Indian Mujahideen Computational Analysis and Public Policy /
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analyst...
| Main Authors: | , , , |
|---|---|
| Corporate Author: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2013.
|
| Series: | Terrorism, Security, and Computation,
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Introduction
- Indian Mujahideen (IM)
- Temporal Probabilistic Behavior Rules
- Targeting Public Sites
- Bombings
- Simultaneous and Timed Attacks
- Total Deaths in IM Attacks
- Computing Policy Options
- Suggested Counter-Terrorism Policies
- Building a National Counter-Terrorism Center
- Appendix A: Data Methodology
- Appendix B: List of All Terrorist Attacks Carried out by IM
- Appendix C: Temporal Probabilistic Rules Presented in This Book
- Appendix D: Instances of Improved Diplomatic Relations between India and Pakistan
- Appendix E: Instances of Indian Mujahideen Conferences
- Appendix F: Indian Mujahideen Claims of Responsibility for Attacks
- Appendix G: Instances of Indian Mujahideen Communications about its Terror Campaign.