Computational Methods for Counterterrorism
Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governmen...
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2009.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- I Information Access
- On Searching in the #x201C;Real World#x201D;
- Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields
- What Makes a Good Summary?
- A Prototype Search Toolkit
- II Text Analysis
- Unapparent Information Revelation: Text Mining for Counterterrorism
- Identification of Information
- Rich Language Analysis for Counterterrorism
- III Graphical Models
- Dicliques: Finding Needles in Haystacks
- Information Superiority via Formal Concept Analysis
- Reflexive Analysis of Groups
- Evaluating Self-Reflexion Analysis Using Repertory Grids
- IV Conflict Analysis
- Anticipating Terrorist Safe Havens from Instability Induced Conflict
- Applied Counterfactual Reasoning
- Adversarial Planning in Networks
- Gaming and Simulating Ethno-Political Conflicts.