Cargando…

Computational Methods for Counterterrorism

Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governmen...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Argamon, Shlomo (Editor ), Howard, Newton (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-01141-2
003 DE-He213
005 20220114170854.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642011412  |9 978-3-642-01141-2 
024 7 |a 10.1007/978-3-642-01141-2  |2 doi 
050 4 |a QA76.9.D343 
072 7 |a UNF  |2 bicssc 
072 7 |a UYQE  |2 bicssc 
072 7 |a COM021030  |2 bisacsh 
072 7 |a UNF  |2 thema 
072 7 |a UYQE  |2 thema 
082 0 4 |a 006.312  |2 23 
245 1 0 |a Computational Methods for Counterterrorism  |h [electronic resource] /  |c edited by Shlomo Argamon, Newton Howard. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XVIII, 306 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a I Information Access -- On Searching in the #x201C;Real World#x201D; -- Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields -- What Makes a Good Summary? -- A Prototype Search Toolkit -- II Text Analysis -- Unapparent Information Revelation: Text Mining for Counterterrorism -- Identification of Information -- Rich Language Analysis for Counterterrorism -- III Graphical Models -- Dicliques: Finding Needles in Haystacks -- Information Superiority via Formal Concept Analysis -- Reflexive Analysis of Groups -- Evaluating Self-Reflexion Analysis Using Repertory Grids -- IV Conflict Analysis -- Anticipating Terrorist Safe Havens from Instability Induced Conflict -- Applied Counterfactual Reasoning -- Adversarial Planning in Networks -- Gaming and Simulating Ethno-Political Conflicts. 
520 |a Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governments and militaries work to devise new policies and doctrines to combat terror, new technologies are desperately needed to make these efforts effective. This book collects a wide range of the most current computational research addressing critical issues for counterterrorism in a dynamic and complex threat environment: finding, summarizing, and evaluating relevant information from large and dynamic data stores; simulation and prediction of likely enemy actions and the effects of proposed counter-efforts; and producing actionable intelligence by finding meaningful patterns hidden in masses of noisy data items. The contributions are organized thematically into four sections. The first section concerns efforts to provide effective access to small amounts of relevant information buried in enormous amounts of diverse unstructured data. The second section discusses methods for the key problem of extracting meaningful information from digitized documents in various languages. The third section presents research on analyzing graphs and networks, offering new ways of discovering hidden structures in data and profiles of adversaries' goals and intentions. Finally, the fourth section of the book describes software systems that enable analysts to model, simulate, and predict the effects of real-world conflicts. The models and methods discussed in this book are invaluable reading for governmental decision-makers designing new policies to counter terrorist threats, for members of the military, intelligence, and law enforcement communities devising counterterrorism strategies based on new technologies, and for academic and industrial researchers devising more effective methods for knowledge discovery in complicated and diverse datasets. 
650 0 |a Data mining. 
650 0 |a Data protection. 
650 0 |a Criminology. 
650 0 |a Natural language processing (Computer science). 
650 0 |a Information storage and retrieval systems. 
650 0 |a Computers and civilization. 
650 1 4 |a Data Mining and Knowledge Discovery. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Criminology. 
650 2 4 |a Natural Language Processing (NLP). 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Computers and Society. 
700 1 |a Argamon, Shlomo.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Howard, Newton.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642011429 
776 0 8 |i Printed edition:  |z 9783642426131 
776 0 8 |i Printed edition:  |z 9783642011405 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-01141-2  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)