Terrorism Informatics Knowledge Management and Data Mining for Homeland Security /

Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide var...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chen, Hsinchun (Επιμελητής έκδοσης), Reid, Edna (Επιμελητής έκδοσης), Sinai, Joshua (Επιμελητής έκδοσης), Silke, Andrew (Επιμελητής έκδοσης), Ganor, Boaz (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2008.
Σειρά:Integrated Series In Information Systems, 18
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Methodological Issues in Terrorism Research
  • Domain Mapping of Contemporary Terrorism Research
  • Research on Terrorism
  • Who Are the Key Figures in ‘Terrorism Studies’?
  • Interviewing Terrorists
  • Resolving a Terrorist Insurgency by Addressing Its Root Causes
  • A Quantitative Analysis of ‘Root Causes of Conflict’
  • Countering Terrorism with Knowledge
  • Toward a Target-specific Method of Threat Assessment
  • Identifying and Exploiting Group Learning Patterns for Counterterrorism
  • Homeland Insecurity
  • Terrorism Informatics to Support Prevention, Detection, and Response
  • Case Study of Jihad on the Web
  • Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System
  • Content Analysis of Jihadi Extremist Groups' Videos
  • Analysis of Affect Intensities in Extremist Group Forums
  • Document Selection for Extracting Entity and Relationship Instances of Terrorist Events
  • Data Distortion Methods and Metrics in a Terrorist Analysis System
  • Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)
  • Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons
  • Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
  • Individual and Collective Analysis of Anomalies in Message Traffic
  • Addressing Insider Threat through Cost-Sensitive Document Classification
  • Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs
  • Automatic Extraction of Deceptive Behavioral Cues from Video
  • Situational Awareness Technologies for Disaster Response.