Computational Methods for Counterterrorism
Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governmen...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- I Information Access
- On Searching in the #x201C;Real World#x201D;
- Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields
- What Makes a Good Summary?
- A Prototype Search Toolkit
- II Text Analysis
- Unapparent Information Revelation: Text Mining for Counterterrorism
- Identification of Information
- Rich Language Analysis for Counterterrorism
- III Graphical Models
- Dicliques: Finding Needles in Haystacks
- Information Superiority via Formal Concept Analysis
- Reflexive Analysis of Groups
- Evaluating Self-Reflexion Analysis Using Repertory Grids
- IV Conflict Analysis
- Anticipating Terrorist Safe Havens from Instability Induced Conflict
- Applied Counterfactual Reasoning
- Adversarial Planning in Networks
- Gaming and Simulating Ethno-Political Conflicts.