Mathematical Methods for Destabilizing Terrorist Activities
Methods and Practical Algorithms for Analysis and Visualization
Seiten
2014
|
2014. Auflage
Springer Wien (Verlag)
978-3-211-99440-5 (ISBN)
Springer Wien (Verlag)
978-3-211-99440-5 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
This work shows how mathematics and computer science can be utilized to counteract terrorism. It features theories and methodologies to analyze terrorist networks and provides mathematical methods and practical algorithms for destabilizing adversaries.
This work represents the latest in mathematical and computational techniques to assist in combating terrorist cells. Achieved by quantifying threats and the effectiveness of counterterrorism operations and strategies, contributors share theories and methodologies to generate and analyze terrorist networks and provide mathematical methods and practical algorithms for destabilizing adversaries. New developments include: A new centrality-like measure to screen networks for potential actors of interest; Detection of topological characteristics of these networks to understand structure; Measures based on efficiency of networks to identify key players; Theories to detect command structures of networks by detecting hidden hierarchies; A knowledge base of the terrorist attacks in / planned in the past, by spidering data. Results of command structure via new algorithms with SNA literature (N-Clique, K-Core, etc.) are compared. The best techniques are combined to assist intelligence agencies / law enforcement.
This work represents the latest in mathematical and computational techniques to assist in combating terrorist cells. Achieved by quantifying threats and the effectiveness of counterterrorism operations and strategies, contributors share theories and methodologies to generate and analyze terrorist networks and provide mathematical methods and practical algorithms for destabilizing adversaries. New developments include: A new centrality-like measure to screen networks for potential actors of interest; Detection of topological characteristics of these networks to understand structure; Measures based on efficiency of networks to identify key players; Theories to detect command structures of networks by detecting hidden hierarchies; A knowledge base of the terrorist attacks in / planned in the past, by spidering data. Results of command structure via new algorithms with SNA literature (N-Clique, K-Core, etc.) are compared. The best techniques are combined to assist intelligence agencies / law enforcement.
Table of Contents.- Part 1: Understanding Terrorism,Terrorist and Terrorist Organization.- Chapter 1: Terrorism and Terrorists.- Chapter 2: Terrorist Organizations and groups.- Chapter 3: How it all begun.- Chapter 4: Investigative Data Mining.- Chapter 5: Terrorist Network Analysis.- Chapter 6: Visualizing Networks.- Chapter 7: Cohesion analysis and detecting critical regions.- Chapter 8: Extending Social Network Analysis.- Chapter 9: Detecting Hidden Hierarchy.- Chapter 10: Investigative Data Mining Tool Kit (iMiner).- Chapter 11: Practical Data Sets.
Verlagsort | Vienna |
---|---|
Sprache | englisch |
Einbandart | gebunden |
Themenwelt | Mathematik / Informatik ► Informatik |
Mathematik / Informatik ► Mathematik ► Wahrscheinlichkeit / Kombinatorik | |
Wirtschaft ► Volkswirtschaftslehre ► Ökonometrie | |
Schlagworte | Algorithmen • algorithms • Clique • Homeland Security • K-Core • K-Plex • Mathematical Methods • N-Clique • Practical methods • Sicherheit (polit./militär.) • SNA • Terrorismus • Terrorist cells • Terrorist destabilization |
ISBN-10 | 3-211-99440-8 / 3211994408 |
ISBN-13 | 978-3-211-99440-5 / 9783211994405 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Buch | Hardcover (2023)
Wiley-VCH (Verlag)
99,00 €
Erfolg und Spaß im Horrorfach nichttechnischer Studiengänge
Buch | Softcover (2023)
Springer Spektrum (Verlag)
39,99 €