Computational Methods for Counterterrorism

Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governmen...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Argamon, Shlomo. (Editor), Howard, Newton. (Editor)
Format: Electronic
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-01141-2
Table of Contents:
  • Foreword, James A. Hendler. Preface
  • Part I: Information Access. 1) On Searching in the Real World . 2) Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields. 3) What Makes a Good Summary? 4) A Prototype Search Toolkit
  • Part II: Text Analysis. 5) Unapparent Information Revelation: Text Mining for Counterterrorism. 6) Identification of Sensitive Unclassified Information. 7) Rich Language Analysis for Counterterrorism
  • Part III: Graphical Models. 8) Dicliques: Finding Needles in Haysticks. 9) Information Superiority via Formal Concept Analysis. 10) Reflexive Analysis of Groups. 11) Evaluating Self-Reflexion Analysis Using Repertory Grids
  • Part IV: Conflict Analysis. 12) Anticipating Terrorist Safe Havens from Instability Induced Conflict. 13) Applied Counterfactual Reasoning. 14) Adversarial Planning in Networks. 15) Gaming and Simulating Ethno-Political Conflicts
  • Index.