COVID-19 Response at

Read what we're doing...

Counterterrorism and Open Source Intelligence


Product Description
Product Details

Table of Contents

Counterterrorism and Open Source Intelligence: Models, Tools, Techniques, and Case Studies (Uffe Kock Wiil) Part I Models Targeting by Transnational Terrorist Groups (Alexander Gutfraind) A Framework for Analyst Focus from Computed Significance (David Skillicorn and M.A.J. Bourassa) Interdiction of Plots with Multiple Operatives (Gordon Woo) Understanding Terrorist Network Topologies and their Resilience against Disruption (Roy Lindelauf, Peter Borm, and Herbert Hamers, Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glasser, and Mohammad A. Tayebi) Part II Tools and Techniques Region-based Geospatial Abduction with Counter-IED Applications (Paulo Shakarian and V.S. Subrahmanian) Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks (lan Chen, Shang Gao, Panagiotis Karampelas, Reda Alhajj, and Jon Rokne) The Use of Open Source Intelligence in the Construction of Covert Social Networks (Christopher J. Rhodes) A Novel Method to Analyze the Importance of Links in Terrorist Networks (Uffe Kock Wiil, Jolanta Gniadek, and Nasrullah Memon) A Global Measure for Estimating the Degree of Organization and Effectiveness of Individual Actors with Application to Terrorist Networks (Sara Aghakhani, Khaled Dawoud, Reda Alhajj, and Jon Rokne) Counterterrorism Mining for Individuals Semantically-Similar toWatchlist Members (James A. Danowski) Detection of Illegitimate Emails using Boosting Algorithm (Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil) Cluster Based Text Classification Model (Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil) Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer (Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel OEzyer, Jon Rokne, Douglas Demetrick, Mick Ridley, and Reda Alhajj) Part III Case Studies From Terrorism Informatics to Dark Web Research (Hsinchun Chen) Investigating Terrorist Attacks using CDR Data: A Case Study (Fatih Ozgul, Ahmet Celik, Claus Atzenbeck, and Nadir Gergin) Multilingual Real-Time Event Extraction for Border Security Intelligence Gathering (Martin Atkinson, Jakub Piskorski, Erik Van der Goot, and Roman Yangarber) Mining the Web to Monitor the Political Consensus (Federico Neri, Carlo Aliprandi, and Furio Camillo) Exploring the Evolution of Terrorist Networks (Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, and Panagiotis Karampelas) Part IV Alternative Perspective The Ultimate Hack: Re-Inventing Intelligence to Re-Engineer Earth (Robert David Steele)


From the reviews:"Informatics may be used to analyze open sources in the fight against terrorism. This state-of-the-art overview from an impressive group of international contributors is mandatory reading for criminologists and intelligence professionals. Many of the tools discussed have broad application to social network analysis. ... I recommend this broad overview of state-of-the-art research." (Brad Reid, ACM Computing Reviews, October, 2011)

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Counterterrorism and Open Source Intelligence (Lecture Notes in Social Networks) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by, Inc.
Back to top