Mathematical Methods in Counterterrorism / edited by Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn.
Tipo de material:
- texto
- computadora
- recurso en línea
- 9783211094426
- QA276-280
Springer eBooks
Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge -- Network Analysis -- Modeling Criminal Activity in Urban Landscapes -- Extracting Knowledge from Graph Data in Adversarial Settings -- Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes -- Combining Qualitative and Quantitative Temporal Reasoning for Criminal Forensics -- Two Theoretical Research Questions Concerning the Structure of the Perfect Terrorist Cell -- Forecasting -- Understanding Terrorist Organizations with a Dynamic Model -- Inference Approaches to Constructing Covert Social Network Topologies -- A Mathematical Analysis of Short-term Responses to Threats of Terrorism -- Network Detection Theory -- Communication/Interpretation -- Security of Underground Resistance Movements -- Intelligence Constraints on Terrorist Network Plots -- On Heterogeneous Covert Networks -- Two Models for Semi-Supervised Terrorist Group Detection -- Behavior -- CAPE: Automatically Predicting Changes in Group Behavior -- Interrogation Methods and Terror Networks -- Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing -- Simulating Terrorist Cells: Experiments and Mathematical Theory -- Game Theory -- A Brinkmanship Game Theory Model of Terrorism -- Strategic Analysis of Terrorism -- Underfunding in Terrorist Organizations -- History of the Conference on Mathematical Methods in Counterterrorism -- Personal Reflections on Beauty and Terror.
The present work presents the most current research from mathematicians and computer scientists from around the world to develop strategies for counterterrorism and homeland security to the broader public. New mathematical and computational technique concepts are applied to counterterrorism and computer security problems. Topics covered include strategies for disrupting terrorist cells, border penetration and security, terrorist cell formation and growth, data analysis of terrorist activity, terrorism deterrence strategies, information security, emergency response and planning. Since 2001, tremendous amounts of information have been gathered regarding terrorist cells and individuals potentially planning future attacks. This book addresses this need to develop new countermeasures. Interested readers include researchers, policy makers, politicians, and the members of intelligence and law enforcement agencies.
Para consulta fuera de la UANL se requiere clave de acceso remoto.