1.

Record Nr.

UNINA9911015852703321

Autore

Mostert Laura

Titolo

Machine Learning Techniques to Predict Terrorist Attacks : Exemplified by Jama'at Nasr al-Islam wal Muslimin / / by Laura Mostert, Roy Lindelauf, Chiara Pulice, Marnix Provoost, Priyanka Amin, V.S. Subrahmanian

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025

ISBN

3-031-93174-2

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (157 pages)

Collana

Terrorism, Security, and Computation, , 2197-8786

Altri autori (Persone)

LindelaufRoy

PuliceChiara

ProvoostMarnix

AminPriyanka

SubrahmanianV. S

Disciplina

006.31

Soggetti

Machine learning

Artificial intelligence

Politics and war

Terrorism

Political violence

Machine Learning

Artificial Intelligence

Military and Defence Studies

Terrorism and Political Violence

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Chapter 1 Introduction -- Chapter 2 Jama'at Nasr al-Islam wal Muslimin (JNIM) -- Chapter 3 Temporal Probabilistic Rules and Policy Computation Algorithms -- Chapter 4 Abduction and Release of Abductees -- Chapter 5 Attacks on and Targeting of Public Sites -- Chapter 6 Targeting of Security Professionals and Security Installations -- Chapter 7 Targeting of Civilians -- Chapter 8 Other types of attacks -- Chapter 9 Reflections & Implications for military decision making.

Sommario/riassunto

One of the most influential actors in spreading Islamist violence across



the Sahel is Jama’at Nasr Al Islam Wal Muslimin (JNIM).This book provides the first systematic quantitative analysis of JNIM’s behavior by analyzing a 12-year database of JNIM’s attacks and the environment surrounding JNIM. This book leverages AI/ML predictive models to accurately predict almost 40 types of attacks using over 80 independent variables. This book describes a set of temporal probabilistic rules that state that when the environment in which the group operates satisfies some conditions, then an attack of a certain type will likely occur in the next N months. This provides a deep, easy to comprehend understanding of the conditions under which JNIM carries various kinds of attacks up to 6 months into the future. This book will serve as an invaluable guide to scholars (computer scientists, political scientists, policy makers). Military officers, intelligence personnel, and government employees, who seek to understand, predict, and eventually mitigate attacks by JNIM and bring peace to the nations of Mali, Burkina Faso, and Niger will want to purchase this book as well.