST Case-Study: Assessing Risk in the Niger Delta
489(26)
Nate Haken
Patricia Taft
Raphael Jaeger
Policy Analytics Generation Using Action Probabilistic Logic Programs
515(28)
Gerardo I. Simari
John P. Dickerson
Amy Sliva
V.S. Subrahmanian
The Application of Search Games to Counter Terrorism Studies
543(16)
Robbert Fokkink
Roy Lindelauf
Temporal and Spatial Analyses for Large-Scale Cyber Attacks
559
Haitao Du
Shanchieh Jay Yang