000 04118nam a22005777a 4500
001 sulb-eb0022088
003 BD-SySUS
005 20160413122222.0
007 cr nn 008mamaa
008 120827s2013 xxu| s |||| 0|eng d
020 _a9781461447696
_9978-1-4614-4769-6
024 7 _a10.1007/978-1-4614-4769-6
_2doi
050 4 _aQA75.5-76.95
072 7 _aUT
_2bicssc
072 7 _aCOM069000
_2bisacsh
072 7 _aCOM032000
_2bisacsh
082 0 4 _a005.7
_223
100 1 _aSubrahmanian, V.S.
_eauthor.
245 1 0 _aComputational Analysis of Terrorist Groups: Lashkar-e-Taiba
_h[electronic resource] :
_bLashkar-e-Taiba /
_cby V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2013.
300 _aXIV, 234 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- A Brief History of LeT -- Temporal Probabilistic Behavior Rules -- Targeting Civilians -- Attacks Against Public Sites, Tourist Sites, and Transportation Facilities -- Attacks Against Professional Security Forces -- Attacks Against Security Installations and Infrastructure -- Other Types of Attacks -- Armed Clashes -- Computing Policy Options -- Policy Options Against LeT.
520 _aComputational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses  on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and  how it operates. After 10 years of counter Al Qaeda operations,  LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of  Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for “big data” analysis.  This book presents how to quantify both the environment in which LeT operate, and  the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed  history of  Lashkar-e-Taiba based on extensive analysis conducted by  using open source information and public statements. Each chapter includes a case study, as well as  a slide describing the key results which are available on the authors’ web sites. Computational Analysis of  Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of  government or military workers, researchers  and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.
650 0 _aComputer science.
650 0 _aMathematical logic.
650 0 _aComputers.
650 0 _aData mining.
650 0 _aArtificial intelligence.
650 0 _aApplication software.
650 1 4 _aComputer Science.
650 2 4 _aInformation Systems and Communication Service.
650 2 4 _aArtificial Intelligence (incl. Robotics).
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aComputer Appl. in Social and Behavioral Sciences.
650 2 4 _aMathematical Logic and Formal Languages.
700 1 _aMannes, Aaron.
_eauthor.
700 1 _aSliva, Amy.
_eauthor.
700 1 _aShakarian, Jana.
_eauthor.
700 1 _aDickerson, John P.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781461447689
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4614-4769-6
912 _aZDB-2-SCS
942 _2Dewey Decimal Classification
_ceBooks
999 _c44180
_d44180