Mathematical Methods in Counterterrorism

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies,...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Memon, Nasrullah (Επιμελητής έκδοσης), David Farley, Jonathan (Επιμελητής έκδοσης), Hicks, David L. (Επιμελητής έκδοσης), Rosenorn, Torben (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Vienna : Springer Vienna, 2009.
Έκδοση:1.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05134nam a22005895i 4500
001 978-3-211-09442-6
003 DE-He213
005 20151125161226.0
007 cr nn 008mamaa
008 100301s2009 au | s |||| 0|eng d
020 |a 9783211094426  |9 978-3-211-09442-6 
024 7 |a 10.1007/978-3-211-09442-6  |2 doi 
040 |d GrThAP 
050 4 |a QA276-280 
072 7 |a UYAM  |2 bicssc 
072 7 |a UFM  |2 bicssc 
072 7 |a COM077000  |2 bisacsh 
082 0 4 |a 005.55  |2 23 
245 1 0 |a Mathematical Methods in Counterterrorism  |h [electronic resource] /  |c edited by Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn. 
250 |a 1. 
264 1 |a Vienna :  |b Springer Vienna,  |c 2009. 
300 |a XIII, 389 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Network Analysis -- Modeling Criminal Activity in Urban Landscapes -- Extracting Knowledge from Graph Data in Adversarial Settings -- Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes -- Combining Qualitative and Quantitative Temporal Reasoning for Criminal Forensics -- Two Theoretical Research Questions Concerning the Structure of the Perfect Terrorist Cell -- Forecasting -- Understanding Terrorist Organizations with a Dynamic Model -- Inference Approaches to Constructing Covert Social Network Topologies -- A Mathematical Analysis of Short-term Responses to Threats of Terrorism -- Network Detection Theory -- Communication/Interpretation -- Security of Underground Resistance Movements -- Intelligence Constraints on Terrorist Network Plots -- On Heterogeneous Covert Networks -- Two Models for Semi-Supervised Terrorist Group Detection -- Behavior -- CAPE: Automatically Predicting Changes in Group Behavior -- Interrogation Methods and Terror Networks -- Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing -- Simulating Terrorist Cells: Experiments and Mathematical Theory -- Game Theory -- A Brinkmanship Game Theory Model of Terrorism -- Strategic Analysis of Terrorism -- Underfunding in Terrorist Organizations -- History of the Conference on Mathematical Methods in Counterterrorism -- Personal Reflections on Beauty and Terror. 
520 |a Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern – sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive “weapon”, just as quiet – mathematics – can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere. 
650 0 |a Computer science. 
650 0 |a Political science. 
650 0 |a Mathematical statistics. 
650 0 |a Computer science  |x Mathematics. 
650 0 |a Algebra. 
650 0 |a Ordered algebraic structures. 
650 0 |a Criminology. 
650 1 4 |a Computer Science. 
650 2 4 |a Probability and Statistics in Computer Science. 
650 2 4 |a Political Science. 
650 2 4 |a Criminology & Criminal Justice. 
650 2 4 |a Math Applications in Computer Science. 
650 2 4 |a Order, Lattices, Ordered Algebraic Structures. 
650 2 4 |a Symbolic and Algebraic Manipulation. 
700 1 |a Memon, Nasrullah.  |e editor. 
700 1 |a David Farley, Jonathan.  |e editor. 
700 1 |a Hicks, David L.  |e editor. 
700 1 |a Rosenorn, Torben.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783211094419 
856 4 0 |u http://dx.doi.org/10.1007/978-3-211-09442-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)