Counter-Terrorism Capability: Preventing Radiological Threats
نویسندگان
چکیده
منابع مشابه
Radiological Terrorism
We run the risk that terrorists will decide to detonate an explosive device laced with radioactive materials (a radiological dispersal device, or RDD). If such an attack occurs, it is unlikely that the affected population or emergency responders would be exposed to high levels of external radiation, although airborne radionuclides may present a health risk under some circumstances. However, the...
متن کاملPreventing Terrorism by Combating Financial Resources
Terrorism is an offensive action which violates human rights and always invades to people’s rights. Given the high incidence of this type of global action and the widespread violations of human rights and peace and security, countering terrorism will be important. The existence of financial resources is an essential element of terrorism and Preemptive measures and their success in blocking fina...
متن کاملData Mining for Counter-Terrorism
Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...
متن کاملA Neural Network for Counter-Terrorism
This article presents findings concerned with the use of neural networks in the identification of deceptive behaviour. A game designed by psychologists and criminologists was used for the generation of data used to test the appropriateness of different AI techniques in the quest for counter-terrorism. A feed forward back propagation network was developed and subsequent neural network experiment...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Connections: The Quarterly Journal
سال: 2005
ISSN: 1812-1098
DOI: 10.11610/connections.04.2.08