E-Book, Englisch, Band 18, 558 Seiten, eBook
Chen / Reid / Sinai Terrorism Informatics
1. Auflage 2008
ISBN: 978-0-387-71613-8
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Knowledge Management and Data Mining for Homeland Security
E-Book, Englisch, Band 18, 558 Seiten, eBook
Reihe: Integrated Series in Information Systems
ISBN: 978-0-387-71613-8
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Methodological Issues in Terrorism Research.- Domain Mapping of Contemporary Terrorism Research.- Research on Terrorism.- Who Are the Key Figures in ‘Terrorism Studies’?.- Interviewing Terrorists.- Resolving a Terrorist Insurgency by Addressing Its Root Causes.- A Quantitative Analysis of ‘Root Causes of Conflict’.- Countering Terrorism with Knowledge.- Toward a Target-specific Method of Threat Assessment.- Identifying and Exploiting Group Learning Patterns for Counterterrorism.- Homeland Insecurity.- Terrorism Informatics to Support Prevention, Detection, and Response.- Case Study of Jihad on the Web.- Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System.- Content Analysis of Jihadi Extremist Groups' Videos.- Analysis of Affect Intensities in Extremist Group Forums.- Document Selection for Extracting Entity and Relationship Instances of Terrorist Events.- Data Distortion Methods and Metrics in a Terrorist Analysis System.- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).- Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons.- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.- Individual and Collective Analysis of Anomalies in Message Traffic.- Addressing Insider Threat through Cost-Sensitive Document Classification.- Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs.- Automatic Extraction of Deceptive Behavioral Cues from Video.- Situational Awareness Technologies for Disaster Response.