Wiil, Uffe Kock
Counterterrorism and Open Source Intelligence
1. Counterterrorism and Open Source Intelligence: Models, Tools, Techniques, and Case Studies
Uffe Kock Wiil
2. Targeting by Transnational Terrorist Groups
Alexander Gutfraind
3. A Framework for Analyst Focus from Computed Significance
David Skillicorn, M. A. J. Bourassa
4. Interdiction of Plots with Multiple Operatives
Gordon Woo
5. Understanding Terrorist Network Topologies and Their Resilience Against Disruption
Roy Lindelauf, Peter Borm, Herbert Hamers
6. Co-offending Network Mining
Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, Mohammad A. Tayebi
7. Region-Based Geospatial Abduction with Counter-IED Applications
Paulo Shakarian, V. S. Subrahmanian
8. Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks
Alan Chen, Shang Gao, Panagiotis Karampelas, Reda Alhajj, Jon Rokne
9. The Use of Open Source Intelligence in the Construction of Covert Social Networks
Christopher J. Rhodes
10. A Novel Method to Analyze the Importance of Links in Terrorist Networks
Uffe Kock Wiil, Jolanta Gniadek, Nasrullah Memon
11. A Global Measure for Estimating the Degree of Organization and Effectiveness of Individual Actors with Application to Terrorist Networks
Sara Aghakhani, Khaled Dawoud, Reda Alhajj, Jon Rokne
12. Counterterrorism Mining for Individuals Semantically-Similar to Watchlist Members
James A. Danowski
13. Detection of Illegitimate Emails Using Boosting Algorithm
Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil
14. Cluster Based Text Classification Model
Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil
15. Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer Biomarkers
Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon Rokne, Douglas Demetrick, Mick Ridley, Reda Alhajj
16. From Terrorism Informatics to Dark Web Research
Hsinchun Chen
17. Investigating Terrorist Attacks Using CDR Data: A Case Study
Fatih Ozgul, Ahmet Celik, Claus Atzenbeck, Nadir Gergin
18. Multilingual Real-time Event Extraction for Border Security Intelligence Gathering
Martin Atkinson, Jakub Piskorski, Erik Goot, Roman Yangarber
19. Mining the Web to Monitor the Political Consensus
Federico Neri, Carlo Aliprandi, Furio Camillo
20. Exploring the Evolution of Terrorist Networks
Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, Panagiotis Karampelas
21. The Ultimate Hack: Re-inventing Intelligence to Re-engineer Earth
Robert David Steele
Keywords: Computer Science, Systems and Data Security, Statistical Physics, Dynamical Systems and Complexity
- Author(s)
- Wiil, Uffe Kock
- Publisher
- Springer
- Publication year
- 2011
- Language
- en
- Edition
- 1
- Series
- Lecture Notes in Social Networks
- Page amount
- 18 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783709103883