2009

Mathematical Methods in Counterterrorism

ISBN: 978-3-211-09441-9 (Print) 978-3-211-09442-6 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIII

  2. Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 1-5

      Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge

  3. Network Analysis

    1. Front Matter

      Pages 7-7

    2. No Access

      Book Chapter

      Pages 9-31

      Modeling Criminal Activity in Urban Landscapes

    3. No Access

      Book Chapter

      Pages 33-54

      Extracting Knowledge from Graph Data in Adversarial Settings

    4. No Access

      Book Chapter

      Pages 55-67

      Mathematically Modeling Terrorist Cells: Examining the Strength of Structures of Small Sizes

    5. No Access

      Book Chapter

      Pages 69-90

      Combining Qualitative and Quantitative Temporal Reasoning for Criminal Forensics

    6. No Access

      Book Chapter

      Pages 91-103

      Two Theoretical Research Questions Concerning the Structure of the Perfect Terrorist Cell

  4. Forecasting

    1. Front Matter

      Pages 105-105

    2. No Access

      Book Chapter

      Pages 107-125

      Understanding Terrorist Organizations with a Dynamic Model

    3. No Access

      Book Chapter

      Pages 127-140

      Inference Approaches to Constructing Covert Social Network Topologies

    4. No Access

      Book Chapter

      Pages 141-160

      A Mathematical Analysis of Short-term Responses to Threats of Terrorism

    5. No Access

      Book Chapter

      Pages 161-181

      Network Detection Theory

  5. Communication/Interpretation

    1. Front Matter

      Pages 183-183

    2. No Access

      Book Chapter

      Pages 185-204

      Security of Underground Resistance Movements

    3. No Access

      Book Chapter

      Pages 205-214

      Intelligence Constraints on Terrorist Network Plots

    4. No Access

      Book Chapter

      Pages 215-228

      On Heterogeneous Covert Networks

    5. No Access

      Book Chapter

      Pages 229-249

      Two Models for Semi-Supervised Terrorist Group Detection

  6. Behavior

    1. Front Matter

      Pages 251-251

    2. No Access

      Book Chapter

      Pages 253-269

      CAPE: Automatically Predicting Changes in Group Behavior

    3. No Access

      Book Chapter

      Pages 271-290

      Interrogation Methods and Terror Networks

    4. No Access

      Book Chapter

      Pages 291-308

      Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing

    5. No Access

      Book Chapter

      Pages 309-316

      Simulating Terrorist Cells: Experiments and Mathematical Theory

  7. Game Theory

    1. Front Matter

      Pages 317-317

    2. No Access

      Book Chapter

      Pages 319-332

      A Brinkmanship Game Theory Model of Terrorism

    3. No Access

      Book Chapter

      Pages 333-348

      Strategic Analysis of Terrorism

previous Page of 2