Subrahmanian, V.S.

Handbook of Computational Approaches to Counterterrorism

Subrahmanian, V.S. - Handbook of Computational Approaches to Counterterrorism, ebook


Ebook, PDF with Adobe DRM
ISBN: 9781461453116
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. The Global Terrorism Database, 1970–2010
Gary LaFree, Laura Dugan

2. Automated Coding of Political Event Data
Philip A. Schrodt, David Brackle

3. Automatic Extraction of Events from Open Source Text for Predictive Forecasting
Elizabeth Boschee, Premkumar Natarajan, Ralph Weischedel

4. Automated Coding of Decision Support Variables
Massimiliano Albanese, Marat Fayzullin, Jana Shakarian, V. S. Subrahmanian

5. Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst
Aaron Mannes

6. SOMA: Stochastic Opponent Modeling Agents for Forecasting Violent Behavior
Amy Sliva, Gerardo Simari, Vanina Martinez, V. S. Subrahmanian

7. Data-based Computational Approaches to Forecasting Political Violence
Philip A. Schrodt, James Yonamine, Benjamin E. Bagozzi

8. Using Hidden Markov Models to Predict Terror Before it Hits (Again)
Vladimir B. Petroff, Joe H. Bond, Doug H. Bond, Doug H. Bond

9. Forecasting Group-Level Actions Using Similarity Measures
Gerardo I. Simari, Damon Earp, Maria Vanina Martinez, Amy Sliva, V. S. Subrahmanian

10. Forecasting the Use of Violence by Ethno–Political Organizations: Middle Eastern Minorities and the Choice of Violence
Kihoon Choi, Victor Asal, Jonathan Wilkenfeld, Krishna R. Pattipati

11. Forecasting Changes in Terror Group Behavior
Maria Vanina Martinez, Amy Sliva, Gerardo I. Simari, V. S. Subrahmanian

12. Using Temporal Probabilistic Rules to Learn Group Behavior
John P. Dickerson, Gerardo I. Simari, V. S. Subrahmanian

13. Leaderless Covert Networks: A Quantitative Approach
Bart Husslage, Roy Lindelauf, Herbert Hamers

14. Link Prediction in Highly Fractional Data Sets
Michael Fire, Rami Puzis, Yuval Elovici

15. Data Analysis Based Construction and Evolution of Terrorist and Criminal Networks
Khaled Dawoud, Tamer N. Jarada, Wadhah Almansoori, Alan Chen, Shang Gao, Reda Alhajj, Jon Rokne

16. CrimeFighter Investigator: Criminal Network Sense-Making
Rasmus Rosenqvist Petersen, Uffe Kock Wiil

17. The NOEM: A Tool for Understanding/ Exploring the Complexities of Today’s Operational Environment
John J. Salerno, Jason E. Smith, Warren M. Geiler, Patrick K. McCabe, Aleksey V. Panasyuk, Walter D. Bennette, Adam Kwiat

18. A Multi-Method Approach for Near Real Time Conflict and Crisis Early Warning
Sean P. O’Brien

19. A Realistic Framework for Counter-terrorism in Multimedia
Durat-ul-Ain Mirza, Nasrullah Memon

20. PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response
Eric Shieh, Bo An, Rong Yang, Milind Tambe, Craig Baldwin, Joseph DiRenzo, Ben Maule, Garrett Meyer, Kathryn Moretti

21. Government Actions in Terror Environments (GATE): A Methodology that Reveals how Governments Behave toward Terrorists and their Constituencies
Laura Dugan, Erica Chenoweth

22. A CAST Case-Study: Assessing Risk in the Niger Delta
Nate Haken, Patricia Taft, Raphaël Jaeger

23. Policy Analytics Generation Using Action Probabilistic Logic Programs
Gerardo I. Simari, John P. Dickerson, Amy Sliva, V. S. Subrahmanian

24. The Application of Search Games to Counter Terrorism Studies
Robbert Fokkink, Roy Lindelauf

25. Temporal and Spatial Analyses for Large-Scale Cyber Attacks
Haitao Du, Shanchieh Jay Yang

Keywords: Computer Science, Artificial Intelligence (incl. Robotics), Probability and Statistics in Computer Science, Data Mining and Knowledge Discovery, Criminology & Criminal Justice, Computer Appl. in Social and Behavioral Sciences

Publication year
Page amount
17 pages
Information Technology, Telecommunications

Similar titles