![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Counterterrorism and Open Source Intelligence 2011
- Uffe Kock Wiil
:
Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks 2, Springer 2011, ISBN 978-3-7091-0387-6 - Uffe Kock Wiil
:
Counterterrorism and Open Source Intelligence: Models, Tools, Techniques, and Case Studies. 1-6
Models
- Alexander Gutfraind
:
Targeting by Transnational Terrorist Groups. 9-32 - David B. Skillicorn, M. A. J. Bourassa:
A Framework for Analyst Focus from Computed Significance. 33-47 - Gordon Woo:
Interdiction of Plots with Multiple Operatives. 49-59 - Roy Lindelauf
, Peter Borm, Herbert Hamers:
Understanding Terrorist Network Topologies and Their Resilience Against Disruption. 61-72 - Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, Mohammad A. Tayebi:
Co-offending Network Mining. 73-102
Tools and Techniques
- Paulo Shakarian, V. S. Subrahmanian:
Region-Based Geospatial Abduction with Counter-IED Applications. 105-142 - Alan Chia-Lung Chen, Shang Gao, Panagiotis Karampelas
, Reda Alhajj, Jon G. Rokne:
Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks. 143-158 - Christopher J. Rhodes:
The Use of Open Source Intelligence in the Construction of Covert Social Networks. 159-170 - (Withdrawn) A Novel Method to Analyze the Importance of Links in Terrorist Networks. 171-187
- Sara Aghakhani, Khaled Dawoud, Reda Alhajj, Jon G. Rokne:
A Global Measure for Estimating the Degree of Organization and Effectiveness of Individual Actors with Application to Terrorist Networks. 189-222 - James A. Danowski:
Counterterrorism Mining for Individuals Semantically-Similar to Watchlist Members. 223-247 - Sarwat Nizamani
, Nasrullah Memon, Uffe Kock Wiil
:
Detection of Illegitimate Emails Using Boosting Algorithm. 249-264 - Sarwat Nizamani
, Nasrullah Memon, Uffe Kock Wiil
:
Cluster Based Text Classification Model. 265-283 - Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon G. Rokne, Douglas J. Demetrick, Mick J. Ridley, Reda Alhajj:
Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer Biomarkers. 285-313
Case Studies
- Hsinchun Chen:
From Terrorism Informatics to Dark Web Research. 317-341 - Fatih Özgül
, Ahmet Çelik, Claus Atzenbeck, Nadir Gergin:
Investigating Terrorist Attacks Using CDR Data: A Case Study. 343-354 - Martin Atkinson, Jakub Piskorski, Erik Van der Goot, Roman Yangarber
:
Multilingual Real-time Event Extraction for Border Security Intelligence Gathering. 355-390 - Federico Neri, Carlo Aliprandi, Furio Camillo:
Mining the Web to Monitor the Political Consensus. 391-412 - (Withdrawn) Exploring the Evolution of Terrorist Networks. 413-427
Alternative Perspective
- Robert David Steele:
The Ultimate Hack: Re-inventing Intelligence to Re-engineer Earth. 431-458
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.