Terrorism Informatics

Knowledge Management and Data Mining for Homeland Security

ISBN: 978-0-387-71612-1 (Print) 978-0-387-71613-8 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xlii

  2. Methodological Issues in Terrorism Research

    1. No Access

      Book Chapter

      Pages 3-26

      Domain Mapping of Contemporary Terrorism Research

    2. No Access

      Book Chapter

      Pages 27-50

      Research on Terrorism

    3. No Access

      Book Chapter

      Pages 51-72

      Who Are the Key Figures in ‘Terrorism Studies’?

    4. No Access

      Book Chapter

      Pages 73-99

      Interviewing Terrorists

    5. No Access

      Book Chapter

      Pages 101-114

      Resolving a Terrorist Insurgency by Addressing Its Root Causes

    6. No Access

      Book Chapter

      Pages 115-139

      A Quantitative Analysis of ‘Root Causes of Conflict’

    7. No Access

      Book Chapter

      Pages 141-155

      Countering Terrorism with Knowledge

    8. No Access

      Book Chapter

      Pages 157-174

      Toward a Target-specific Method of Threat Assessment

    9. No Access

      Book Chapter

      Pages 175-196

      Identifying and Exploiting Group Learning Patterns for Counterterrorism

    10. No Access

      Book Chapter

      Pages 197-218

      Homeland Insecurity

  3. Terrorism Informatics to Support Prevention, Detection, and Response

    1. No Access

      Book Chapter

      Pages 221-235

      Case Study of Jihad on the Web

    2. No Access

      Book Chapter

      Pages 237-266

      Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System

    3. No Access

      Book Chapter

      Pages 267-284

      Content Analysis of Jihadi Extremist Groups' Videos

    4. No Access

      Book Chapter

      Pages 285-307

      Analysis of Affect Intensities in Extremist Group Forums

    5. No Access

      Book Chapter

      Pages 309-346

      Document Selection for Extracting Entity and Relationship Instances of Terrorist Events

    6. No Access

      Book Chapter

      Pages 347-364

      Data Distortion Methods and Metrics in a Terrorist Analysis System

    7. No Access

      Book Chapter

      Pages 365-384

      Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)

    8. Book Chapter

      Pages 385-406

      Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons

    9. No Access

      Book Chapter

      Pages 407-424

      Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content

    10. No Access

      Book Chapter

      Pages 425-449

      Individual and Collective Analysis of Anomalies in Message Traffic

previous Page of 2