Handbook of Computational Approaches to Counterterrorism

  • V.S. Subrahmanian

Table of contents

  1. Front Matter
    Pages i-xvii
  2. Data and Data Acquisition

    1. Front Matter
      Pages 1-1
    2. Gary LaFree, Laura Dugan
      Pages 3-22
    3. Philip A. Schrodt, David Van Brackle
      Pages 23-49
    4. Elizabeth Boschee, Premkumar Natarajan, Ralph Weischedel
      Pages 51-67
    5. Massimiliano Albanese, Marat Fayzullin, Jana Shakarian, V. S. Subrahmanian
      Pages 69-80
  3. Behavioral Models and Forecasting

    1. Front Matter
      Pages 81-81
    2. Amy Sliva, Gerardo Simari, Vanina Martinez, V. S. Subrahmanian
      Pages 99-127
    3. Philip A. Schrodt, James Yonamine, Benjamin E. Bagozzi
      Pages 129-162
    4. Vladimir B. Petroff, Joe H. Bond, Doug H. Bond, Doug H. Bond
      Pages 163-180
    5. Gerardo I. Simari, Damon Earp, Maria Vanina Martinez, Amy Sliva, V. S. Subrahmanian
      Pages 181-199
    6. Kihoon Choi, Victor Asal, Jonathan Wilkenfeld, Krishna R. Pattipati
      Pages 201-224
    7. Maria Vanina Martinez, Amy Sliva, Gerardo I. Simari, V. S. Subrahmanian
      Pages 225-243
    8. John P. Dickerson, Gerardo I. Simari, V. S. Subrahmanian
      Pages 245-266
  4. Terrorist Network Analysis

    1. Front Matter
      Pages 267-267
    2. Bart Husslage, Roy Lindelauf, Herbert Hamers
      Pages 269-282
    3. Michael Fire, Rami Puzis, Yuval Elovici
      Pages 283-300
    4. Khaled Dawoud, Tamer N. Jarada, Wadhah Almansoori, Alan Chen, Shang Gao, Reda Alhajj et al.
      Pages 301-321
    5. Rasmus Rosenqvist Petersen, Uffe Kock Wiil
      Pages 323-359

About this book

Introduction

Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour.

Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book’s website.

This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.

Keywords

Behavioral Analytics Computational models of terror groups Counterterrorism Data Mining and Machine Learning Forecasting Methodologies

Editors and affiliations

  • V.S. Subrahmanian
    • 1
  1. 1., Computer Science DepartmentUniversity of MarylandCollege ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-1-4614-5311-6
  • Copyright Information Springer Science+Business Media New York 2013
  • Publisher Name Springer, New York, NY
  • eBook Packages Computer Science
  • Print ISBN 978-1-4614-5310-9
  • Online ISBN 978-1-4614-5311-6
  • About this book