Télécharger le livre :  Discovering Hidden Gems in Foreign Languages
Ajouter à ma liste d'envies
This book offers a practical approach to conducting research in foreign languages on topics with a global nexus. It introduces the problem researchers face when getting started with a research problem, such as setting up the research environment and establishing goals...

Editeur : Springer
Parution : 2023-04-27
Collection : Terrorism, Security, and Computation
PDF, ePub

180,19
Télécharger le livre :  Detecting Trust and Deception in Group Interaction
Ajouter à ma liste d'envies
This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings.This book develops statistical results linking different types of facial...

Editeur : Springer
Parution : 2021-02-07
Collection : Terrorism, Security, and Computation
PDF, ePub

105,99
Télécharger le livre :  A Machine Learning Based Model of Boko Haram
Ajouter à ma liste d'envies
This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram’s behavior and...

Editeur : Springer
Parution : 2020-12-11
Collection : Terrorism, Security, and Computation
PDF, ePub

137,79
Télécharger le livre :  Anomaly Detection Principles and Algorithms
Ajouter à ma liste d'envies
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and...

Editeur : Springer
Parution : 2017-11-18
Collection : Terrorism, Security, and Computation
PDF, ePub

95,39
Télécharger le livre :  Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Ajouter à ma liste d'envies
This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the...

Editeur : Springer
Parution : 2017-10-30
Collection : Terrorism, Security, and Computation
PDF, ePub

180,19
Télécharger le livre :  The Global Cyber-Vulnerability Report
Ajouter à ma liste d'envies
This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation...

Editeur : Springer
Parution : 2015-12-09
Collection : Terrorism, Security, and Computation
PDF, ePub

95,39
Télécharger le livre :  Violence in Nigeria
Ajouter à ma liste d'envies
This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative...

Editeur : Springer
Parution : 2015-03-03
Collection : Terrorism, Security, and Computation
ePub

52,99
Télécharger le livre :  Indian Mujahideen
Ajouter à ma liste d'envies
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for...

Editeur : Springer
Parution : 2013-11-09
Collection : Terrorism, Security, and Computation
ePub

95,39