书目名称 | Computational Methods for Counterterrorism |
编辑 | Shlomo Argamon,Newton Howard |
视频video | |
概述 | Includes supplementary material: |
图书封面 |  |
描述 | .Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radically by their fluid, non-hierarchical structures, religious and ideological motivations, and predominantly non-territorial objectives. Governments and militaries are crafting new policies and doctrines to combat terror, but they desperately need new technologies to make these efforts effective. ..This book collects a wide range of the most current computational research that addresses critical issues for countering terrorism, including:....Finding, summarizing, and evaluating relevant information from large and changing data stores;....Simulating and predicting enemy acts and outcomes; and....Producing actionable intelligence by finding meaningful patterns hidden in huge amounts of noisy data....The book’s four sections describe current research on discovering relevant information buried in vast amounts of unstructured data; extracting meaningful information from digitized documents in multiple languages; analyzing graphs and networks to shed light on adversaries’ goals and intentions; and developing software systems that enable analys |
出版日期 | Book 2009 |
关键词 | Access; Counterterrorism; Terrorist; artificial intelligence; data mining; formal concept analysis; inform |
版次 | 1 |
doi | https://doi.org/10.1007/978-3-642-01141-2 |
isbn_softcover | 978-3-642-42613-1 |
isbn_ebook | 978-3-642-01141-2 |
copyright | Springer-Verlag Berlin Heidelberg 2009 |