Mathematical Methods for Destabilizing Terrorist Activities
Methods and Practical Algorithms for Analysis and Visualization
Memon, Nasrullah, Wiil, Uffe (Eds.)
2014, 300 p. 30 illus. in color.
Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
digitally watermarked, no DRM
The eBook version of this title will be available soon
Shows how mathematics and computer science can be utilized to counteract terrorism
Provides new algorithms for finding direct and indirect relations in networks
Features contributions from leading counterterrorism experts who offer their views and strategies on the topic
Combines theoretical and practical aspects with case studies
Offers a tool-box for Intelligence and Law Enforcement agencies
The primary objective of this research is to develop the underlying theory and associated methodologies used to generate and analyze terrorist networks and propose mathematical methods and practical algorithms for destabilizing these adversaries. It aims to
develop a new centrality-like measure, via extensions of several others in use to screen networks for agents of interest. Presents the theoretical bases that make this measure more amenable to terrorist networks, and their advantages. Provides a theory of detecting command structures of terrorist networks. The algorithms for detecting hidden hierarchy of terrorist network are discussed. Results of command structure obtained by using new algorithms and other centralities with related SNA literature like N-Clique, K-Core, etc. are compared. Includes new algorithms for finding direct and indirect relations in a network. Combines the most promising techniques into a prototype tool-set to assist intelligence agencies / law enforcement and others.