Tous les ebooks de la collection "Terrorism, Security, and Computation" - Springer


8  résultat(s)
Télécharger le livre :  Discovering Hidden Gems in Foreign Languages
Ajouter à ma liste d'envies

Discovering Hidden Gems in Foreign Languages


M.D. Miller


This book offers a practical approach to conducting research in foreign languages on topics with a global nexus. It introduces the problem researchers face when getting started with a research problem, such as setting up the research environment and establishing goals...

Parution : 2023-04-27
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
179,34
Télécharger le livre :  Detecting Trust and Deception in Group Interaction
Ajouter à ma liste d'envies

Detecting Trust and Deception in Group Interaction


Judee K. Burgoon , Norah E. Dunbar , V. S. Subrahmanian


This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings.This book develops statistical results linking different types of facial...

Parution : 2021-02-07
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
105,49
Télécharger le livre :  A Machine Learning Based Model of Boko Haram
Ajouter à ma liste d'envies

A Machine Learning Based Model of Boko Haram


Jacob Bonen-Clark , James F. Brown , Chiara Pulice , V. S. Subrahmanian


This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram’s behavior and...

Parution : 2020-12-11
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
137,14
Télécharger le livre :  Anomaly Detection Principles and Algorithms
Ajouter à ma liste d'envies

Anomaly Detection Principles and Algorithms


Huaming Huang , Kishan G. Mehrotra , Chilukuri K. Mohan


This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and...

Parution : 2017-11-18
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
94,94
Télécharger le livre :  Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Ajouter à ma liste d'envies

Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges


Andrea Malizia , Maurizio Martellini


This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the...

Parution : 2017-10-30
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
179,34
Télécharger le livre :  The Global Cyber-Vulnerability Report
Ajouter à ma liste d'envies

The Global Cyber-Vulnerability Report


Tudor Dumitras , Michael Ovelgonne , Aditya Prakash , V.S. Subrahmanian


This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation...

Parution : 2015-12-09
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
94,94
Télécharger le livre :  Violence in Nigeria
Ajouter à ma liste d'envies

Violence in Nigeria


Nate Haken , Patricia Taft


This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative...

Parution : 2015-03-03
Format(s) : ePub
Éditeur : Springer
J'achète
52,74
Télécharger le livre :  Indian Mujahideen
Ajouter à ma liste d'envies

Indian Mujahideen


Aaron Mannes , R.K. Raghavan , Animesh Roul , V.S. Subrahmanian


Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for...

Parution : 2013-11-09
Format(s) : ePub
Éditeur : Springer
J'achète
94,94

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés