نتایج جستجو برای: counter terrorist
تعداد نتایج: 45045 فیلتر نتایج به سال:
Hidden terrorist cells in high dimensional communications networks arise when terrorists camouflage connectivity to appear randomly connected to the background network. We investigate hidden network detectability when the background network does not support terrorist activities. Using two September 11 terrorist networks as the test bed and a network measure called assortativity, we suggest hidd...
The advisory feasibility of Social Network Analysis (SNA) to study social networks have encouraged the law enforcement and security agencies to investigate the terrorist network and its behavior along with key players hidden in the web. The study of the terrorist network, utilizing SNA approach and Graph Theory where the network is visualized as a graph, is termed as Investigative Data Mining o...
Many models have been developed to study homeland security games between governments (defender) and terrorists (attacker, adversary, enemy), with the limiting assumption of the terrorists being rational or strategic. In this paper, we develop a novel hybrid model in which a centralized government allocates defensive resources among multiple potential targets to minimize total expected loss, in ...
The paper describes risk-informed decision support for assessing the costs and benefits of counter-terrorism (CT) protective measures for infrastructure. Such a decision support framework needs to consider threat scenarios and probabilities, value of human life, physical (direct) damage, indirect damage, risk reduction and protective measure costs. Probabilistic terrorism risk assessments that ...
The paper presents an application of temporal knowledge representation and reasoning techniques to forensic analysis, especially in answering certain investigative questions relating to time-sensitive information about a terrorist activity. A brief introduction to a temporal formalism called Point-Interval Logic is presented. A set of temporal facts is taken from the London bombing incident tha...
A growing body of evidence suggests that uncertainty is counter cyclical, rising sharply in recessions and falling in booms. But what is the causal relationship between uncertainty and growth? To identify this we construct cross country panel data on stock market levels and volatility as proxies for the first and second moments of business conditions. We then use natural disasters, terrorist at...
A growing body of evidence suggests that uncertainty is counter cyclical, rising sharply in recessions and falling in booms. But what is the causal relationship between uncertainty and growth? To identify this we construct cross country panel data on stock market levels and volatility as proxies for the first and second moments of business conditions. We then use natural disasters, terrorist at...
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we increment...
Many facility and infrastructure Central Monitoring Systems have functions that relate to the protection and resilience of critical infrastructure protection and resilience. Issues of concern include terrorist threats. To counter such threats, use is made of defensive layers which include biometrics, smart cards, CCTV and perimeter screening. There is much interest in virtual training and crisi...
The article discusses measures to counter terrorist threats in social networks and instant messengers. It is emphasized that the modern form of communication using digital technologies has started be actively used by organizations for recruiting supporters, raising funds, preparing attacks. analyzes German (Act on Improving Law Enforcement Social Networks) Chinese (Chinese Great Firewall) exper...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید