Counterterrorism and Open Source Intelligence

Editors:

ISBN: 978-3-7091-0387-6 (Print) 978-3-7091-0388-3 (Online)

Table of contents (21 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xviii

  2. Models

    1. Front Matter

      Pages 7-7

    2. No Access

      Book Chapter

      Pages 1-6

      Counterterrorism and Open Source Intelligence: Models, Tools, Techniques, and Case Studies

    3. No Access

      Book Chapter

      Pages 9-32

      Targeting by Transnational Terrorist Groups

    4. No Access

      Book Chapter

      Pages 33-47

      A Framework for Analyst Focus from Computed Significance

    5. No Access

      Book Chapter

      Pages 49-59

      Interdiction of Plots with Multiple Operatives

    6. No Access

      Book Chapter

      Pages 61-72

      Understanding Terrorist Network Topologies and Their Resilience Against Disruption

    7. No Access

      Book Chapter

      Pages 73-102

      Co-offending Network Mining

  3. Tools and Techniques

    1. Front Matter

      Pages 103-103

    2. No Access

      Book Chapter

      Pages 105-142

      Region-Based Geospatial Abduction with Counter-IED Applications

    3. No Access

      Book Chapter

      Pages 143-158

      Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks

    4. No Access

      Book Chapter

      Pages 159-170

      The Use of Open Source Intelligence in the Construction of Covert Social Networks

    5. No Access

      Book Chapter

      Pages 171-187

      A Novel Method to Analyze the Importance of Links in Terrorist Networks

    6. No Access

      Book Chapter

      Pages 189-222

      A Global Measure for Estimating the Degree of Organization and Effectiveness of Individual Actors with Application to Terrorist Networks

    7. No Access

      Book Chapter

      Pages 223-247

      Counterterrorism Mining for Individuals Semantically-Similar to Watchlist Members

    8. No Access

      Book Chapter

      Pages 249-264

      Detection of Illegitimate Emails Using Boosting Algorithm

    9. No Access

      Book Chapter

      Pages 265-283

      Cluster Based Text Classification Model

    10. No Access

      Book Chapter

      Pages 285-313

      Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer Biomarkers

  4. Case Studies

    1. Front Matter

      Pages 315-315

    2. No Access

      Book Chapter

      Pages 317-341

      From Terrorism Informatics to Dark Web Research

    3. No Access

      Book Chapter

      Pages 343-354

      Investigating Terrorist Attacks Using CDR Data: A Case Study

    4. No Access

      Book Chapter

      Pages 355-390

      Multilingual Real-time Event Extraction for Border Security Intelligence Gathering

    5. No Access

      Book Chapter

      Pages 391-412

      Mining the Web to Monitor the Political Consensus

    6. No Access

      Book Chapter

      Pages 413-427

      Exploring the Evolution of Terrorist Networks

previous Page of 2