Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Book
    Book
    Wien [u.a.] : Springer
    UID:
    gbv_666037191
    Format: XVIII, 458 S. , Ill., graph. Darst., Kt
    ISBN: 3709103878 , 9783709103876
    Series Statement: Lecture notes in social networks 2
    Content: "Presents state-of-the-art research and practice in intelligence work. Describes novel tools and techniques for counterterrorism and open source intelligence. Provides perspectives on the future uses of open source intelligence. Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities." --Publisher's website
    Note: Counterterrorism and open source intelligence models, tools, techniques, and case studies , Counterterrorism and open source intelligence models, tools, techniques, and case studies , Targeting by transnational terrorist groups , A framework for analyst focus from computed significance , Interdiction of plots with multiple operatives , Understanding terrorists network topologies and their resilience against disruption , Co-offending network mining , Religion-based geospatial abduction with counter-IED applications , Finding hidden links in terrorist networks by checking indirect links of different sub-networks , The use of open source intelligence in the construction of covert social networks , A novel method to analyze the importance of links in terrorist networks , A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks , Counterterrorism mining for individuals semantically-similar to watchlist members , Detection of illegitimate emails using boosting algorithm , Cluster based text classification model , Effectiveness of social networks for studying biological agents and identifying cancer biomarkers , From terrorism informatics to dark web research , Investigating terrorist attacks using CDR data : a case study , Multilingual real-time event extraction for border security intelligence gathering , Mining the web to monitor the political consensus , Exploring the evolution of terrorist networks , The ultimate hack : re-inventing intelligence to re-engineer earth , Targeting by transnational terrorist groups , A framework for analyst focus from computed significance , Interdiction of plots with multiple operatives , Understanding terrorists network topologies and their resilience against disruption , Co-offending network mining , Religion-based geospatial abduction with counter-IED applications , Finding hidden links in terrorist networks by checking indirect links of different sub-networks , The use of open source intelligence in the construction of covert social networks , A novel method to analyze the importance of links in terrorist networks , A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks , Counterterrorism mining for individuals semantically-similar to watchlist members , Detection of illegitimate emails using boosting algorithm , Cluster based text classification model , Effectiveness of social networks for studying biological agents and identifying cancer biomarkers , From terrorism informatics to dark web research , Investigating terrorist attacks using CDR data : a case study , Multilingual real-time event extraction for border security intelligence gathering , Mining the web to monitor the political consensus , Exploring the evolution of terrorist networks , The ultimate hack : re-inventing intelligence to re-engineer earth
    Additional Edition: ISBN 9783709103883
    Additional Edition: Erscheint auch als Online-Ausgabe Wiil, Uffe Kock Counterterrorism and Open Source Intelligence Vienna : Springer-Verlag/Wien, 2011 ISBN 9783709103883
    Language: English
    Subjects: Computer Science , Political Science , Law
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Terrorismus ; Bekämpfung ; Massenmedien ; Geheimdienst ; Analyse
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages