Computational Methods for Counterterrorism

Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governmen...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Argamon, Shlomo (Επιμελητής έκδοσης), Howard, Newton (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • I Information Access
  • On Searching in the #x201C;Real World#x201D;
  • Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields
  • What Makes a Good Summary?
  • A Prototype Search Toolkit
  • II Text Analysis
  • Unapparent Information Revelation: Text Mining for Counterterrorism
  • Identification of Information
  • Rich Language Analysis for Counterterrorism
  • III Graphical Models
  • Dicliques: Finding Needles in Haystacks
  • Information Superiority via Formal Concept Analysis
  • Reflexive Analysis of Groups
  • Evaluating Self-Reflexion Analysis Using Repertory Grids
  • IV Conflict Analysis
  • Anticipating Terrorist Safe Havens from Instability Induced Conflict
  • Applied Counterfactual Reasoning
  • Adversarial Planning in Networks
  • Gaming and Simulating Ethno-Political Conflicts.