Intelligent data analytics for terror threat prediction : (Record no. 69439)

000 -LEADER
fixed length control field 05554cam a22006018i 4500
001 - CONTROL NUMBER
control field on1230253907
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203637.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210106s2021 nju ob 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119711629
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119711622
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119711513
-- (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119711517
-- (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119711612
-- (adobe pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119711614
-- (adobe pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- (paperback)
082 00 - CLASSIFICATION NUMBER
Call Number 363.325/1702856312
245 00 - TITLE STATEMENT
Title Intelligent data analytics for terror threat prediction :
Sub Title architectures, methodologies, techniques and applications /
250 ## - EDITION STATEMENT
Edition statement First edition.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource
520 ## - SUMMARY, ETC.
Summary, etc "Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis. The aim of data analytics is to prevent threats before they happen using classical statistical issues, machine learning, artificial intelligence, rule induction methods, neural networks, fuzzy logic, and stochastic search methods on various data sources, including social media, GPS devices, video feed from street cameras; and license plate readers, travel and credit card records and the news media, as well as government and proprietary systems. Intelligent data analytics ensures efficient data mining techniques to solve criminal investigations. Prediction of future terrorist attacks according to city, type of attack, target and weapon, claim mode, and motive for attack through classification techniques will facilitate the decision-making process of security organizations so as to learn from previously stored attack information; and then rate the targeted sectors/areas accordingly for security measures. By using intelligent data analytics models with multiple levels of representation, raw to higher abstract level representation can be learned at each level of the system. Algorithms based on intelligent data analytics have demonstrated great performance in a variety of areas, including data visualization, data pre-processing (fusion, editing, transformation, filtering, and sampling), data engineering, database mining techniques, tools and applications, etc"--
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media / Ravi Kishore Devarapalli, Anupam Biswas -- Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction / Jaiprakash Narain Dwivedi -- Crime Predictive Model Using Big Data Analytics / Hemanta Kumar Bhuyan, Subhendu Kumar Pani -- The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks / Sushobhan Majumdar -- Text Mining for Secure Cyber Space / Supriya Raheja, Geetika Munjal -- Analyses on Artificial Intelligence Framework to Detect Crime Pattern / R Arshath Raja, N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes / Ebrahim AM Alrahawe, Vikas T Humbe, GN Shinde -- Rule-Based Approach for Botnet Behavior Analysis / Supriya Raheja, Geetika Munjal, Jyoti Jangra, Rakesh Garg -- Securing Biometric Framework with Cryptanalysis / Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, Martin Sagayam -- The Role of Big Data Analysis in Increasing the Crime Prediction and Prevention Rates / Galal A AL-Rummana, Abdulrazzaq H A Al-Ahdal, GN Shinde -- Crime Pattern Detection Using Data Mining / Dipalika Das, Maya Nayak -- Attacks and Security Measures in Wireless Sensor Network / Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, Aditya Khamparia -- Large Sensing Data Flows Using Cryptic Techniques / Hemanta Kumar Bhuyan -- Cyber-Crime Prevention Methodology / Chandra Sekhar Biswal, Subhendu Kumar Pani.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Prevention.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Prevention.
700 1# - AUTHOR 2
Author 2 Pani, Subhendu Kumar,
700 1# - AUTHOR 2
Author 2 Singh, Sanjay Kumar,
700 1# - AUTHOR 2
Author 2 Garg, Lalit,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119711629
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken :
-- Wiley,
-- 2021.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- n
-- rdamedia
338 ## -
-- online resource
-- nc
-- rdacarrier
520 ## - SUMMARY, ETC.
-- Provided by publisher.
588 ## -
-- Description based on print version record and CIP data provided by publisher; resource not viewed.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Terrorism
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data mining.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks.
-- (OCoLC)fst00872297
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data mining.
-- (OCoLC)fst00887946
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Terrorism
-- (OCoLC)fst01148123
994 ## -
-- 92
-- DG1

No items available.