Buch, Englisch, Band 18, 558 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 902 g
Knowledge Management and Data Mining for Homeland Security
Buch, Englisch, Band 18, 558 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 902 g
Reihe: Integrated Series in Information Systems
ISBN: 978-1-4899-9814-9
Verlag: Springer US
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and they involve the collection of a mass of information from multiple sources and in numerous languages.
TERRORISM INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: in terrorism research; to support terrorism prevention, detection, and response; and .
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Sozialwissenschaften Politikwissenschaft Politische Gewalt Terrorismus, Religiöser Fundamentalismus
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Mining
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Sozialwissenschaften Politikwissenschaft Militärwesen Nationale und Internationale Sicherheits- und Verteidigungspolitik
Weitere Infos & Material
Methodological Issues in Terrorism Research.- Domain Mapping of Contemporary Terrorism Research.- Research on Terrorism.- Who Are the Key Figures in ‘Terrorism Studies’?.- Interviewing Terrorists.- Resolving a Terrorist Insurgency by Addressing Its Root Causes.- A Quantitative Analysis of ‘Root Causes of Conflict’.- Countering Terrorism with Knowledge.- Toward a Target-specific Method of Threat Assessment.- Identifying and Exploiting Group Learning Patterns for Counterterrorism.- Homeland Insecurity.- Terrorism Informatics to Support Prevention, Detection, and Response.- Case Study of Jihad on the Web.- Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System.- Content Analysis of Jihadi Extremist Groups' Videos.- Analysis of Affect Intensities in Extremist Group Forums.- Document Selection for Extracting Entity and Relationship Instances of Terrorist Events.- Data Distortion Methods and Metrics in a Terrorist Analysis System.- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).- Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons.- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.- Individual and Collective Analysis of Anomalies in Message Traffic.- Addressing Insider Threat through Cost-Sensitive Document Classification.- Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs.- Automatic Extraction of Deceptive Behavioral Cues from Video.- Situational Awareness Technologies for Disaster Response.