- ホーム
- > 洋書
- > ドイツ書
- > Mathematics, Sciences & Technology
- > Mathematics
- > miscellaneous
基本説明
Provides a new algorithms for finding direct and indirect relations in networks.
Description
(Short description)
This work represents the latest in mathematical and computational techniques to assist in combating terrorist cells. Achieved by quantifying threats and the effectiveness of counterterrorism operations and strategies, contributors share theories and methodologies to generate and analyze terrorist networks and provide mathematical methods and practical algorithms for destabilizing adversaries. New developments include: A new centrality-like measure to screen networks for potential actors of interest; Detection of topological characteristics of these networks to understand structure; Measures based on efficiency of networks to identify key players; Theories to detect command structures of networks by detecting hidden hierarchies; A knowledge base of the terrorist attacks in / planned in the past, by spidering data. Results of command structure via new algorithms with SNA literature (N-Clique, K-Core, etc.) are compared. The best techniques are combined to assist intelligence agencies / law enforcement.
(Text)
The primary objective of this research is to develop the underlying theory and associated methodologies used to generate and analyze terrorist networks and propose mathematical methods and practical algorithms for destabilizing these adversaries. It aims to develop a new centrality-like measure, via extensions of several others in use to screen networks for agents of interest. Presents the theoretical bases that make this measure more amenable to terrorist networks, and their advantages. Provides a theory of detecting command structures of terrorist networks. The algorithms for detecting hidden hierarchy of terrorist network are discussed. Results of command structure obtained by using new algorithms and other centralities with related SNA literature like N-Clique, K-Core, etc. are compared. Includes new algorithms for finding direct and indirect relations in a network. Combines the most promising techniques into a prototype tool-set to assist intelligence agencies / law enforcement and others.
(Table of content)
Table of Contents.- Part 1: Understanding Terrorism,Terrorist and Terrorist Organization.- Chapter 1: Terrorism and Terrorists.- Chapter 2: Terrorist Organizations and groups.- Chapter 3: How it all begun.- Chapter 4: Investigative Data Mining.- Chapter 5: Terrorist Network Analysis.- Chapter 6: Visualizing Networks.- Chapter 7: Cohesion analysis and detecting critical regions.- Chapter 8: Extending Social Network Analysis.- Chapter 9: Detecting Hidden Hierarchy.- Chapter 10: Investigative Data Mining Tool Kit (iMiner).- Chapter 11: Practical Data Sets.