000 05554cam a22006018i 4500
001 on1230253907
003 OCoLC
005 20220711203637.0
006 m o d
007 cr |||||||||||
008 210106s2021 nju ob 001 0 eng
010 _a 2021000197
040 _aDLC
_beng
_erda
_cDLC
_dOCLCO
_dDG1
_dUKAHL
_dOCLCF
020 _a9781119711629
_q(electronic bk. : oBook)
020 _a1119711622
_q(electronic bk. : oBook)
020 _a9781119711513
_q(epub)
020 _a1119711517
_q(epub)
020 _a9781119711612
_q(adobe pdf)
020 _a1119711614
_q(adobe pdf)
020 _z9781119711094
_q(paperback)
035 _a(OCoLC)1230253907
042 _apcc
050 0 0 _aHV6431
082 0 0 _a363.325/1702856312
_223
049 _aMAIN
245 0 0 _aIntelligent data analytics for terror threat prediction :
_barchitectures, methodologies, techniques and applications /
_cSubhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang.
250 _aFirst edition.
263 _a2104
264 1 _aHoboken :
_bWiley,
_c2021.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bn
_2rdamedia
338 _aonline resource
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a"Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis. The aim of data analytics is to prevent threats before they happen using classical statistical issues, machine learning, artificial intelligence, rule induction methods, neural networks, fuzzy logic, and stochastic search methods on various data sources, including social media, GPS devices, video feed from street cameras; and license plate readers, travel and credit card records and the news media, as well as government and proprietary systems. Intelligent data analytics ensures efficient data mining techniques to solve criminal investigations. Prediction of future terrorist attacks according to city, type of attack, target and weapon, claim mode, and motive for attack through classification techniques will facilitate the decision-making process of security organizations so as to learn from previously stored attack information; and then rate the targeted sectors/areas accordingly for security measures. By using intelligent data analytics models with multiple levels of representation, raw to higher abstract level representation can be learned at each level of the system. Algorithms based on intelligent data analytics have demonstrated great performance in a variety of areas, including data visualization, data pre-processing (fusion, editing, transformation, filtering, and sampling), data engineering, database mining techniques, tools and applications, etc"--
_cProvided by publisher.
505 0 _aRumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media / Ravi Kishore Devarapalli, Anupam Biswas -- Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction / Jaiprakash Narain Dwivedi -- Crime Predictive Model Using Big Data Analytics / Hemanta Kumar Bhuyan, Subhendu Kumar Pani -- The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks / Sushobhan Majumdar -- Text Mining for Secure Cyber Space / Supriya Raheja, Geetika Munjal -- Analyses on Artificial Intelligence Framework to Detect Crime Pattern / R Arshath Raja, N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes / Ebrahim AM Alrahawe, Vikas T Humbe, GN Shinde -- Rule-Based Approach for Botnet Behavior Analysis / Supriya Raheja, Geetika Munjal, Jyoti Jangra, Rakesh Garg -- Securing Biometric Framework with Cryptanalysis / Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, Martin Sagayam -- The Role of Big Data Analysis in Increasing the Crime Prediction and Prevention Rates / Galal A AL-Rummana, Abdulrazzaq H A Al-Ahdal, GN Shinde -- Crime Pattern Detection Using Data Mining / Dipalika Das, Maya Nayak -- Attacks and Security Measures in Wireless Sensor Network / Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, Aditya Khamparia -- Large Sensing Data Flows Using Cryptic Techniques / Hemanta Kumar Bhuyan -- Cyber-Crime Prevention Methodology / Chandra Sekhar Biswal, Subhendu Kumar Pani.
588 _aDescription based on print version record and CIP data provided by publisher; resource not viewed.
590 _bWiley Frontlist Obook All English 2021
650 0 _aTerrorism
_xPrevention.
_99572
650 0 _aComputer networks.
_93740
650 0 _aData mining.
_93907
650 7 _aComputer networks.
_2fast
_0(OCoLC)fst00872297
_93740
650 7 _aData mining.
_2fast
_0(OCoLC)fst00887946
_93907
650 7 _aTerrorism
_xPrevention.
_2fast
_0(OCoLC)fst01148123
_99572
655 4 _aElectronic books.
_93294
700 1 _aPani, Subhendu Kumar,
_d1980-
_eeditor.
_99573
700 1 _aSingh, Sanjay Kumar,
_d1963-
_eeditor.
_99574
700 1 _aGarg, Lalit,
_d1977-
_eeditor.
_99575
776 0 8 _iPrint version:
_tIntelligent data analytics for terror threat prediction
_bFirst edition.
_dHoboken : Wiley, 2021.
_z9781119711094
_w(DLC) 2021000196
856 4 0 _uhttps://doi.org/10.1002/9781119711629
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c69439
_d69439