2013

Handbook of Computational Approaches to Counterterrorism

Editors:

ISBN: 978-1-4614-5310-9 (Print) 978-1-4614-5311-6 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xvii

  2. DATA AND DATA ACQUISITION

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-22

      The Global Terrorism Database, 1970–2010

    3. No Access

      Book Chapter

      Pages 23-49

      Automated Coding of Political Event Data

    4. No Access

      Book Chapter

      Pages 51-67

      Automatic Extraction of Events from Open Source Text for Predictive Forecasting

    5. No Access

      Book Chapter

      Pages 69-80

      Automated Coding of Decision Support Variables

  3. BEHAVIORAL MODELS AND FORECASTING

    1. Front Matter

      Pages 81-81

    2. No Access

      Book Chapter

      Pages 83-97

      Qualitative Analysis & Computational Techniques for the Counter-Terror Analyst

    3. No Access

      Book Chapter

      Pages 99-127

      SOMA: Stochastic Opponent Modeling Agents for Forecasting Violent Behavior

    4. No Access

      Book Chapter

      Pages 129-162

      Data-based Computational Approaches to Forecasting Political Violence

    5. No Access

      Book Chapter

      Pages 163-180

      Using Hidden Markov Models to Predict Terror Before it Hits (Again)

    6. No Access

      Book Chapter

      Pages 181-199

      Forecasting Group-Level Actions Using Similarity Measures

    7. No Access

      Book Chapter

      Pages 201-224

      Forecasting the Use of Violence by Ethno–Political Organizations: Middle Eastern Minorities and the Choice of Violence

    8. No Access

      Book Chapter

      Pages 225-243

      Forecasting Changes in Terror Group Behavior

    9. No Access

      Book Chapter

      Pages 245-266

      Using Temporal Probabilistic Rules to Learn Group Behavior

  4. TERRORIST NETWORK ANALYSIS

    1. Front Matter

      Pages 267-267

    2. No Access

      Book Chapter

      Pages 269-282

      Leaderless Covert Networks: A Quantitative Approach

    3. No Access

      Book Chapter

      Pages 283-300

      Link Prediction in Highly Fractional Data Sets

    4. No Access

      Book Chapter

      Pages 301-321

      Data Analysis Based Construction and Evolution of Terrorist and Criminal Networks

    5. No Access

      Book Chapter

      Pages 323-359

      CrimeFighter Investigator: Criminal Network Sense-Making

  5. SYSTEMS, FRAMEWORKS, and CASE STUDIES

    1. Front Matter

      Pages 361-361

    2. No Access

      Book Chapter

      Pages 363-399

      The NOEM: A Tool for Understanding/ Exploring the Complexities of Today’s Operational Environment

    3. No Access

      Book Chapter

      Pages 401-418

      A Multi-Method Approach for Near Real Time Conflict and Crisis Early Warning

    4. No Access

      Book Chapter

      Pages 419-440

      A Realistic Framework for Counter-terrorism in Multimedia

    5. No Access

      Book Chapter

      Pages 441-463

      PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response

previous Page of 2