Companion proceedings of the second ACM IKDD Conference on Data Sciences (CODS) : March 18-21, Bangalore, India
| Companion proceedings of the second ACM IKDD Conference on Data Sciences (CODS) : March 18-21, Bangalore, India |
| Autore | Gupta Manish |
| Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2015 |
| Descrizione fisica | 1 online resource (29 pages) |
| Collana | ACM Other conferences |
| Soggetto topico |
Computer Science
Engineering & Applied Sciences |
| ISBN | 1-4503-3616-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Companion proceedings of the second Association for Computing Machinery IKDD Conference on Data Sciences (Conference on Data Sciences)
Proceedings of the 2nd IKDD Conference on Data Sciences CoDS '15 2nd IKDD Conference on Data Sciences, Bangalore, India - March 20 - 20, 2015 |
| Record Nr. | UNINA-9910376597903321 |
Gupta Manish
|
||
| [Place of publication not identified], : ACM, 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational analysis of terrorist groups : Lashkar-e-Taiba / / V.S. Subrahmanian ...[et al.] ; foreword by R. James Woolsey
| Computational analysis of terrorist groups : Lashkar-e-Taiba / / V.S. Subrahmanian ...[et al.] ; foreword by R. James Woolsey |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | New York, : Springer, c2013 |
| Descrizione fisica | 1 online resource (232 p.) |
| Disciplina |
006.3/12
519.5 |
| Altri autori (Persone) | SubrahmanianV. S |
| Soggetto topico |
Computational intelligence
Data mining Terrorism - Pakistan |
| ISBN |
1-283-62446-X
9786613936912 1-4614-4769-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- A Brief History of LeT -- Temporal Probabilistic Behavior Rules -- Targeting Civilians -- Attacks Against Public Sites, Tourist Sites, and Transportation Facilities -- Attacks Against Professional Security Forces -- Attacks Against Security Installations and Infrastructure -- Other Types of Attacks -- Armed Clashes -- Computing Policy Options -- Policy Options Against LeT. |
| Record Nr. | UNINA-9910437601803321 |
| New York, : Springer, c2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of computational approaches to counterterrorism / / V.S. Subrahmanian, editor
| Handbook of computational approaches to counterterrorism / / V.S. Subrahmanian, editor |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | New York, : Springer, 2013 |
| Descrizione fisica | 1 online resource (579 p.) |
| Disciplina |
363.325
363.325170285 |
| Altri autori (Persone) | SubrahmanianV. S |
| Soggetto topico | Terrorism - Prevention - Data processing |
| ISBN |
1-283-93402-7
1-4614-5311-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | pt. I. Data and data acquisition -- pt. II. Behavioral models and forecasting -- pt. III. Terrorist network analysis -- pt. IV. Systems, frameworks, and case studies -- pt. V. New directions. |
| Record Nr. | UNINA-9910437585103321 |
| New York, : Springer, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Machine Learning Techniques to Predict Terrorist Attacks : Exemplified by Jama'at Nasr al-Islam wal Muslimin / / by Laura Mostert, Roy Lindelauf, Chiara Pulice, Marnix Provoost, Priyanka Amin, V.S. Subrahmanian
| Machine Learning Techniques to Predict Terrorist Attacks : Exemplified by Jama'at Nasr al-Islam wal Muslimin / / by Laura Mostert, Roy Lindelauf, Chiara Pulice, Marnix Provoost, Priyanka Amin, V.S. Subrahmanian |
| Autore | Mostert Laura |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (157 pages) |
| Disciplina | 006.31 |
| Altri autori (Persone) |
LindelaufRoy
PuliceChiara ProvoostMarnix AminPriyanka SubrahmanianV. S |
| Collana | Terrorism, Security, and Computation |
| Soggetto topico |
Machine learning
Artificial intelligence Politics and war Terrorism Political violence Machine Learning Artificial Intelligence Military and Defence Studies Terrorism and Political Violence |
| ISBN | 3-031-93174-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1 Introduction -- Chapter 2 Jama'at Nasr al-Islam wal Muslimin (JNIM) -- Chapter 3 Temporal Probabilistic Rules and Policy Computation Algorithms -- Chapter 4 Abduction and Release of Abductees -- Chapter 5 Attacks on and Targeting of Public Sites -- Chapter 6 Targeting of Security Professionals and Security Installations -- Chapter 7 Targeting of Civilians -- Chapter 8 Other types of attacks -- Chapter 9 Reflections & Implications for military decision making. |
| Record Nr. | UNINA-9911015852703321 |
Mostert Laura
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||