This book collects a wide range of the most current computational research that addresses critical issues for countering terrorism, including:
Finding, summarizing, and evaluating relevant information from large and changing data stores;
Simulating and predicting enemy acts and outcomes; and
Producing actionable intelligence by finding meaningful patterns hidden in huge amounts of noisy data.
The book's four sections describe current research on discovering relevant information buried in vast amounts of unstructured data; extracting meaningful information from digitized documents in multiple languages; analyzing graphs and networks to shed light on adversaries' goals and intentions; and developing software systems that enable analysts to model, simulate, and predict the effects of real-world conflicts.
The research described in this book is invaluable reading for governmental decision-makers designing new policies to counter terrorist threats, for members of the military, intelligence, and law enforcement communities devising counterterrorism strategies, and for researchers developing more effective methods for knowledge discovery in complicated and diverse datasets.
- Verlag: Springer, Berlin
- Artikelnr. des Verlages: 12615575
- Erscheinungstermin: 15. Juli 2009
- Abmessung: 241mm x 160mm x 24mm
- Gewicht: 622g
- ISBN-13: 9783642011405
- ISBN-10: 3642011403
- Artikelnr.: 26222671
Part I: Information Access
1) On Searching in the 'Real World'
2) Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields
3) What Makes a Good Summary?
4) A Prototype Search Toolkit
Part II: Text Analysis
5) Unapparent Information Revelation: Text Mining for Counterterrorism
6) Identification of Sensitive Unclassified Information
7) Rich Language Analysis for Counterterrorism
Part III: Graphical Models
8) Dicliques: Finding Needles in Haysticks
9) Information Superiority via Formal Concept Analysis
10) Reflexive Analysis of Groups
11) Evaluating Self-Reflexion Analysis Using Repertory Grids
Part IV: Conflict Analysis
12) Anticipating Terrorist Safe Havens from Instability Induced Conflict
13) Applied Counterfactual Reasoning
14) Adversarial Planning in Networks15) Gaming and Simulating Ethno-Political Conflicts