Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Erscheinungszeitraum
Person/Organisation
Fachgebiete(RVK)
Zugriff
  • 1
    Buch
    Buch
    Wien [u.a.] : Springer
    UID:
    gbv_666037191
    Umfang: XVIII, 458 S. , Ill., graph. Darst., Kt
    ISBN: 3709103878 , 9783709103876
    Serie: Lecture notes in social networks 2
    Inhalt: "Presents state-of-the-art research and practice in intelligence work. Describes novel tools and techniques for counterterrorism and open source intelligence. Provides perspectives on the future uses of open source intelligence. Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities." --Publisher's website
    Anmerkung: Counterterrorism and open source intelligence models, tools, techniques, and case studies , Counterterrorism and open source intelligence models, tools, techniques, and case studies , Targeting by transnational terrorist groups , A framework for analyst focus from computed significance , Interdiction of plots with multiple operatives , Understanding terrorists network topologies and their resilience against disruption , Co-offending network mining , Religion-based geospatial abduction with counter-IED applications , Finding hidden links in terrorist networks by checking indirect links of different sub-networks , The use of open source intelligence in the construction of covert social networks , A novel method to analyze the importance of links in terrorist networks , A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks , Counterterrorism mining for individuals semantically-similar to watchlist members , Detection of illegitimate emails using boosting algorithm , Cluster based text classification model , Effectiveness of social networks for studying biological agents and identifying cancer biomarkers , From terrorism informatics to dark web research , Investigating terrorist attacks using CDR data : a case study , Multilingual real-time event extraction for border security intelligence gathering , Mining the web to monitor the political consensus , Exploring the evolution of terrorist networks , The ultimate hack : re-inventing intelligence to re-engineer earth , Targeting by transnational terrorist groups , A framework for analyst focus from computed significance , Interdiction of plots with multiple operatives , Understanding terrorists network topologies and their resilience against disruption , Co-offending network mining , Religion-based geospatial abduction with counter-IED applications , Finding hidden links in terrorist networks by checking indirect links of different sub-networks , The use of open source intelligence in the construction of covert social networks , A novel method to analyze the importance of links in terrorist networks , A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks , Counterterrorism mining for individuals semantically-similar to watchlist members , Detection of illegitimate emails using boosting algorithm , Cluster based text classification model , Effectiveness of social networks for studying biological agents and identifying cancer biomarkers , From terrorism informatics to dark web research , Investigating terrorist attacks using CDR data : a case study , Multilingual real-time event extraction for border security intelligence gathering , Mining the web to monitor the political consensus , Exploring the evolution of terrorist networks , The ultimate hack : re-inventing intelligence to re-engineer earth
    Weitere Ausg.: ISBN 9783709103883
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Wiil, Uffe Kock Counterterrorism and Open Source Intelligence Vienna : Springer-Verlag/Wien, 2011 ISBN 9783709103883
    Sprache: Englisch
    Fachgebiete: Informatik , Politologie , Rechtswissenschaft
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Terrorismus ; Bekämpfung ; Massenmedien ; Geheimdienst ; Analyse
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Wien [u.a.] : Springer
    UID:
    b3kat_BV039151737
    Umfang: XVIII, 458 S. , Ill., graph. Darst.
    ISBN: 9783709103876 , 9783709103883
    Serie: Lecture notes in social networks 2
    Anmerkung: Lizenzpflichtig
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Datensicherung
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 3700103875?
Meinten Sie 3701103887?
Meinten Sie 3703103868?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz