Mathematical Methods for Destabilizing Terrorist Activities -

Mathematical Methods for Destabilizing Terrorist Activities

Methods and Practical Algorithms for Analysis and Visualization

Nasrullah Memon, Uffe Wiil (Herausgeber)

Buch | Hardcover
300 Seiten
2014 | 2014. Auflage
Springer Wien (Verlag)
978-3-211-99440-5 (ISBN)
85,55 inkl. MwSt
  • Titel wird leider nicht erscheinen
  • Artikel merken
This work shows how mathematics and computer science can be utilized to counteract terrorism. It features theories and methodologies to analyze terrorist networks and provides mathematical methods and practical algorithms for destabilizing adversaries.

This work represents the latest in mathematical and computational techniques to assist in combating terrorist cells. Achieved by quantifying threats and the effectiveness of counterterrorism operations and strategies, contributors share theories and methodologies to generate and analyze terrorist networks and provide mathematical methods and practical algorithms for destabilizing adversaries. New developments include: A new centrality-like measure to screen networks for potential actors of interest; Detection of topological characteristics of these networks to understand structure; Measures based on efficiency of networks to identify key players; Theories to detect command structures of networks by detecting hidden hierarchies; A knowledge base of the terrorist attacks in / planned in the past, by spidering data. Results of command structure via new algorithms with SNA literature (N-Clique, K-Core, etc.) are compared. The best techniques are combined to assist intelligence agencies / law enforcement.

Table of Contents.- Part 1: Understanding Terrorism,Terrorist and Terrorist Organization.- Chapter 1: Terrorism and Terrorists.- Chapter 2: Terrorist Organizations and groups.- Chapter 3: How it all begun.- Chapter 4: Investigative Data Mining.- Chapter 5: Terrorist Network Analysis.- Chapter 6: Visualizing Networks.- Chapter 7: Cohesion analysis and detecting critical regions.- Chapter 8: Extending Social Network Analysis.- Chapter 9: Detecting Hidden Hierarchy.- Chapter 10: Investigative Data Mining Tool Kit (iMiner).- Chapter 11: Practical Data Sets.

Verlagsort Vienna
Sprache englisch
Einbandart gebunden
Themenwelt Mathematik / Informatik Informatik
Mathematik / Informatik Mathematik Wahrscheinlichkeit / Kombinatorik
Wirtschaft Volkswirtschaftslehre Ökonometrie
Schlagworte Algorithmen • algorithms • Clique • Homeland Security • K-Core • K-Plex • Mathematical Methods • N-Clique • Practical methods • Sicherheit (polit./militär.) • SNA • Terrorismus • Terrorist cells • Terrorist destabilization
ISBN-10 3-211-99440-8 / 3211994408
ISBN-13 978-3-211-99440-5 / 9783211994405
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich

von Jim Sizemore; John Paul Mueller

Buch | Softcover (2024)
Wiley-VCH (Verlag)
28,00
Erfolg und Spaß im Horrorfach nichttechnischer Studiengänge

von Markus Oestreich; Oliver Romberg

Buch | Softcover (2023)
Springer Spektrum (Verlag)
39,99