Indian Mujahideen Computational Analysis and Public Policy /

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy ỚSThis book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies.℗ It would be very useful for international security anal...

Full description

Bibliographic Details
Main Authors: Subrahmanian, V.S. (Author), Mannes, Aaron. (Author), Roul, Animesh. (Author), Raghavan, R.K. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2013.
Series:Terrorism, Security, and Computation,
Subjects:
Online Access:View fulltext via EzAccess
LEADER 04082nam a22005535i 4500
001 24059
003 DE-He213
005 20151204163743.0
007 cr nn 008mamaa
008 131108s2013 gw | s |||| 0|eng d
020 # # |a 9783319028187  |9 978-3-319-02818-7 
024 7 # |a 10.1007/978-3-319-02818-7  |2 doi 
050 # 4 |a QA76.9.D343 
072 # 7 |a UNF  |2 bicssc 
072 # 7 |a UYQE  |2 bicssc 
072 # 7 |a COM021030  |2 bisacsh 
082 0 4 |a 006.312  |2 23 
100 1 # |a Subrahmanian, V.S.  |e author. 
245 1 0 |a Indian Mujahideen  |b Computational Analysis and Public Policy /  |c by V.S. Subrahmanian, Aaron Mannes, Animesh Roul, R.K. Raghavan.  |h [electronic resource] : 
264 # 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2013. 
300 # # |a XVIII, 173 p. 22 illus.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
490 1 # |a Terrorism, Security, and Computation,  |x 2197-8778 
505 0 # |a Introduction -- Indian Mujahideen (IM) -- Temporal Probabilistic Behavior Rules -- Targeting Public Sites -- Bombings -- Simultaneous and Timed Attacks -- Total Deaths in IM Attacks -- Computing Policy Options -- Suggested Counter-Terrorism Policies -- Building a National Counter-Terrorism Center -- Appendix A: Data Methodology -- Appendix B: List of All Terrorist Attacks Carried out by IM -- Appendix C: Temporal Probabilistic Rules Presented in This Book -- Appendix D: Instances of Improved Diplomatic Relations between India and Pakistan -- Appendix E: Instances of Indian Mujahideen Conferences -- Appendix F: Indian Mujahideen Claims of Responsibility for Attacks -- Appendix G: Instances of Indian Mujahideen Communications about its Terror Campaign. 
520 # # |a Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy ỚSThis book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies.℗ It would be very useful for international security analysts and policymakers.Ớ<U+00fd> Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) ỚSAn important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward.Ớ<U+00fd> Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). ỚSAn objective and clinical account of the origins, aims, extra-territorial links and modus-operandi,℗ of a growingly dangerous terrorist organization that challenges ℗ the federal, democratic, secular and pluralistic ethos of IndiaỚ"s polity. ℗ The authors have meticulously researched and analysed the multi-faceted challenges that the ỚSIndian MujahideenỚ<U+00fd> poses and realistically dwelt on the ways in which these challenges could be faced and overcome.Ớ<U+00fd> G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). Foreword by the Hon. Louis J. Freeh. 
650 # 0 |a Computer science. 
650 # 0 |a Political science. 
650 # 0 |a Data mining. 
650 # 0 |a Public international law. 
650 # 0 |a Criminology. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Mining and Knowledge Discovery. 
650 2 4 |a Political Science. 
650 2 4 |a Criminology & Criminal Justice. 
650 2 4 |a Public International Law. 
700 1 # |a Mannes, Aaron.  |e author. 
700 1 # |a Roul, Animesh.  |e author. 
700 1 # |a Raghavan, R.K.  |e author. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319028170 
830 # 0 |a Terrorism, Security, and Computation,  |x 2197-8778 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-319-02818-7  |z View fulltext via EzAccess 
912 # # |a ZDB-2-SCS 
950 # # |a Computer Science (Springer-11645)