Counterterrorism and open source intelligence

"Presents state-of-the-art research and practice in intelligence work. Describes novel tools and techniques for counterterrorism and open source intelligence. Provides perspectives on the future uses of open source intelligence. Since the 9/11 terrorist attacks in the United States, serious co...

Full description

Saved in:  
Bibliographic Details
Contributors: Wiil, Uffe Kock (Editor)
Format: Print Book
Language:English
Published: Wien [u.a.] Springer 2011
In: Lecture notes in social networks (2)
Year: 2011
Online Access: Cover
Inhaltsverzeichnis (Verlag)
Verlagsangaben (Verlag)
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:
Related Items:Online-Ausg.: 165097373X

MARC

LEADER 00000cam a2200000 4500
001 666037191
003 DE-627
005 20220710130401.0
007 tu
008 110816s2011 au ||||| 00| ||eng c
010 |a  2011931775 
016 7 |a 015664896  |2 UK 
020 |a 3709103878  |c £90.00 (hbk.)  |9 3-7091-0387-8 
020 |a 9783709103876  |c  : £90.00 (hbk.)  |9 978-3-7091-0387-6 
035 |a (DE-627)666037191 
035 |a (DE-576)347976433 
035 |a (DE-599)OBVAC08594197 
035 |a (OCoLC)690089099 
035 |a (OCoLC)870325674 
035 |a (AT-OBV)AC08594197 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-AT  |c XD-US 
050 0 |a HV6431 
082 0 |a 363.325/17  |q LOC  |2 23 
082 0 |a 363.325 
084 |a MD 8920  |q OBV  |2 rvk  |0 (DE-625)rvk/122569: 
084 |a MF 9500  |q OBV  |2 rvk  |0 (DE-625)rvk/122811: 
084 |a PH 8760  |q OBV  |2 rvk  |0 (DE-625)rvk/136518: 
084 |a ST 276  |2 rvk  |0 (DE-625)rvk/143642: 
084 |a 89.58  |2 bkl 
084 |a 89.86  |2 bkl 
245 1 0 |a Counterterrorism and open source intelligence  |c Uffe Kock Wiil, ed. 
264 1 |a Wien [u.a.]  |b Springer  |c 2011 
300 |a XVIII, 458 S.  |b Ill., graph. Darst., Kt 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
490 1 |a Lecture notes in social networks  |v 2 
505 8 0 |t Counterterrorism and open source intelligence models, tools, techniques, and case studies  |r Uffe Kock Wiil 
505 8 0 |t Counterterrorism and open source intelligence models, tools, techniques, and case studies  |r Uffe Kock Wiil 
505 8 0 |t Targeting by transnational terrorist groups  |r Alexander Gutfraind 
505 8 0 |t A framework for analyst focus from computed significance  |r David Skillicorn and M.A.J. Bourassa 
505 8 0 |t Interdiction of plots with multiple operatives  |r Gordon Woo 
505 8 0 |t Understanding terrorists network topologies and their resilience against disruption  |r Roy Lindelauf, Peter Borm, and Herbert Hamers 
505 8 0 |t Co-offending network mining  |r Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, and Mohammad A. Tayebi 
505 8 0 |t Religion-based geospatial abduction with counter-IED applications  |r Paulo Shakarian and V.S. Subrahmanian 
505 8 0 |t Finding hidden links in terrorist networks by checking indirect links of different sub-networks  |r Alan Chen, Shag Gao, Panagiotis Karampelas, Reda Alhajj, and Jon Rokne 
505 8 0 |t The use of open source intelligence in the construction of covert social networks  |r Christopher J. Rhodes 
505 8 0 |t A novel method to analyze the importance of links in terrorist networks  |r Uffe Kock Wiil, Jolanta Gniadek, and Nasrullah Memon 
505 8 0 |t A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks  |r Sara Aghakhani, Khaled Dawoud, Reda Alhajj, and Jon Rokne 
505 8 0 |t Counterterrorism mining for individuals semantically-similar to watchlist members  |r James A. Danowski 
505 8 0 |t Detection of illegitimate emails using boosting algorithm  |r Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil 
505 8 0 |t Cluster based text classification model  |r Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil 
505 8 0 |t Effectiveness of social networks for studying biological agents and identifying cancer biomarkers  |r Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon Rokne, douglas Demetrick, Mick Ridley, and Reda alhajj 
505 8 0 |t From terrorism informatics to dark web research  |r Hsinchun Chen 
505 8 0 |t Investigating terrorist attacks using CDR data : a case study  |r Faith Ozgul, Ahmet Celik, Claus Atzenbeck, and Nadir Gergin 
505 8 0 |t Multilingual real-time event extraction for border security intelligence gathering  |r Martin Atkinson, Jakub Piskorski, Erik van der Goot, and Roman Yangarber 
505 8 0 |t Mining the web to monitor the political consensus  |r Federico Neri, Carlo Aliprandi, and Furio Camillo 
505 8 0 |t Exploring the evolution of terrorist networks  |r Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, and Panagiotis Karampelas 
505 8 0 |t The ultimate hack : re-inventing intelligence to re-engineer earth  |r Robert David Steele. 
505 8 0 |t Targeting by transnational terrorist groups  |r Alexander Gutfraind 
505 8 0 |t A framework for analyst focus from computed significance  |r David Skillicorn and M.A.J. Bourassa 
505 8 0 |t Interdiction of plots with multiple operatives  |r Gordon Woo 
505 8 0 |t Understanding terrorists network topologies and their resilience against disruption  |r Roy Lindelauf, Peter Borm, and Herbert Hamers 
505 8 0 |t Co-offending network mining  |r Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, and Mohammad A. Tayebi 
505 8 0 |t Religion-based geospatial abduction with counter-IED applications  |r Paulo Shakarian and V.S. Subrahmanian 
505 8 0 |t Finding hidden links in terrorist networks by checking indirect links of different sub-networks  |r Alan Chen, Shag Gao, Panagiotis Karampelas, Reda Alhajj, and Jon Rokne 
505 8 0 |t The use of open source intelligence in the construction of covert social networks  |r Christopher J. Rhodes 
505 8 0 |t A novel method to analyze the importance of links in terrorist networks  |r Uffe Kock Wiil, Jolanta Gniadek, and Nasrullah Memon 
505 8 0 |t A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks  |r Sara Aghakhani, Khaled Dawoud, Reda Alhajj, and Jon Rokne 
505 8 0 |t Counterterrorism mining for individuals semantically-similar to watchlist members  |r James A. Danowski 
505 8 0 |t Detection of illegitimate emails using boosting algorithm  |r Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil 
505 8 0 |t Cluster based text classification model  |r Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil 
505 8 0 |t Effectiveness of social networks for studying biological agents and identifying cancer biomarkers  |r Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon Rokne, douglas Demetrick, Mick Ridley, and Reda alhajj 
505 8 0 |t From terrorism informatics to dark web research  |r Hsinchun Chen 
505 8 0 |t Investigating terrorist attacks using CDR data : a case study  |r Faith Ozgul, Ahmet Celik, Claus Atzenbeck, and Nadir Gergin 
505 8 0 |t Multilingual real-time event extraction for border security intelligence gathering  |r Martin Atkinson, Jakub Piskorski, Erik van der Goot, and Roman Yangarber 
505 8 0 |t Mining the web to monitor the political consensus  |r Federico Neri, Carlo Aliprandi, and Furio Camillo 
505 8 0 |t Exploring the evolution of terrorist networks  |r Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, and Panagiotis Karampelas 
505 8 0 |t The ultimate hack : re-inventing intelligence to re-engineer earth  |r Robert David Steele. 
520 |a "Presents state-of-the-art research and practice in intelligence work. Describes novel tools and techniques for counterterrorism and open source intelligence. Provides perspectives on the future uses of open source intelligence. Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities." --Publisher's website 
650 0 |a Terrorism  |x Prevention 
650 0 |a Open source intelligence 
650 0 |a Data mining in law enforcement 
650 0 |a Terrorism  |x Prevention  |x Data processing 
650 0 |a Terrorism  |x Prevention  |x Simulation methods 
653 4 |a Terrorism  |a Prevention  |a Computer network resources 
653 4 |a Open source intelligence 
689 0 0 |d s  |0 (DE-588)4059534-1  |0 (DE-627)106143212  |0 (DE-576)209131136  |a Terrorismus  |2 gnd 
689 0 1 |d s  |0 (DE-588)4112701-8  |0 (DE-627)104321679  |0 (DE-576)209470127  |a Bekämpfung  |2 gnd 
689 0 2 |d s  |0 (DE-588)4037877-9  |0 (DE-627)106235079  |0 (DE-576)209027029  |a Massenmedien  |2 gnd 
689 0 3 |d s  |0 (DE-588)4019737-2  |0 (DE-627)106320548  |0 (DE-576)208930477  |a Geheimdienst  |2 gnd 
689 0 4 |d s  |0 (DE-588)4122795-5  |0 (DE-627)10449350X  |0 (DE-576)209554304  |a Analyse  |2 gnd 
689 0 |5 (DE-627) 
700 1 |a Wiil, Uffe Kock  |e Hrsg.  |0 (DE-627)1257502433  |0 (DE-576)187502439  |4 edt 
776 1 |z 9783709103883 
776 0 8 |i Online-Ausg.  |a Wiil, Uffe Kock  |t Counterterrorism and Open Source Intelligence  |d Vienna : Springer-Verlag/Wien, 2011  |h Online-Ressource (XVIII, 458p. 182 illus., 56 illus. in color, digital)  |w (DE-627)165097373X  |w (DE-576)347113753  |z 9783709103883 
830 0 |a Lecture notes in social networks  |v 2  |9 2  |w (DE-627)641890052  |w (DE-576)349685703  |w (DE-600)2585426-4  |x 2190-5428  |7 ns 
856 4 2 |u http://www.loc.gov/catdir/enhancements/fy1305/2011931775-d.html  |x Verlag  |3 Verlagsangaben 
856 4 2 |u http://www.loc.gov/catdir/enhancements/fy1305/2011931775-t.html  |x Verlag  |3 Inhaltsverzeichnis 
856 4 2 |u https://swbplus.bsz-bw.de/bsz347976433cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20150402152508  |3 Cover 
935 |a mkri 
935 |i Blocktest 
936 r v |a MD 8920  |b Terror, Gewalt, Mord  |k Politische Theorie, Grundbegriffe des Politischen  |k Politische Auseinandersetzung  |k Terror, Gewalt, Mord  |0 (DE-627)1271426560  |0 (DE-625)rvk/122569:  |0 (DE-576)201426560 
936 r v |a MF 9500  |b Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)  |k Politische Systeme: einzelne Elemente  |k Politische Sachgebiete  |k Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst)  |0 (DE-627)1271205475  |0 (DE-625)rvk/122811:  |0 (DE-576)201205475 
936 r v |a PH 8760  |b Raub; Erpressung; Geiselnahme; Luftpiraterie; Politisch motivierte Gewaltverbrechen; Terrorismus; Gewalt gegen Ausländer  |k Strafrecht, Strafverfahrensrecht, Kriminologie  |k Kriminologie  |k Einzelne Deliktsgruppen  |k Gewaltkriminalität, Gewaltdelikt  |k Raub; Erpressung; Geiselnahme; Luftpiraterie; Politisch motivierte Gewaltverbrechen; Terrorismus; Gewalt gegen Ausländer  |0 (DE-627)1271914344  |0 (DE-625)rvk/136518:  |0 (DE-576)201914344 
936 r v |a ST 276  |b Datensicherung (physik.) und angewandte Kryptographie, Computerviren  |k Monografien  |k Software und -entwicklung  |k Datensicherung (physik.) und angewandte Kryptographie, Computerviren  |0 (DE-627)127148207X  |0 (DE-625)rvk/143642:  |0 (DE-576)20148207X 
936 b k |a 89.58  |j Politische Gewalt  |0 (DE-627)106416960 
936 b k |a 89.86  |j Nachrichtendienste  |j militärische Nachrichtendienste  |0 (DE-627)106413619 
951 |a BO 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3163054544 
LOK |0 003 DE-627 
LOK |0 004 666037191 
LOK |0 005 20110830143500 
LOK |0 008 110729||||||||||||||||ger||||||| 
LOK |0 040   |a DE-Frei85  |c DE-627  |d DE-Frei85 
LOK |0 852   |a DE-Frei85 
LOK |0 852 1  |m p  |9 00 
LOK |0 938   |k p 
ORI |a SA-MARC-krimdoka001.raw