語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Machine learning techniques to predi...
~
Mostert, Laura.
FindBook
Google Book
Amazon
博客來
Machine learning techniques to predict terrorist attacks = exemplified by Jama'at Nasr al-Islam wal Muslimin /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Machine learning techniques to predict terrorist attacks/ by Laura Mostert ... [et al.].
其他題名:
exemplified by Jama'at Nasr al-Islam wal Muslimin /
其他作者:
Mostert, Laura.
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xv, 132 p. :ill. (some col.), digital ;24 cm.
內容註:
Chapter 1 Introduction -- Chapter 2 Jama'at Nasr al-Islam wal Muslimin (JNIM) -- Chapter 3 Temporal Probabilistic Rules and Policy Computation Algorithms -- Chapter 4 Abduction and Release of Abductees -- Chapter 5 Attacks on and Targeting of Public Sites -- Chapter 6 Targeting of Security Professionals and Security Installations -- Chapter 7 Targeting of Civilians -- Chapter 8 Other types of attacks -- Chapter 9 Reflections & Implications for military decision making.
Contained By:
Springer Nature eBook
標題:
Terrorism - Data processing. -
電子資源:
https://doi.org/10.1007/978-3-031-93174-1
ISBN:
9783031931741
Machine learning techniques to predict terrorist attacks = exemplified by Jama'at Nasr al-Islam wal Muslimin /
Machine learning techniques to predict terrorist attacks
exemplified by Jama'at Nasr al-Islam wal Muslimin /[electronic resource] :by Laura Mostert ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xv, 132 p. :ill. (some col.), digital ;24 cm. - Terrorism, security, and computation,2197-8786. - Terrorism, security, and computation..
Chapter 1 Introduction -- Chapter 2 Jama'at Nasr al-Islam wal Muslimin (JNIM) -- Chapter 3 Temporal Probabilistic Rules and Policy Computation Algorithms -- Chapter 4 Abduction and Release of Abductees -- Chapter 5 Attacks on and Targeting of Public Sites -- Chapter 6 Targeting of Security Professionals and Security Installations -- Chapter 7 Targeting of Civilians -- Chapter 8 Other types of attacks -- Chapter 9 Reflections & Implications for military decision making.
One of the most influential actors in spreading Islamist violence across the Sahel is Jama'at Nasr Al Islam Wal Muslimin (JNIM).This book provides the first systematic quantitative analysis of JNIM's behavior by analyzing a 12-year database of JNIM's attacks and the environment surrounding JNIM. This book leverages AI/ML predictive models to accurately predict almost 40 types of attacks using over 80 independent variables. This book describes a set of temporal probabilistic rules that state that when the environment in which the group operates satisfies some conditions, then an attack of a certain type will likely occur in the next N months. This provides a deep, easy to comprehend understanding of the conditions under which JNIM carries various kinds of attacks up to 6 months into the future. This book will serve as an invaluable guide to scholars (computer scientists, political scientists, policy makers). Military officers, intelligence personnel, and government employees, who seek to understand, predict, and eventually mitigate attacks by JNIM and bring peace to the nations of Mali, Burkina Faso, and Niger will want to purchase this book as well.
ISBN: 9783031931741
Standard No.: 10.1007/978-3-031-93174-1doiSubjects--Topical Terms:
907040
Terrorism
--Data processing.
LC Class. No.: HV6431
Dewey Class. No.: 363.3250285631
Machine learning techniques to predict terrorist attacks = exemplified by Jama'at Nasr al-Islam wal Muslimin /
LDR
:02801nmm a2200349 a 4500
001
2413291
003
DE-He213
005
20250702130248.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031931741
$q
(electronic bk.)
020
$a
9783031931734
$q
(paper)
024
7
$a
10.1007/978-3-031-93174-1
$2
doi
035
$a
978-3-031-93174-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV6431
072
7
$a
UYQM
$2
bicssc
072
7
$a
MAT029000
$2
bisacsh
072
7
$a
UYQM
$2
thema
082
0 4
$a
363.3250285631
$2
23
090
$a
HV6431
$b
.M149 2025
245
0 0
$a
Machine learning techniques to predict terrorist attacks
$h
[electronic resource] :
$b
exemplified by Jama'at Nasr al-Islam wal Muslimin /
$c
by Laura Mostert ... [et al.].
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xv, 132 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
338
$a
online resource
$b
cr
$2
rdacarrier
490
1
$a
Terrorism, security, and computation,
$x
2197-8786
505
0
$a
Chapter 1 Introduction -- Chapter 2 Jama'at Nasr al-Islam wal Muslimin (JNIM) -- Chapter 3 Temporal Probabilistic Rules and Policy Computation Algorithms -- Chapter 4 Abduction and Release of Abductees -- Chapter 5 Attacks on and Targeting of Public Sites -- Chapter 6 Targeting of Security Professionals and Security Installations -- Chapter 7 Targeting of Civilians -- Chapter 8 Other types of attacks -- Chapter 9 Reflections & Implications for military decision making.
520
$a
One of the most influential actors in spreading Islamist violence across the Sahel is Jama'at Nasr Al Islam Wal Muslimin (JNIM).This book provides the first systematic quantitative analysis of JNIM's behavior by analyzing a 12-year database of JNIM's attacks and the environment surrounding JNIM. This book leverages AI/ML predictive models to accurately predict almost 40 types of attacks using over 80 independent variables. This book describes a set of temporal probabilistic rules that state that when the environment in which the group operates satisfies some conditions, then an attack of a certain type will likely occur in the next N months. This provides a deep, easy to comprehend understanding of the conditions under which JNIM carries various kinds of attacks up to 6 months into the future. This book will serve as an invaluable guide to scholars (computer scientists, political scientists, policy makers). Military officers, intelligence personnel, and government employees, who seek to understand, predict, and eventually mitigate attacks by JNIM and bring peace to the nations of Mali, Burkina Faso, and Niger will want to purchase this book as well.
650
0
$a
Terrorism
$x
Data processing.
$3
907040
650
0
$a
Terrorism
$x
Prevention
$x
Data processing.
$3
3789236
650
0
$a
Machine learning.
$3
533906
650
1 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Military and Defence Studies.
$3
2181953
650
2 4
$a
Terrorism and Political Violence.
$3
2182328
700
1
$a
Mostert, Laura.
$3
3789235
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Terrorism, security, and computation.
$3
2139163
856
4 0
$u
https://doi.org/10.1007/978-3-031-93174-1
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9518746
電子資源
11.線上閱覽_V
電子書
EB HV6431
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入