The Resource Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor
Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor
Resource Information
The item Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 1 library branch.
- Summary
- "The last 20 years have witnessed an unprecedented change in information and communications technologies, leading to the ability not only to disseminate information in seconds from one part of the world to another, but also the ability to organize, analyze, understand and predict phenomena on the basis of that information. This book studies how computational methods can substantially improve the collection of data about terrorist groups, the analysis of that data through the construction of behavioral models, the ability to forecast what such groups might do, and how one might respond to a group{u2019}s behavior."--Preface
- Language
- eng
- Extent
- xvii, 578 pages
- Contents
-
- Machine generated contents note: pt. I Data and Data Acquisition -- The Global Terrorism Database, 1970-2010 / Laura Dugan -- Automated Coding of Political Event Data / David Van Brackle -- Automatic Extraction of Events from Open Source Text for Predictive Forecasting / Ralph Weischedel -- Automated Coding of Decision Support Variables / V.S. Subrahmanian -- pt. II Behavioral Models and Forecasting -- Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst / Aaron Mannes -- SOMA: Stochastic Opponent Modeling Agents for Forecasting Violent Behavior / V.S. Subrahmanian -- Data-based Computational Approaches to Forecasting Political Violence / Benjamin E. Bagozzi -- Using Hidden Markov Models to Predict Terror Before it Hits (Again) / Doug H. Bond -- Forecasting Group-Level Actions Using Similarity Measures / V.S. Subrahmanian --
- Contents note continued: Forecasting the Use of Violence by Ethno-Political Organizations: Middle Eastern Minorities and the Choice of Violence / Krishna R. Pattipati -- Forecasting Changes in Terror Group Behavior / V.S. Subrahmanian -- Using Temporal Probabilistic Rules to Learn Group Behavior / V.S. Subrahmanian -- pt. III Terrorist Network Analysis -- Leaderless Covert Networks: A Quantitative Approach / Herbert Hamers -- Link Prediction in Highly Fractional Data Sets / Yuval Elovici -- Data Analysis Based Construction and Evolution of Terrorist and Criminal Networks / Jon Rokne -- CrimeFighter Investigator: Criminal Network Sense-Making / Uffe Kock Wiil -- pt. IV Systems, Frameworks, and Case Studies -- The NOEM: A Tool for Understanding/Exploring the Complexities of Today's Operational Environment / Adam Kwiat -- A Multi-Method Approach for Near Real Time Conflict and Crisis Early Warning / Sean P. O'Brien --
- Contents note continued: A Realistic Framework for Counter-terrorism in Multimedia / Nasrullah Memon -- PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response / Kathryn Moretti -- Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies / Erica Chenoweth -- pt. V New Directions -- A CAST Case-Study: Assessing Risk in the Niger Delta / Raphael Jaeger -- Policy Analytics Generation Using Action Probabilistic Logic Programs / V.S. Subrahmanian -- The Application of Search Games to Counter Terrorism Studies / Roy Lindelauf
- Isbn
- 9781461453109
- Label
- Handbook of computational approaches to counterterrorism
- Title
- Handbook of computational approaches to counterterrorism
- Statement of responsibility
- V. S. Subrahmanian, editor
- Language
- eng
- Summary
- "The last 20 years have witnessed an unprecedented change in information and communications technologies, leading to the ability not only to disseminate information in seconds from one part of the world to another, but also the ability to organize, analyze, understand and predict phenomena on the basis of that information. This book studies how computational methods can substantially improve the collection of data about terrorist groups, the analysis of that data through the construction of behavioral models, the ability to forecast what such groups might do, and how one might respond to a group{u2019}s behavior."--Preface
- Cataloging source
- AU@
- Dewey number
- 363.325/170285
- Illustrations
- illustrations
- Index
- no index present
- LC call number
- HV6431
- LC item number
- .H3644 2013
- Literary form
- non fiction
- Nature of contents
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Subrahmanian, V. S
- http://library.link/vocab/subjectName
-
- Terrorism
- Data mining
- Label
- Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor
- Bibliography note
- Includes bibliographical references
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Machine generated contents note: pt. I Data and Data Acquisition -- The Global Terrorism Database, 1970-2010 / Laura Dugan -- Automated Coding of Political Event Data / David Van Brackle -- Automatic Extraction of Events from Open Source Text for Predictive Forecasting / Ralph Weischedel -- Automated Coding of Decision Support Variables / V.S. Subrahmanian -- pt. II Behavioral Models and Forecasting -- Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst / Aaron Mannes -- SOMA: Stochastic Opponent Modeling Agents for Forecasting Violent Behavior / V.S. Subrahmanian -- Data-based Computational Approaches to Forecasting Political Violence / Benjamin E. Bagozzi -- Using Hidden Markov Models to Predict Terror Before it Hits (Again) / Doug H. Bond -- Forecasting Group-Level Actions Using Similarity Measures / V.S. Subrahmanian --
- Contents note continued: Forecasting the Use of Violence by Ethno-Political Organizations: Middle Eastern Minorities and the Choice of Violence / Krishna R. Pattipati -- Forecasting Changes in Terror Group Behavior / V.S. Subrahmanian -- Using Temporal Probabilistic Rules to Learn Group Behavior / V.S. Subrahmanian -- pt. III Terrorist Network Analysis -- Leaderless Covert Networks: A Quantitative Approach / Herbert Hamers -- Link Prediction in Highly Fractional Data Sets / Yuval Elovici -- Data Analysis Based Construction and Evolution of Terrorist and Criminal Networks / Jon Rokne -- CrimeFighter Investigator: Criminal Network Sense-Making / Uffe Kock Wiil -- pt. IV Systems, Frameworks, and Case Studies -- The NOEM: A Tool for Understanding/Exploring the Complexities of Today's Operational Environment / Adam Kwiat -- A Multi-Method Approach for Near Real Time Conflict and Crisis Early Warning / Sean P. O'Brien --
- Contents note continued: A Realistic Framework for Counter-terrorism in Multimedia / Nasrullah Memon -- PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response / Kathryn Moretti -- Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies / Erica Chenoweth -- pt. V New Directions -- A CAST Case-Study: Assessing Risk in the Niger Delta / Raphael Jaeger -- Policy Analytics Generation Using Action Probabilistic Logic Programs / V.S. Subrahmanian -- The Application of Search Games to Counter Terrorism Studies / Roy Lindelauf
- Control code
- 829882719
- Dimensions
- 24 cm
- Extent
- xvii, 578 pages
- Isbn
- 9781461453109
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- System control number
- (OCoLC)829882719
- Label
- Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor
- Bibliography note
- Includes bibliographical references
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Machine generated contents note: pt. I Data and Data Acquisition -- The Global Terrorism Database, 1970-2010 / Laura Dugan -- Automated Coding of Political Event Data / David Van Brackle -- Automatic Extraction of Events from Open Source Text for Predictive Forecasting / Ralph Weischedel -- Automated Coding of Decision Support Variables / V.S. Subrahmanian -- pt. II Behavioral Models and Forecasting -- Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst / Aaron Mannes -- SOMA: Stochastic Opponent Modeling Agents for Forecasting Violent Behavior / V.S. Subrahmanian -- Data-based Computational Approaches to Forecasting Political Violence / Benjamin E. Bagozzi -- Using Hidden Markov Models to Predict Terror Before it Hits (Again) / Doug H. Bond -- Forecasting Group-Level Actions Using Similarity Measures / V.S. Subrahmanian --
- Contents note continued: Forecasting the Use of Violence by Ethno-Political Organizations: Middle Eastern Minorities and the Choice of Violence / Krishna R. Pattipati -- Forecasting Changes in Terror Group Behavior / V.S. Subrahmanian -- Using Temporal Probabilistic Rules to Learn Group Behavior / V.S. Subrahmanian -- pt. III Terrorist Network Analysis -- Leaderless Covert Networks: A Quantitative Approach / Herbert Hamers -- Link Prediction in Highly Fractional Data Sets / Yuval Elovici -- Data Analysis Based Construction and Evolution of Terrorist and Criminal Networks / Jon Rokne -- CrimeFighter Investigator: Criminal Network Sense-Making / Uffe Kock Wiil -- pt. IV Systems, Frameworks, and Case Studies -- The NOEM: A Tool for Understanding/Exploring the Complexities of Today's Operational Environment / Adam Kwiat -- A Multi-Method Approach for Near Real Time Conflict and Crisis Early Warning / Sean P. O'Brien --
- Contents note continued: A Realistic Framework for Counter-terrorism in Multimedia / Nasrullah Memon -- PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response / Kathryn Moretti -- Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies / Erica Chenoweth -- pt. V New Directions -- A CAST Case-Study: Assessing Risk in the Niger Delta / Raphael Jaeger -- Policy Analytics Generation Using Action Probabilistic Logic Programs / V.S. Subrahmanian -- The Application of Search Games to Counter Terrorism Studies / Roy Lindelauf
- Control code
- 829882719
- Dimensions
- 24 cm
- Extent
- xvii, 578 pages
- Isbn
- 9781461453109
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- System control number
- (OCoLC)829882719
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Handbook-of-computational-approaches-to/QBJ6S3voaUc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Handbook-of-computational-approaches-to/QBJ6S3voaUc/">Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Handbook-of-computational-approaches-to/QBJ6S3voaUc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Handbook-of-computational-approaches-to/QBJ6S3voaUc/">Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>