- Format
- Häftad (Paperback / softback)
- Språk
- Engelska
- Antal sidor
- 389
- Utgivningsdatum
- 2014-11-11
- Upplaga
- 2009 ed.
- Förlag
- Springer Verlag GmbH
- Medarbetare
- Farley, Jonathan David (ed.), Hicks, David L. (ed.), Memon, Nasrullah (ed.), Rosenorn, Torben (ed.)
- Illustrationer
- 10 Tables, black and white; XIII, 389 p.
- Dimensioner
- 234 x 156 x 21 mm
- Vikt
- Antal komponenter
- 1
- Komponenter
- 1 Paperback / softback
- ISBN
- 9783709116647
- 563 g
Du kanske gillar
-
Paying the Land
Joe Sacco
InbundenMathematical Methods in Counterterrorism
2098- Skickas inom 7-10 vardagar.
- Gratis frakt inom Sverige över 199 kr för privatpersoner.
Finns även somPassar bra ihop
De som köpt den här boken har ofta också köpt The Art of War av Sun Tzu (häftad).
Köp båda 2 för 2157 krKundrecensioner
Har du läst boken? Sätt ditt betyg »Fler böcker av författarna
-
Data Mining for Social Network Data
Nasrullah Memon, Jennifer Jie Xu, David L Hicks, Hsinchun Chen
-
From Sociology to Computing in Social Networks
Nasrullah Memon, Reda Alhajj
-
Toward a Mathematical Theory of Counterterrorism: The Proteus Monograph Series
Jonathan David Farley
-
Fish'n Naked
David L Hicks
Innehållsförteckning
Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge.- Part I Network Analysis: Modeling Criminal Activity in Urban Landscapes; Extracting Knowledge from Graph Data in Adversarial Settings; Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes; Combining Qualitative and Quantitative Temporal Reasoning for Criminal Forensics; Two Theoretical Research Questions Concerning the Structure of the Perfect Terrorist Cell.- Part II Forecasting: Understanding Terrorist Organizations with a Dynamic Model; Interference Approaches to Constructing Covert Social Network Topologies; A Mathematical Analysis of Short-term Responses to Threats of Terrorism; Network Detection Theory.- Part III Communication/Interpretation: Security of Underground Resistance Movements; Intelligence Constraints on Terrorist Network Plots; On Heterogeneous Covert Networks; Two Models for Semi-Supervised Terrorist Group Detection.- Part IV Behavior: CAPE: Automatically Predicting Changes in Group Behavior; Interrogation Methods and Terror Networks; Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing; Simulating Terrorist Cells: Experiments and Mathematical Theory.- Part V Game Theory: A Brinkmanship Game Theory Model of Terrorism; Strategic Analysis of Terrorism; Underfunding in Terrorist Organizations.- Part VI History of the Conference on Mathematical Methods in Counterterrorism: Personal Reflections on Beauty and Terror.