Intelligent data analytics for terror threat prediction : (Record no. 69439)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05554cam a22006018i 4500 |
001 - CONTROL NUMBER | |
control field | on1230253907 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711203637.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210106s2021 nju ob 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119711629 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119711622 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119711513 |
-- | (epub) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119711517 |
-- | (epub) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119711612 |
-- | (adobe pdf) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119711614 |
-- | (adobe pdf) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | (paperback) |
082 00 - CLASSIFICATION NUMBER | |
Call Number | 363.325/1702856312 |
245 00 - TITLE STATEMENT | |
Title | Intelligent data analytics for terror threat prediction : |
Sub Title | architectures, methodologies, techniques and applications / |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource |
520 ## - SUMMARY, ETC. | |
Summary, etc | "Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis. The aim of data analytics is to prevent threats before they happen using classical statistical issues, machine learning, artificial intelligence, rule induction methods, neural networks, fuzzy logic, and stochastic search methods on various data sources, including social media, GPS devices, video feed from street cameras; and license plate readers, travel and credit card records and the news media, as well as government and proprietary systems. Intelligent data analytics ensures efficient data mining techniques to solve criminal investigations. Prediction of future terrorist attacks according to city, type of attack, target and weapon, claim mode, and motive for attack through classification techniques will facilitate the decision-making process of security organizations so as to learn from previously stored attack information; and then rate the targeted sectors/areas accordingly for security measures. By using intelligent data analytics models with multiple levels of representation, raw to higher abstract level representation can be learned at each level of the system. Algorithms based on intelligent data analytics have demonstrated great performance in a variety of areas, including data visualization, data pre-processing (fusion, editing, transformation, filtering, and sampling), data engineering, database mining techniques, tools and applications, etc"-- |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media / Ravi Kishore Devarapalli, Anupam Biswas -- Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction / Jaiprakash Narain Dwivedi -- Crime Predictive Model Using Big Data Analytics / Hemanta Kumar Bhuyan, Subhendu Kumar Pani -- The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks / Sushobhan Majumdar -- Text Mining for Secure Cyber Space / Supriya Raheja, Geetika Munjal -- Analyses on Artificial Intelligence Framework to Detect Crime Pattern / R Arshath Raja, N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes / Ebrahim AM Alrahawe, Vikas T Humbe, GN Shinde -- Rule-Based Approach for Botnet Behavior Analysis / Supriya Raheja, Geetika Munjal, Jyoti Jangra, Rakesh Garg -- Securing Biometric Framework with Cryptanalysis / Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, Martin Sagayam -- The Role of Big Data Analysis in Increasing the Crime Prediction and Prevention Rates / Galal A AL-Rummana, Abdulrazzaq H A Al-Ahdal, GN Shinde -- Crime Pattern Detection Using Data Mining / Dipalika Das, Maya Nayak -- Attacks and Security Measures in Wireless Sensor Network / Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, Aditya Khamparia -- Large Sensing Data Flows Using Cryptic Techniques / Hemanta Kumar Bhuyan -- Cyber-Crime Prevention Methodology / Chandra Sekhar Biswal, Subhendu Kumar Pani. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Prevention. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Prevention. |
700 1# - AUTHOR 2 | |
Author 2 | Pani, Subhendu Kumar, |
700 1# - AUTHOR 2 | |
Author 2 | Singh, Sanjay Kumar, |
700 1# - AUTHOR 2 | |
Author 2 | Garg, Lalit, |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1002/9781119711629 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Hoboken : |
-- | Wiley, |
-- | 2021. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | n |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | nc |
-- | rdacarrier |
520 ## - SUMMARY, ETC. | |
-- | Provided by publisher. |
588 ## - | |
-- | Description based on print version record and CIP data provided by publisher; resource not viewed. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Terrorism |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data mining. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks. |
-- | (OCoLC)fst00872297 |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data mining. |
-- | (OCoLC)fst00887946 |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Terrorism |
-- | (OCoLC)fst01148123 |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.