Computational Methods for Counterterrorism
Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governmen...
Corporate Author: | SpringerLink (Online service) |
---|---|
Other Authors: | Argamon, Shlomo (Editor), Howard, Newton (Editor) |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2009.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Similar Items
-
The People’s Web Meets NLP Collaboratively Constructed Language Resources /
Published: (2013) -
Fundamentals of Predictive Text Mining
by: Weiss, Sholom M., et al.
Published: (2015) -
Fundamentals of Predictive Text Mining
by: Weiss, Sholom M., et al.
Published: (2010) -
Text Mining Predictive Methods for Analyzing Unstructured Information /
by: Weiss, Sholom M., et al.
Published: (2005) -
Knowledge Engineering and Semantic Web 7th International Conference, KESW 2016, Prague, Czech Republic, September 21-23, 2016, Proceedings /
Published: (2016)