Terrorism Informatics Knowledge Management and Data Mining for Homeland Security /
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide var...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2008.
|
Edición: | 1st ed. 2008. |
Colección: | Integrated Series in Information Systems,
18 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Methodological Issues in Terrorism Research
- Domain Mapping of Contemporary Terrorism Research
- Research on Terrorism
- Who Are the Key Figures in 'Terrorism Studies'?
- Interviewing Terrorists
- Resolving a Terrorist Insurgency by Addressing Its Root Causes
- A Quantitative Analysis of 'Root Causes of Conflict'
- Countering Terrorism with Knowledge
- Toward a Target-specific Method of Threat Assessment
- Identifying and Exploiting Group Learning Patterns for Counterterrorism
- Homeland Insecurity
- Terrorism Informatics to Support Prevention, Detection, and Response
- Case Study of Jihad on the Web
- Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System
- Content Analysis of Jihadi Extremist Groups' Videos
- Analysis of Affect Intensities in Extremist Group Forums
- Document Selection for Extracting Entity and Relationship Instances of Terrorist Events
- Data Distortion Methods and Metrics in a Terrorist Analysis System
- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)
- Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons
- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
- Individual and Collective Analysis of Anomalies in Message Traffic
- Addressing Insider Threat through Cost-Sensitive Document Classification
- Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs
- Automatic Extraction of Deceptive Behavioral Cues from Video
- Situational Awareness Technologies for Disaster Response.