Coverart for item
The Resource Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor

Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor

Label
Handbook of computational approaches to counterterrorism
Title
Handbook of computational approaches to counterterrorism
Statement of responsibility
V. S. Subrahmanian, editor
Contributor
Subject
Genre
Language
eng
Summary
"The last 20 years have witnessed an unprecedented change in information and communications technologies, leading to the ability not only to disseminate information in seconds from one part of the world to another, but also the ability to organize, analyze, understand and predict phenomena on the basis of that information. This book studies how computational methods can substantially improve the collection of data about terrorist groups, the analysis of that data through the construction of behavioral models, the ability to forecast what such groups might do, and how one might respond to a group{u2019}s behavior."--Preface
Cataloging source
AU@
Dewey number
363.325/170285
Illustrations
illustrations
Index
no index present
LC call number
HV6431
LC item number
.H3644 2013
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorName
Subrahmanian, V. S
http://library.link/vocab/subjectName
  • Terrorism
  • Data mining
Label
Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor
Instantiates
Publication
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Machine generated contents note: pt. I Data and Data Acquisition -- The Global Terrorism Database, 1970-2010 / Laura Dugan -- Automated Coding of Political Event Data / David Van Brackle -- Automatic Extraction of Events from Open Source Text for Predictive Forecasting / Ralph Weischedel -- Automated Coding of Decision Support Variables / V.S. Subrahmanian -- pt. II Behavioral Models and Forecasting -- Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst / Aaron Mannes -- SOMA: Stochastic Opponent Modeling Agents for Forecasting Violent Behavior / V.S. Subrahmanian -- Data-based Computational Approaches to Forecasting Political Violence / Benjamin E. Bagozzi -- Using Hidden Markov Models to Predict Terror Before it Hits (Again) / Doug H. Bond -- Forecasting Group-Level Actions Using Similarity Measures / V.S. Subrahmanian --
  • Contents note continued: Forecasting the Use of Violence by Ethno-Political Organizations: Middle Eastern Minorities and the Choice of Violence / Krishna R. Pattipati -- Forecasting Changes in Terror Group Behavior / V.S. Subrahmanian -- Using Temporal Probabilistic Rules to Learn Group Behavior / V.S. Subrahmanian -- pt. III Terrorist Network Analysis -- Leaderless Covert Networks: A Quantitative Approach / Herbert Hamers -- Link Prediction in Highly Fractional Data Sets / Yuval Elovici -- Data Analysis Based Construction and Evolution of Terrorist and Criminal Networks / Jon Rokne -- CrimeFighter Investigator: Criminal Network Sense-Making / Uffe Kock Wiil -- pt. IV Systems, Frameworks, and Case Studies -- The NOEM: A Tool for Understanding/Exploring the Complexities of Today's Operational Environment / Adam Kwiat -- A Multi-Method Approach for Near Real Time Conflict and Crisis Early Warning / Sean P. O'Brien --
  • Contents note continued: A Realistic Framework for Counter-terrorism in Multimedia / Nasrullah Memon -- PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response / Kathryn Moretti -- Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies / Erica Chenoweth -- pt. V New Directions -- A CAST Case-Study: Assessing Risk in the Niger Delta / Raphael Jaeger -- Policy Analytics Generation Using Action Probabilistic Logic Programs / V.S. Subrahmanian -- The Application of Search Games to Counter Terrorism Studies / Roy Lindelauf
Control code
829882719
Dimensions
24 cm
Extent
xvii, 578 pages
Isbn
9781461453109
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
(OCoLC)829882719
Label
Handbook of computational approaches to counterterrorism, V. S. Subrahmanian, editor
Publication
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Machine generated contents note: pt. I Data and Data Acquisition -- The Global Terrorism Database, 1970-2010 / Laura Dugan -- Automated Coding of Political Event Data / David Van Brackle -- Automatic Extraction of Events from Open Source Text for Predictive Forecasting / Ralph Weischedel -- Automated Coding of Decision Support Variables / V.S. Subrahmanian -- pt. II Behavioral Models and Forecasting -- Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst / Aaron Mannes -- SOMA: Stochastic Opponent Modeling Agents for Forecasting Violent Behavior / V.S. Subrahmanian -- Data-based Computational Approaches to Forecasting Political Violence / Benjamin E. Bagozzi -- Using Hidden Markov Models to Predict Terror Before it Hits (Again) / Doug H. Bond -- Forecasting Group-Level Actions Using Similarity Measures / V.S. Subrahmanian --
  • Contents note continued: Forecasting the Use of Violence by Ethno-Political Organizations: Middle Eastern Minorities and the Choice of Violence / Krishna R. Pattipati -- Forecasting Changes in Terror Group Behavior / V.S. Subrahmanian -- Using Temporal Probabilistic Rules to Learn Group Behavior / V.S. Subrahmanian -- pt. III Terrorist Network Analysis -- Leaderless Covert Networks: A Quantitative Approach / Herbert Hamers -- Link Prediction in Highly Fractional Data Sets / Yuval Elovici -- Data Analysis Based Construction and Evolution of Terrorist and Criminal Networks / Jon Rokne -- CrimeFighter Investigator: Criminal Network Sense-Making / Uffe Kock Wiil -- pt. IV Systems, Frameworks, and Case Studies -- The NOEM: A Tool for Understanding/Exploring the Complexities of Today's Operational Environment / Adam Kwiat -- A Multi-Method Approach for Near Real Time Conflict and Crisis Early Warning / Sean P. O'Brien --
  • Contents note continued: A Realistic Framework for Counter-terrorism in Multimedia / Nasrullah Memon -- PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response / Kathryn Moretti -- Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies / Erica Chenoweth -- pt. V New Directions -- A CAST Case-Study: Assessing Risk in the Niger Delta / Raphael Jaeger -- Policy Analytics Generation Using Action Probabilistic Logic Programs / V.S. Subrahmanian -- The Application of Search Games to Counter Terrorism Studies / Roy Lindelauf
Control code
829882719
Dimensions
24 cm
Extent
xvii, 578 pages
Isbn
9781461453109
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
(OCoLC)829882719

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...