Terrorism Informatics Knowledge Management and Data Mining for Homeland Security /
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide var...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US,
2008.
|
Σειρά: | Integrated Series In Information Systems,
18 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Methodological Issues in Terrorism Research
- Domain Mapping of Contemporary Terrorism Research
- Research on Terrorism
- Who Are the Key Figures in ‘Terrorism Studies’?
- Interviewing Terrorists
- Resolving a Terrorist Insurgency by Addressing Its Root Causes
- A Quantitative Analysis of ‘Root Causes of Conflict’
- Countering Terrorism with Knowledge
- Toward a Target-specific Method of Threat Assessment
- Identifying and Exploiting Group Learning Patterns for Counterterrorism
- Homeland Insecurity
- Terrorism Informatics to Support Prevention, Detection, and Response
- Case Study of Jihad on the Web
- Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System
- Content Analysis of Jihadi Extremist Groups' Videos
- Analysis of Affect Intensities in Extremist Group Forums
- Document Selection for Extracting Entity and Relationship Instances of Terrorist Events
- Data Distortion Methods and Metrics in a Terrorist Analysis System
- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)
- Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons
- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
- Individual and Collective Analysis of Anomalies in Message Traffic
- Addressing Insider Threat through Cost-Sensitive Document Classification
- Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs
- Automatic Extraction of Deceptive Behavioral Cues from Video
- Situational Awareness Technologies for Disaster Response.