Matches in Library of Congress for { <http://lccn.loc.gov/2011931775> ?p ?o. }
Showing items 1 to 33 of
33
with 100 items per page.
- 2011931775 alternative "Counter-terrorism and open source intelligence".
- 2011931775 contributor B12418788.
- 2011931775 created "c2011.".
- 2011931775 date "2011".
- 2011931775 date "c2011.".
- 2011931775 dateCopyrighted "c2011.".
- 2011931775 description "Counterterrorism and open source intelligence models, tools, techniques, and case studies / Uffe Kock Wiil -- Targeting by transnational terrorist groups / Alexander Gutfraind -- A framework for analyst focus from computed significance / David Skillicorn and M.A.J. Bourassa -- Interdiction of plots with multiple operatives / Gordon Woo -- Understanding terrorists network topologies and their resilience against disruption / Roy Lindelauf, Peter Borm, and Herbert Hamers -- Co-offending network mining / Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, and Mohammad A. Tayebi -- Religion-based geospatial abduction with counter-IED applications / Paulo Shakarian and V.S. Subrahmanian -- Finding hidden links in terrorist networks by checking indirect links of different sub-networks / Alan Chen, Shag Gao, Panagiotis Karampelas, Reda Alhajj, and Jon Rokne -- The use of open source intelligence in the construction of covert social networks / Christopher J. Rhodes -- A novel method to analyze the importance of links in terrorist networks / Uffe Kock Wiil, Jolanta Gniadek, and Nasrullah Memon -- A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks / Sara Aghakhani, Khaled Dawoud, Reda Alhajj, and Jon Rokne -- Counterterrorism mining for individuals semantically-similar to watchlist members / James A. Danowski -- Detection of illegitimate emails using boosting algorithm / Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil -- Cluster based text classification model / Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil -- Effectiveness of social networks for studying biological agents and identifying cancer biomarkers / Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon Rokne, douglas Demetrick, Mick Ridley, and Reda alhajj -- From terrorism informatics to dark web research / Hsinchun Chen -- Investigating terrorist attacks using CDR data : a case study / Faith Ozgul, Ahmet Celik, Claus Atzenbeck, and Nadir Gergin -- Multilingual real-time event extraction for border security intelligence gathering / Martin Atkinson, Jakub Piskorski, Erik van der Goot, and Roman Yangarber -- Mining the web to monitor the political consensus / Federico Neri, Carlo Aliprandi, and Furio Camillo -- Exploring the evolution of terrorist networks / Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, and Panagiotis Karampelas -- The ultimate hack : re-inventing intelligence to re-engineer earth / Robert David Steele.".
- 2011931775 description "Includes bibliographical references.".
- 2011931775 extent "xviii, 458 p. :".
- 2011931775 hasFormat "Also available in electronic format via the World Wide Web.".
- 2011931775 identifier "3709103878".
- 2011931775 identifier "9783709103876 (hbk.)".
- 2011931775 identifier 2011931775-d.html.
- 2011931775 identifier 2011931775-t.html.
- 2011931775 isFormatOf "Also available in electronic format via the World Wide Web.".
- 2011931775 isPartOf "Lecture notes in social networks ; v. 2".
- 2011931775 isPartOf "Lecture notes in social networks ; v. 2.".
- 2011931775 issued "2011".
- 2011931775 issued "c2011.".
- 2011931775 language "eng".
- 2011931775 publisher "Wien ; New York : Springer,".
- 2011931775 relation "Also available in electronic format via the World Wide Web.".
- 2011931775 subject "363.325/17 23".
- 2011931775 subject "Data mining in law enforcement.".
- 2011931775 subject "HV6431 .C686 2011".
- 2011931775 subject "Open source intelligence.".
- 2011931775 subject "Terrorism Prevention Data processing.".
- 2011931775 subject "Terrorism Prevention Simulation methods.".
- 2011931775 subject "Terrorism Prevention.".
- 2011931775 tableOfContents "Counterterrorism and open source intelligence models, tools, techniques, and case studies / Uffe Kock Wiil -- Targeting by transnational terrorist groups / Alexander Gutfraind -- A framework for analyst focus from computed significance / David Skillicorn and M.A.J. Bourassa -- Interdiction of plots with multiple operatives / Gordon Woo -- Understanding terrorists network topologies and their resilience against disruption / Roy Lindelauf, Peter Borm, and Herbert Hamers -- Co-offending network mining / Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, and Mohammad A. Tayebi -- Religion-based geospatial abduction with counter-IED applications / Paulo Shakarian and V.S. Subrahmanian -- Finding hidden links in terrorist networks by checking indirect links of different sub-networks / Alan Chen, Shag Gao, Panagiotis Karampelas, Reda Alhajj, and Jon Rokne -- The use of open source intelligence in the construction of covert social networks / Christopher J. Rhodes -- A novel method to analyze the importance of links in terrorist networks / Uffe Kock Wiil, Jolanta Gniadek, and Nasrullah Memon -- A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks / Sara Aghakhani, Khaled Dawoud, Reda Alhajj, and Jon Rokne -- Counterterrorism mining for individuals semantically-similar to watchlist members / James A. Danowski -- Detection of illegitimate emails using boosting algorithm / Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil -- Cluster based text classification model / Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil -- Effectiveness of social networks for studying biological agents and identifying cancer biomarkers / Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon Rokne, douglas Demetrick, Mick Ridley, and Reda alhajj -- From terrorism informatics to dark web research / Hsinchun Chen -- Investigating terrorist attacks using CDR data : a case study / Faith Ozgul, Ahmet Celik, Claus Atzenbeck, and Nadir Gergin -- Multilingual real-time event extraction for border security intelligence gathering / Martin Atkinson, Jakub Piskorski, Erik van der Goot, and Roman Yangarber -- Mining the web to monitor the political consensus / Federico Neri, Carlo Aliprandi, and Furio Camillo -- Exploring the evolution of terrorist networks / Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, and Panagiotis Karampelas -- The ultimate hack : re-inventing intelligence to re-engineer earth / Robert David Steele.".
- 2011931775 title "Counter-terrorism and open source intelligence".
- 2011931775 title "Counterterrorism and open source intelligence / Uffe Kock Wiil, editor.".
- 2011931775 type "text".