Limit search to available items
Book Cover
E-book

Title Computational methods for counterterrorism / edited by Shlomo Argamon, Newton Howard
Published Berlin ; New York : Springer, ©2009

Copies

Description 1 online resource (xviii, 306 pages)
Contents On searching in the "real world" / Ophir Frieder -- Signature-based retrieval of scanned documents using conditional random fields / Harish Srinivasan and Sargur Srihari -- What makes a good summary? / Qunhua Zhao [and others] -- A prototype search toolkit / Margaret M. Knepper, Kevin L. Fox, and Ophir Frieder -- Unapparent information revelation : text mining for counterterrorism / Rohini K. Srihari -- Identification of sensitive unclassified information / Kazem Taghva -- Rich language analysis for counterterrorism / Mathieu Guidère, Newton Howard, and Shlomo Argamon -- Dicliques : finding needles in haystacks / Robert M. Haralick -- Information superiority via formal concept analysis / Bjoern Koester and Stefan E. Schmidt -- Reflexive analysis of groups / Vladimir A. Lefebvre -- Evaluating self-reflexion analysis using repertory grids / James Grice and Brenda L. McDaniel -- Anticipating terrorist safe havens from instability induced conflict / Robert Shearer and Brett Marvin -- Applied counterfactual reasoning / Noel Hendrickson -- Adversarial planning in networks / Sviatoslav Braynov -- Gaming and simulating ethno-political conflicts / Barry G. Silverman, Gnana K. Bharathy, and Benjamin D. Nye
Summary Modern terrorist networks pose an unprecedented threat to international security. Their fluid and non-hierarchical structures, their religious and ideological motivations, and their predominantly non-territorial objectives all radically complicate the question of how to neutralize them. As governments and militaries work to devise new policies and doctrines to combat terror, new technologies are desperately needed to make these efforts effective. This book collects a wide range of the most current computational research addressing critical issues for counterterrorism in a dynamic and complex threat environment: finding, summarizing, and evaluating relevant information from large and dynamic data stores; simulation and prediction of likely enemy actions and the effects of proposed counter-efforts; and producing actionable intelligence by finding meaningful patterns hidden in masses of noisy data items. The contributions are organized thematically into four sections. The first section concerns efforts to provide effective access to small amounts of relevant information buried in enormous amounts of diverse unstructured data. The second section discusses methods for the key problem of extracting meaningful information from digitized documents in various languages. The third section presents research on analyzing graphs and networks, offering new ways of discovering hidden structures in data and profiles of adversaries' goals and intentions. Finally, the fourth section of the book describes software systems that enable analysts to model, simulate, and predict the effects of real-world conflicts. The models and methods discussed in this book are invaluable reading for governmental decision-makers designing new policies to counter terrorist threats, for members of the military, intelligence, and law enforcement communities devising counterterrorism strategies based on new technologies, and for academic and industrial researchers devising more effective methods for knowledge discovery in complicated and diverse datasets
Bibliography Includes bibliographical references and index
Notes Print version record
In Springer eBooks
Subject Terrorism -- Prevention -- Computer network resources
Terrorism -- Databases -- Research
Data mining.
Computer security.
Criminology.
Natural language processing (Computer science)
Information storage and retrieval systems.
Data Mining
Computer Security
Criminology
Natural Language Processing
Information Systems
Electronic Data Processing
criminology.
Terrorism -- Databases -- Research.
Terrorism -- Prevention -- Computer network resources.
Informatique.
Computer science
Computer security
Criminology
Data mining
Information storage and retrieval systems
Natural language processing (Computer science)
Form Electronic book
Author Argamon, Shlomo
Howard, Newton
ISBN 9783642011412
3642011411
3642011403
9783642011405