Télécharger le livre :  Detecting Trust and Deception in Group Interaction

This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings.This book develops statistical results linking different types of facial...
Editeur : Springer
Parution : 2021-02-07
Collection : Terrorism, Security, and Computation
Format(s) : PDF, ePub
105,49

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  A Machine Learning Based Model of Boko Haram

This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram’s behavior and...
Editeur : Springer
Parution : 2020-12-11
Collection : Terrorism, Security, and Computation
Format(s) : PDF, ePub
137,14

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Anomaly Detection Principles and Algorithms

This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and...
Editeur : Springer
Parution : 2017-11-18
Collection : Terrorism, Security, and Computation
Format(s) : PDF, ePub
94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges

This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the...
Editeur : Springer
Parution : 2017-10-30
Collection : Terrorism, Security, and Computation
Format(s) : PDF, ePub
179,34

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Global Cyber-Vulnerability Report

This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation...
Editeur : Springer
Parution : 2015-12-09
Collection : Terrorism, Security, and Computation
Format(s) : PDF, ePub
94,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Violence in Nigeria

This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative...
Editeur : Springer
Parution : 2015-03-03
Collection : Terrorism, Security, and Computation
Format(s) : ePub
52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Indian Mujahideen

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for...
Editeur : Springer
Parution : 2013-11-09
Collection : Terrorism, Security, and Computation
Format(s) : ePub
94,94

Téléchargement immédiat
Dès validation de votre commande