TEST - Catálogo BURRF
   

Mathematical Methods in Counterterrorism / edited by Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn.

Por: Colaborador(es): Tipo de material: TextoTextoEditor: Vienna : Springer Vienna, 2009Edición: 1Descripción: xiii, 389 páginas, 124 Figs. recurso en líneaTipo de contenido:
  • texto
Tipo de medio:
  • computadora
Tipo de portador:
  • recurso en línea
ISBN:
  • 9783211094426
Formatos físicos adicionales: Edición impresa:: Sin títuloClasificación LoC:
  • QA276-280
Recursos en línea:
Contenidos:
Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Network Analysis -- Modeling Criminal Activity in Urban Landscapes -- Extracting Knowledge from Graph Data in Adversarial Settings -- Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes -- Combining Qualitative and Quantitative Temporal Reasoning for Criminal Forensics -- Two Theoretical Research Questions Concerning the Structure of the Perfect Terrorist Cell -- Forecasting -- Understanding Terrorist Organizations with a Dynamic Model -- Inference Approaches to Constructing Covert Social Network Topologies -- A Mathematical Analysis of Short-term Responses to Threats of Terrorism -- Network Detection Theory -- Communication/Interpretation -- Security of Underground Resistance Movements -- Intelligence Constraints on Terrorist Network Plots -- On Heterogeneous Covert Networks -- Two Models for Semi-Supervised Terrorist Group Detection -- Behavior -- CAPE: Automatically Predicting Changes in Group Behavior -- Interrogation Methods and Terror Networks -- Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing -- Simulating Terrorist Cells: Experiments and Mathematical Theory -- Game Theory -- A Brinkmanship Game Theory Model of Terrorism -- Strategic Analysis of Terrorism -- Underfunding in Terrorist Organizations -- History of the Conference on Mathematical Methods in Counterterrorism -- Personal Reflections on Beauty and Terror.
Resumen: The present work presents the most current research from mathematicians and computer scientists from around the world to develop strategies for counterterrorism and homeland security to the broader public. New mathematical and computational technique concepts are applied to counterterrorism and computer security problems. Topics covered include strategies for disrupting terrorist cells, border penetration and security, terrorist cell formation and growth, data analysis of terrorist activity, terrorism deterrence strategies, information security, emergency response and planning. Since 2001, tremendous amounts of information have been gathered regarding terrorist cells and individuals potentially planning future attacks. This book addresses this need to develop new countermeasures. Interested readers include researchers, policy makers, politicians, and the members of intelligence and law enforcement agencies.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Springer eBooks

Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Network Analysis -- Modeling Criminal Activity in Urban Landscapes -- Extracting Knowledge from Graph Data in Adversarial Settings -- Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes -- Combining Qualitative and Quantitative Temporal Reasoning for Criminal Forensics -- Two Theoretical Research Questions Concerning the Structure of the Perfect Terrorist Cell -- Forecasting -- Understanding Terrorist Organizations with a Dynamic Model -- Inference Approaches to Constructing Covert Social Network Topologies -- A Mathematical Analysis of Short-term Responses to Threats of Terrorism -- Network Detection Theory -- Communication/Interpretation -- Security of Underground Resistance Movements -- Intelligence Constraints on Terrorist Network Plots -- On Heterogeneous Covert Networks -- Two Models for Semi-Supervised Terrorist Group Detection -- Behavior -- CAPE: Automatically Predicting Changes in Group Behavior -- Interrogation Methods and Terror Networks -- Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing -- Simulating Terrorist Cells: Experiments and Mathematical Theory -- Game Theory -- A Brinkmanship Game Theory Model of Terrorism -- Strategic Analysis of Terrorism -- Underfunding in Terrorist Organizations -- History of the Conference on Mathematical Methods in Counterterrorism -- Personal Reflections on Beauty and Terror.

The present work presents the most current research from mathematicians and computer scientists from around the world to develop strategies for counterterrorism and homeland security to the broader public. New mathematical and computational technique concepts are applied to counterterrorism and computer security problems. Topics covered include strategies for disrupting terrorist cells, border penetration and security, terrorist cell formation and growth, data analysis of terrorist activity, terrorism deterrence strategies, information security, emergency response and planning. Since 2001, tremendous amounts of information have been gathered regarding terrorist cells and individuals potentially planning future attacks. This book addresses this need to develop new countermeasures. Interested readers include researchers, policy makers, politicians, and the members of intelligence and law enforcement agencies.

Para consulta fuera de la UANL se requiere clave de acceso remoto.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha