In a world in which, since the fall of Twin Towers in New York on 9/11/2001, local ideologically inspired warfare becomes global all too quickly, terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to disperse their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity.This study employs data mining tools to mine Twitter for terrorist ‘organizing’ vocabulary and to pinpoint, through the analysis of (admittedly spares) tweet metadata, the most likely geographical location and connected identities behind the user accounts from which organizing or post-event information is disseminated.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In a world in which, since the fall of Twin Towers in New York on 9/11/2001, local ideologically inspired warfare becomes global all too quickly, terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to disperse their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity.This study employs data mining tools to mine Twitter for terrorist 'organizing' vocabulary and to pinpoint, through the analysis of (admittedly spares) tweet metadata, the most likely geographical location and connected identities behind the user accounts from which organizing or post-event information is disseminated. 100 pp. Englisch. N° de réf. du vendeur 9783659932243
Quantité disponible : 2 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26394692096
Quantité disponible : 4 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 401684959
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18394692106
Quantité disponible : 4 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. N° de réf. du vendeur 158125417
Quantité disponible : Plus de 20 disponibles
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 100 pages. 8.66x5.91x0.23 inches. In Stock. N° de réf. du vendeur 3659932248
Quantité disponible : 1 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. Neuware -In a world in which, since the fall of Twin Towers in New York on 9/11/2001, local ideologically inspired warfare becomes global all too quickly, terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to disperse their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity.This study employs data mining tools to mine Twitter for terrorist ¿organizing¿ vocabulary and to pinpoint, through the analysis of (admittedly spares) tweet metadata, the most likely geographical location and connected identities behind the user accounts from which organizing or post-event information is disseminated.Books on Demand GmbH, Überseering 33, 22297 Hamburg 100 pp. Englisch. N° de réf. du vendeur 9783659932243
Quantité disponible : 2 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In a world in which, since the fall of Twin Towers in New York on 9/11/2001, local ideologically inspired warfare becomes global all too quickly, terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to disperse their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity.This study employs data mining tools to mine Twitter for terrorist 'organizing' vocabulary and to pinpoint, through the analysis of (admittedly spares) tweet metadata, the most likely geographical location and connected identities behind the user accounts from which organizing or post-event information is disseminated. N° de réf. du vendeur 9783659932243
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. Identifying Terrorist Affiliations through Social Network Analysis | Using Data Mining Techniques | Govand Ali | Taschenbuch | 100 S. | Englisch | 2016 | LAP LAMBERT Academic Publishing | EAN 9783659932243 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. N° de réf. du vendeur 103169819
Quantité disponible : 5 disponible(s)
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
paperback. Etat : New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book. N° de réf. du vendeur ERICA82936599322486
Quantité disponible : 1 disponible(s)