Counterterrorism and open source intelligence
"Presents state-of-the-art research and practice in intelligence work. Describes novel tools and techniques for counterterrorism and open source intelligence. Provides perspectives on the future uses of open source intelligence. Since the 9/11 terrorist attacks in the United States, serious co...
Otros Autores: | |
---|---|
Tipo de documento: | Print Libro |
Lenguaje: | Inglés |
Publicado: |
Wien [u.a.]
Springer
2011
|
En: |
Lecture notes in social networks (2)
Año: 2011 |
Acceso en línea: |
Portada Inhaltsverzeichnis (Verlag) Verlagsangaben (Verlag) |
Verificar disponibilidad: | HBZ Gateway |
Servicio de pedido Subito: | Pedir ahora. |
Palabras clave: | |
Publicación relacionada: | Online-Ausg.:
165097373X |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 666037191 | ||
003 | DE-627 | ||
005 | 20220710130401.0 | ||
007 | tu | ||
008 | 110816s2011 au ||||| 00| ||eng c | ||
010 | |a 2011931775 | ||
016 | 7 | |a 015664896 |2 UK | |
020 | |a 3709103878 |c £90.00 (hbk.) |9 3-7091-0387-8 | ||
020 | |a 9783709103876 |c : £90.00 (hbk.) |9 978-3-7091-0387-6 | ||
035 | |a (DE-627)666037191 | ||
035 | |a (DE-576)347976433 | ||
035 | |a (DE-599)OBVAC08594197 | ||
035 | |a (OCoLC)690089099 | ||
035 | |a (OCoLC)870325674 | ||
035 | |a (AT-OBV)AC08594197 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XA-AT |c XD-US | ||
050 | 0 | |a HV6431 | |
082 | 0 | |a 363.325/17 |q LOC |2 23 | |
082 | 0 | |a 363.325 | |
084 | |a MD 8920 |q OBV |2 rvk |0 (DE-625)rvk/122569: | ||
084 | |a MF 9500 |q OBV |2 rvk |0 (DE-625)rvk/122811: | ||
084 | |a PH 8760 |q OBV |2 rvk |0 (DE-625)rvk/136518: | ||
084 | |a ST 276 |2 rvk |0 (DE-625)rvk/143642: | ||
084 | |a 89.58 |2 bkl | ||
084 | |a 89.86 |2 bkl | ||
245 | 1 | 0 | |a Counterterrorism and open source intelligence |c Uffe Kock Wiil, ed. |
264 | 1 | |a Wien [u.a.] |b Springer |c 2011 | |
300 | |a XVIII, 458 S. |b Ill., graph. Darst., Kt | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in social networks |v 2 | |
505 | 8 | 0 | |t Counterterrorism and open source intelligence models, tools, techniques, and case studies |r Uffe Kock Wiil |
505 | 8 | 0 | |t Counterterrorism and open source intelligence models, tools, techniques, and case studies |r Uffe Kock Wiil |
505 | 8 | 0 | |t Targeting by transnational terrorist groups |r Alexander Gutfraind |
505 | 8 | 0 | |t A framework for analyst focus from computed significance |r David Skillicorn and M.A.J. Bourassa |
505 | 8 | 0 | |t Interdiction of plots with multiple operatives |r Gordon Woo |
505 | 8 | 0 | |t Understanding terrorists network topologies and their resilience against disruption |r Roy Lindelauf, Peter Borm, and Herbert Hamers |
505 | 8 | 0 | |t Co-offending network mining |r Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, and Mohammad A. Tayebi |
505 | 8 | 0 | |t Religion-based geospatial abduction with counter-IED applications |r Paulo Shakarian and V.S. Subrahmanian |
505 | 8 | 0 | |t Finding hidden links in terrorist networks by checking indirect links of different sub-networks |r Alan Chen, Shag Gao, Panagiotis Karampelas, Reda Alhajj, and Jon Rokne |
505 | 8 | 0 | |t The use of open source intelligence in the construction of covert social networks |r Christopher J. Rhodes |
505 | 8 | 0 | |t A novel method to analyze the importance of links in terrorist networks |r Uffe Kock Wiil, Jolanta Gniadek, and Nasrullah Memon |
505 | 8 | 0 | |t A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks |r Sara Aghakhani, Khaled Dawoud, Reda Alhajj, and Jon Rokne |
505 | 8 | 0 | |t Counterterrorism mining for individuals semantically-similar to watchlist members |r James A. Danowski |
505 | 8 | 0 | |t Detection of illegitimate emails using boosting algorithm |r Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil |
505 | 8 | 0 | |t Cluster based text classification model |r Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil |
505 | 8 | 0 | |t Effectiveness of social networks for studying biological agents and identifying cancer biomarkers |r Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon Rokne, douglas Demetrick, Mick Ridley, and Reda alhajj |
505 | 8 | 0 | |t From terrorism informatics to dark web research |r Hsinchun Chen |
505 | 8 | 0 | |t Investigating terrorist attacks using CDR data : a case study |r Faith Ozgul, Ahmet Celik, Claus Atzenbeck, and Nadir Gergin |
505 | 8 | 0 | |t Multilingual real-time event extraction for border security intelligence gathering |r Martin Atkinson, Jakub Piskorski, Erik van der Goot, and Roman Yangarber |
505 | 8 | 0 | |t Mining the web to monitor the political consensus |r Federico Neri, Carlo Aliprandi, and Furio Camillo |
505 | 8 | 0 | |t Exploring the evolution of terrorist networks |r Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, and Panagiotis Karampelas |
505 | 8 | 0 | |t The ultimate hack : re-inventing intelligence to re-engineer earth |r Robert David Steele. |
505 | 8 | 0 | |t Targeting by transnational terrorist groups |r Alexander Gutfraind |
505 | 8 | 0 | |t A framework for analyst focus from computed significance |r David Skillicorn and M.A.J. Bourassa |
505 | 8 | 0 | |t Interdiction of plots with multiple operatives |r Gordon Woo |
505 | 8 | 0 | |t Understanding terrorists network topologies and their resilience against disruption |r Roy Lindelauf, Peter Borm, and Herbert Hamers |
505 | 8 | 0 | |t Co-offending network mining |r Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, and Mohammad A. Tayebi |
505 | 8 | 0 | |t Religion-based geospatial abduction with counter-IED applications |r Paulo Shakarian and V.S. Subrahmanian |
505 | 8 | 0 | |t Finding hidden links in terrorist networks by checking indirect links of different sub-networks |r Alan Chen, Shag Gao, Panagiotis Karampelas, Reda Alhajj, and Jon Rokne |
505 | 8 | 0 | |t The use of open source intelligence in the construction of covert social networks |r Christopher J. Rhodes |
505 | 8 | 0 | |t A novel method to analyze the importance of links in terrorist networks |r Uffe Kock Wiil, Jolanta Gniadek, and Nasrullah Memon |
505 | 8 | 0 | |t A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks |r Sara Aghakhani, Khaled Dawoud, Reda Alhajj, and Jon Rokne |
505 | 8 | 0 | |t Counterterrorism mining for individuals semantically-similar to watchlist members |r James A. Danowski |
505 | 8 | 0 | |t Detection of illegitimate emails using boosting algorithm |r Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil |
505 | 8 | 0 | |t Cluster based text classification model |r Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil |
505 | 8 | 0 | |t Effectiveness of social networks for studying biological agents and identifying cancer biomarkers |r Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon Rokne, douglas Demetrick, Mick Ridley, and Reda alhajj |
505 | 8 | 0 | |t From terrorism informatics to dark web research |r Hsinchun Chen |
505 | 8 | 0 | |t Investigating terrorist attacks using CDR data : a case study |r Faith Ozgul, Ahmet Celik, Claus Atzenbeck, and Nadir Gergin |
505 | 8 | 0 | |t Multilingual real-time event extraction for border security intelligence gathering |r Martin Atkinson, Jakub Piskorski, Erik van der Goot, and Roman Yangarber |
505 | 8 | 0 | |t Mining the web to monitor the political consensus |r Federico Neri, Carlo Aliprandi, and Furio Camillo |
505 | 8 | 0 | |t Exploring the evolution of terrorist networks |r Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, and Panagiotis Karampelas |
505 | 8 | 0 | |t The ultimate hack : re-inventing intelligence to re-engineer earth |r Robert David Steele. |
520 | |a "Presents state-of-the-art research and practice in intelligence work. Describes novel tools and techniques for counterterrorism and open source intelligence. Provides perspectives on the future uses of open source intelligence. Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities." --Publisher's website | ||
650 | 0 | |a Terrorism |x Prevention | |
650 | 0 | |a Open source intelligence | |
650 | 0 | |a Data mining in law enforcement | |
650 | 0 | |a Terrorism |x Prevention |x Data processing | |
650 | 0 | |a Terrorism |x Prevention |x Simulation methods | |
653 | 4 | |a Terrorism |a Prevention |a Computer network resources | |
653 | 4 | |a Open source intelligence | |
689 | 0 | 0 | |d s |0 (DE-588)4059534-1 |0 (DE-627)106143212 |0 (DE-576)209131136 |a Terrorismus |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4112701-8 |0 (DE-627)104321679 |0 (DE-576)209470127 |a Bekämpfung |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4037877-9 |0 (DE-627)106235079 |0 (DE-576)209027029 |a Massenmedien |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4019737-2 |0 (DE-627)106320548 |0 (DE-576)208930477 |a Geheimdienst |2 gnd |
689 | 0 | 4 | |d s |0 (DE-588)4122795-5 |0 (DE-627)10449350X |0 (DE-576)209554304 |a Analyse |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Wiil, Uffe Kock |e Hrsg. |0 (DE-627)1257502433 |0 (DE-576)187502439 |4 edt | |
776 | 1 | |z 9783709103883 | |
776 | 0 | 8 | |i Online-Ausg. |a Wiil, Uffe Kock |t Counterterrorism and Open Source Intelligence |d Vienna : Springer-Verlag/Wien, 2011 |h Online-Ressource (XVIII, 458p. 182 illus., 56 illus. in color, digital) |w (DE-627)165097373X |w (DE-576)347113753 |z 9783709103883 |
830 | 0 | |a Lecture notes in social networks |v 2 |9 2 |w (DE-627)641890052 |w (DE-576)349685703 |w (DE-600)2585426-4 |x 2190-5428 |7 ns | |
856 | 4 | 2 | |u http://www.loc.gov/catdir/enhancements/fy1305/2011931775-d.html |x Verlag |3 Verlagsangaben |
856 | 4 | 2 | |u http://www.loc.gov/catdir/enhancements/fy1305/2011931775-t.html |x Verlag |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz347976433cov.jpg |m V:DE-576 |m X:springer |q image/jpeg |v 20150402152508 |3 Cover |
935 | |a mkri | ||
935 | |i Blocktest | ||
936 | r | v | |a MD 8920 |b Terror, Gewalt, Mord |k Politische Theorie, Grundbegriffe des Politischen |k Politische Auseinandersetzung |k Terror, Gewalt, Mord |0 (DE-627)1271426560 |0 (DE-625)rvk/122569: |0 (DE-576)201426560 |
936 | r | v | |a MF 9500 |b Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst) |k Politische Systeme: einzelne Elemente |k Politische Sachgebiete |k Innere Sicherheit (Polizei, Verfassungsschutz, Geheimdienst) |0 (DE-627)1271205475 |0 (DE-625)rvk/122811: |0 (DE-576)201205475 |
936 | r | v | |a PH 8760 |b Raub; Erpressung; Geiselnahme; Luftpiraterie; Politisch motivierte Gewaltverbrechen; Terrorismus; Gewalt gegen Ausländer |k Strafrecht, Strafverfahrensrecht, Kriminologie |k Kriminologie |k Einzelne Deliktsgruppen |k Gewaltkriminalität, Gewaltdelikt |k Raub; Erpressung; Geiselnahme; Luftpiraterie; Politisch motivierte Gewaltverbrechen; Terrorismus; Gewalt gegen Ausländer |0 (DE-627)1271914344 |0 (DE-625)rvk/136518: |0 (DE-576)201914344 |
936 | r | v | |a ST 276 |b Datensicherung (physik.) und angewandte Kryptographie, Computerviren |k Monografien |k Software und -entwicklung |k Datensicherung (physik.) und angewandte Kryptographie, Computerviren |0 (DE-627)127148207X |0 (DE-625)rvk/143642: |0 (DE-576)20148207X |
936 | b | k | |a 89.58 |j Politische Gewalt |0 (DE-627)106416960 |
936 | b | k | |a 89.86 |j Nachrichtendienste |j militärische Nachrichtendienste |0 (DE-627)106413619 |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3163054544 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 666037191 | ||
LOK | |0 005 20110830143500 | ||
LOK | |0 008 110729||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw |