Intelligent data analytics for terror threat prediction: architectures, methodologies, techniques and applications
Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken
Wiley
2021
|
Ausgabe: | First edition |
Schlagwörter: | |
Links: | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629 https://doi.org/10.1002/9781119711629 https://doi.org/10.1002/9781119711629 https://doi.org/10.1002/9781119711629 |
Abstract: | Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media / Ravi Kishore Devarapalli, Anupam Biswas -- Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction / Jaiprakash Narain Dwivedi -- Crime Predictive Model Using Big Data Analytics / Hemanta Kumar Bhuyan, Subhendu Kumar Pani -- The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks / Sushobhan Majumdar -- Text Mining for Secure Cyber Space / Supriya Raheja, Geetika Munjal -- Analyses on Artificial Intelligence Framework to Detect Crime Pattern / R Arshath Raja, N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes / Ebrahim AM Alrahawe, Vikas T Humbe, GN Shinde -- Rule-Based Approach for Botnet Behavior Analysis / Supriya Raheja, Geetika Munjal, Jyoti Jangra, Rakesh Garg -- Securing Biometric Framework with Cryptanalysis / Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, Martin Sagayam -- The Role of Big Data Analysis in Increasing the Crime Prediction and Prevention Rates / Galal A AL-Rummana, Abdulrazzaq H A Al-Ahdal, GN Shinde -- Crime Pattern Detection Using Data Mining / Dipalika Das, Maya Nayak -- Attacks and Security Measures in Wireless Sensor Network / Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, Aditya Khamparia -- Large Sensing Data Flows Using Cryptic Techniques / Hemanta Kumar Bhuyan -- Cyber-Crime Prevention Methodology / Chandra Sekhar Biswal, Subhendu Kumar Pani "Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis. The aim of data analytics is to prevent threats before they happen using classical statistical issues, machine learning, artificial intelligence, rule induction methods, neural networks, fuzzy logic, and stochastic search methods on various data sources, including social media, GPS devices, video feed from street cameras; and license plate readers, travel and credit card records and the news media, as well as government and proprietary systems. Intelligent data analytics ensures efficient data mining techniques to solve criminal investigations. Prediction of future terrorist attacks according to city, type of attack, target and weapon, claim mode, and motive for attack through classification techniques will facilitate the decision-making process of security organizations so as to learn from previously stored attack information; and then rate the targeted sectors/areas accordingly for security measures. By using intelligent data analytics models with multiple levels of representation, raw to higher abstract level representation can be learned at each level of the system. Algorithms based on intelligent data analytics have demonstrated great performance in a variety of areas, including data visualization, data pre-processing (fusion, editing, transformation, filtering, and sampling), data engineering, database mining techniques, tools and applications, etc"-- |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource |
ISBN: | 9781119711629 1119711622 9781119711513 1119711517 9781119711612 1119711614 |
DOI: | 10.1002/9781119711629 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV047840162 | ||
003 | DE-604 | ||
005 | 20221128 | ||
007 | cr|uuu---uuuuu | ||
008 | 220216s2021 xxu o|||| 00||| eng d | ||
020 | |a 9781119711629 |c electronic bk. : oBook |9 978-1-119-71162-9 | ||
020 | |a 1119711622 |c electronic bk. : oBook |9 1-119-71162-2 | ||
020 | |a 9781119711513 |c epub |9 978-1-119-71151-3 | ||
020 | |a 1119711517 |c epub |9 1-119-71151-7 | ||
020 | |a 9781119711612 |c adobe pdf |9 978-1-119-71161-2 | ||
020 | |a 1119711614 |c adobe pdf |9 1-119-71161-4 | ||
024 | 7 | |a 10.1002/9781119711629 |2 doi | |
035 | |a (ZDB-35-WIC)9781119711629 | ||
035 | |a (OCoLC)1298743290 | ||
035 | |a (DE-599)KEP061933724 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-706 |a DE-Aug4 |a DE-858 | ||
050 | 0 | |a HV6431 | |
082 | 0 | |a 363.325/1702856312 | |
245 | 1 | 0 | |a Intelligent data analytics for terror threat prediction |b architectures, methodologies, techniques and applications |c Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang |
250 | |a First edition | ||
264 | 1 | |a Hoboken |b Wiley |c 2021 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media / Ravi Kishore Devarapalli, Anupam Biswas -- Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction / Jaiprakash Narain Dwivedi -- Crime Predictive Model Using Big Data Analytics / Hemanta Kumar Bhuyan, Subhendu Kumar Pani -- The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks / Sushobhan Majumdar -- Text Mining for Secure Cyber Space / Supriya Raheja, Geetika Munjal -- Analyses on Artificial Intelligence Framework to Detect Crime Pattern / R Arshath Raja, N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes / Ebrahim AM Alrahawe, Vikas T Humbe, GN Shinde -- Rule-Based Approach for Botnet Behavior Analysis / Supriya Raheja, Geetika Munjal, Jyoti Jangra, Rakesh Garg -- Securing Biometric Framework with Cryptanalysis / Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, Martin Sagayam -- The Role of Big Data Analysis in Increasing the Crime Prediction and Prevention Rates / Galal A AL-Rummana, Abdulrazzaq H A Al-Ahdal, GN Shinde -- Crime Pattern Detection Using Data Mining / Dipalika Das, Maya Nayak -- Attacks and Security Measures in Wireless Sensor Network / Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, Aditya Khamparia -- Large Sensing Data Flows Using Cryptic Techniques / Hemanta Kumar Bhuyan -- Cyber-Crime Prevention Methodology / Chandra Sekhar Biswal, Subhendu Kumar Pani | |
520 | 3 | |a "Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis. The aim of data analytics is to prevent threats before they happen using classical statistical issues, machine learning, artificial intelligence, rule induction methods, neural networks, fuzzy logic, and stochastic search methods on various data sources, including social media, GPS devices, video feed from street cameras; and license plate readers, travel and credit card records and the news media, as well as government and proprietary systems. Intelligent data analytics ensures efficient data mining techniques to solve criminal investigations. Prediction of future terrorist attacks according to city, type of attack, target and weapon, claim mode, and motive for attack through classification techniques will facilitate the decision-making process of security organizations so as to learn from previously stored attack information; and then rate the targeted sectors/areas accordingly for security measures. By using intelligent data analytics models with multiple levels of representation, raw to higher abstract level representation can be learned at each level of the system. Algorithms based on intelligent data analytics have demonstrated great performance in a variety of areas, including data visualization, data pre-processing (fusion, editing, transformation, filtering, and sampling), data engineering, database mining techniques, tools and applications, etc"-- | |
650 | 0 | 7 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenanalyse |0 (DE-588)4123037-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Gefahrenabwehr |0 (DE-588)4113681-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Attentat |0 (DE-588)4003451-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
653 | 0 | |a Terrorism / Prevention | |
653 | 0 | |a Computer networks | |
653 | 0 | |a Data mining | |
653 | 0 | |a Computer networks | |
653 | 0 | |a Data mining | |
653 | 0 | |a Terrorism ; Prevention | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 1 | |a Attentat |0 (DE-588)4003451-3 |D s |
689 | 0 | 2 | |a Gefahrenabwehr |0 (DE-588)4113681-0 |D s |
689 | 0 | 3 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |D s |
689 | 0 | 4 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 5 | |a Datenanalyse |0 (DE-588)4123037-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Pani, Subhendu Kumar |d 1980- |0 (DE-588)1243682256 |4 edt | |
700 | 1 | |a Singh, Sanjay Kumar |0 (DE-588)1243683449 |4 edt | |
700 | 1 | |a Garg, Lalit |d 1977- |0 (DE-588)1224634063 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Intelligent data analytics for terror threat prediction |d Hoboken : Wiley, 2021 |z 9781119711094 |
856 | 4 | 0 | |u https://doi.org/10.1002/9781119711629 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033223254 | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629 |l DE-858 |p ZDB-35-WIC |q FCO_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1002/9781119711629 |l DE-Aug4 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1002/9781119711629 |l DE-706 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1822580885184053248 |
---|---|
adam_text | |
any_adam_object | |
author2 | Pani, Subhendu Kumar 1980- Singh, Sanjay Kumar Garg, Lalit 1977- |
author2_role | edt edt edt |
author2_variant | s k p sk skp s k s sk sks l g lg |
author_GND | (DE-588)1243682256 (DE-588)1243683449 (DE-588)1224634063 |
author_facet | Pani, Subhendu Kumar 1980- Singh, Sanjay Kumar Garg, Lalit 1977- |
building | Verbundindex |
bvnumber | BV047840162 |
callnumber-first | H - Social Science |
callnumber-label | HV6431 |
callnumber-raw | HV6431 |
callnumber-search | HV6431 |
callnumber-sort | HV 46431 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)9781119711629 (OCoLC)1298743290 (DE-599)KEP061933724 |
dewey-full | 363.325/1702856312 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/1702856312 |
dewey-search | 363.325/1702856312 |
dewey-sort | 3363.325 101702856312 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
doi_str_mv | 10.1002/9781119711629 |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000001c 4500</leader><controlfield tag="001">BV047840162</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221128</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220216s2021 xxu o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119711629</subfield><subfield code="c">electronic bk. : oBook</subfield><subfield code="9">978-1-119-71162-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119711622</subfield><subfield code="c">electronic bk. : oBook</subfield><subfield code="9">1-119-71162-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119711513</subfield><subfield code="c">epub</subfield><subfield code="9">978-1-119-71151-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119711517</subfield><subfield code="c">epub</subfield><subfield code="9">1-119-71151-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119711612</subfield><subfield code="c">adobe pdf</subfield><subfield code="9">978-1-119-71161-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119711614</subfield><subfield code="c">adobe pdf</subfield><subfield code="9">1-119-71161-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119711629</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)9781119711629</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1298743290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP061933724</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-858</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6431</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325/1702856312</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligent data analytics for terror threat prediction</subfield><subfield code="b">architectures, methodologies, techniques and applications</subfield><subfield code="c">Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken</subfield><subfield code="b">Wiley</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media / Ravi Kishore Devarapalli, Anupam Biswas -- Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction / Jaiprakash Narain Dwivedi -- Crime Predictive Model Using Big Data Analytics / Hemanta Kumar Bhuyan, Subhendu Kumar Pani -- The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks / Sushobhan Majumdar -- Text Mining for Secure Cyber Space / Supriya Raheja, Geetika Munjal -- Analyses on Artificial Intelligence Framework to Detect Crime Pattern / R Arshath Raja, N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes / Ebrahim AM Alrahawe, Vikas T Humbe, GN Shinde -- Rule-Based Approach for Botnet Behavior Analysis / Supriya Raheja, Geetika Munjal, Jyoti Jangra, Rakesh Garg -- Securing Biometric Framework with Cryptanalysis / Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, Martin Sagayam -- The Role of Big Data Analysis in Increasing the Crime Prediction and Prevention Rates / Galal A AL-Rummana, Abdulrazzaq H A Al-Ahdal, GN Shinde -- Crime Pattern Detection Using Data Mining / Dipalika Das, Maya Nayak -- Attacks and Security Measures in Wireless Sensor Network / Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, Aditya Khamparia -- Large Sensing Data Flows Using Cryptic Techniques / Hemanta Kumar Bhuyan -- Cyber-Crime Prevention Methodology / Chandra Sekhar Biswal, Subhendu Kumar Pani</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis. The aim of data analytics is to prevent threats before they happen using classical statistical issues, machine learning, artificial intelligence, rule induction methods, neural networks, fuzzy logic, and stochastic search methods on various data sources, including social media, GPS devices, video feed from street cameras; and license plate readers, travel and credit card records and the news media, as well as government and proprietary systems. Intelligent data analytics ensures efficient data mining techniques to solve criminal investigations. Prediction of future terrorist attacks according to city, type of attack, target and weapon, claim mode, and motive for attack through classification techniques will facilitate the decision-making process of security organizations so as to learn from previously stored attack information; and then rate the targeted sectors/areas accordingly for security measures. By using intelligent data analytics models with multiple levels of representation, raw to higher abstract level representation can be learned at each level of the system. Algorithms based on intelligent data analytics have demonstrated great performance in a variety of areas, including data visualization, data pre-processing (fusion, editing, transformation, filtering, and sampling), data engineering, database mining techniques, tools and applications, etc"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenanalyse</subfield><subfield code="0">(DE-588)4123037-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Gefahrenabwehr</subfield><subfield code="0">(DE-588)4113681-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Terrorism / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data mining</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data mining</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Terrorism ; Prevention</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Gefahrenabwehr</subfield><subfield code="0">(DE-588)4113681-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Datenanalyse</subfield><subfield code="0">(DE-588)4123037-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pani, Subhendu Kumar</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1243682256</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Sanjay Kumar</subfield><subfield code="0">(DE-588)1243683449</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Garg, Lalit</subfield><subfield code="d">1977-</subfield><subfield code="0">(DE-588)1224634063</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Intelligent data analytics for terror threat prediction</subfield><subfield code="d">Hoboken : Wiley, 2021</subfield><subfield code="z">9781119711094</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1002/9781119711629</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033223254</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FCO_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1002/9781119711629</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1002/9781119711629</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047840162 |
illustrated | Not Illustrated |
indexdate | 2025-01-29T11:02:59Z |
institution | BVB |
isbn | 9781119711629 1119711622 9781119711513 1119711517 9781119711612 1119711614 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033223254 |
oclc_num | 1298743290 |
open_access_boolean | |
owner | DE-706 DE-Aug4 DE-858 |
owner_facet | DE-706 DE-Aug4 DE-858 |
physical | 1 Online-Ressource |
psigel | ZDB-35-WIC ZDB-35-WIC FCO_PDA_WIC_Kauf ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Wiley |
record_format | marc |
spelling | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang First edition Hoboken Wiley 2021 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media / Ravi Kishore Devarapalli, Anupam Biswas -- Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction / Jaiprakash Narain Dwivedi -- Crime Predictive Model Using Big Data Analytics / Hemanta Kumar Bhuyan, Subhendu Kumar Pani -- The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks / Sushobhan Majumdar -- Text Mining for Secure Cyber Space / Supriya Raheja, Geetika Munjal -- Analyses on Artificial Intelligence Framework to Detect Crime Pattern / R Arshath Raja, N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes / Ebrahim AM Alrahawe, Vikas T Humbe, GN Shinde -- Rule-Based Approach for Botnet Behavior Analysis / Supriya Raheja, Geetika Munjal, Jyoti Jangra, Rakesh Garg -- Securing Biometric Framework with Cryptanalysis / Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, Martin Sagayam -- The Role of Big Data Analysis in Increasing the Crime Prediction and Prevention Rates / Galal A AL-Rummana, Abdulrazzaq H A Al-Ahdal, GN Shinde -- Crime Pattern Detection Using Data Mining / Dipalika Das, Maya Nayak -- Attacks and Security Measures in Wireless Sensor Network / Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, Aditya Khamparia -- Large Sensing Data Flows Using Cryptic Techniques / Hemanta Kumar Bhuyan -- Cyber-Crime Prevention Methodology / Chandra Sekhar Biswal, Subhendu Kumar Pani "Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis. The aim of data analytics is to prevent threats before they happen using classical statistical issues, machine learning, artificial intelligence, rule induction methods, neural networks, fuzzy logic, and stochastic search methods on various data sources, including social media, GPS devices, video feed from street cameras; and license plate readers, travel and credit card records and the news media, as well as government and proprietary systems. Intelligent data analytics ensures efficient data mining techniques to solve criminal investigations. Prediction of future terrorist attacks according to city, type of attack, target and weapon, claim mode, and motive for attack through classification techniques will facilitate the decision-making process of security organizations so as to learn from previously stored attack information; and then rate the targeted sectors/areas accordingly for security measures. By using intelligent data analytics models with multiple levels of representation, raw to higher abstract level representation can be learned at each level of the system. Algorithms based on intelligent data analytics have demonstrated great performance in a variety of areas, including data visualization, data pre-processing (fusion, editing, transformation, filtering, and sampling), data engineering, database mining techniques, tools and applications, etc"-- Computerunterstützte Kommunikation (DE-588)4535905-2 gnd rswk-swf Datenanalyse (DE-588)4123037-1 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Gefahrenabwehr (DE-588)4113681-0 gnd rswk-swf Attentat (DE-588)4003451-3 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Terrorism / Prevention Computer networks Data mining Terrorism ; Prevention (DE-588)4143413-4 Aufsatzsammlung gnd-content Terrorismus (DE-588)4059534-1 s Attentat (DE-588)4003451-3 s Gefahrenabwehr (DE-588)4113681-0 s Computerunterstützte Kommunikation (DE-588)4535905-2 s Data Mining (DE-588)4428654-5 s Datenanalyse (DE-588)4123037-1 s DE-604 Pani, Subhendu Kumar 1980- (DE-588)1243682256 edt Singh, Sanjay Kumar (DE-588)1243683449 edt Garg, Lalit 1977- (DE-588)1224634063 edt Erscheint auch als Druck-Ausgabe Intelligent data analytics for terror threat prediction Hoboken : Wiley, 2021 9781119711094 https://doi.org/10.1002/9781119711629 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Datenanalyse (DE-588)4123037-1 gnd Data Mining (DE-588)4428654-5 gnd Gefahrenabwehr (DE-588)4113681-0 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4535905-2 (DE-588)4123037-1 (DE-588)4428654-5 (DE-588)4113681-0 (DE-588)4003451-3 (DE-588)4059534-1 (DE-588)4143413-4 |
title | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications |
title_auth | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications |
title_exact_search | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications |
title_full | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang |
title_fullStr | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang |
title_full_unstemmed | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang |
title_short | Intelligent data analytics for terror threat prediction |
title_sort | intelligent data analytics for terror threat prediction architectures methodologies techniques and applications |
title_sub | architectures, methodologies, techniques and applications |
topic | Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Datenanalyse (DE-588)4123037-1 gnd Data Mining (DE-588)4428654-5 gnd Gefahrenabwehr (DE-588)4113681-0 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | Computerunterstützte Kommunikation Datenanalyse Data Mining Gefahrenabwehr Attentat Terrorismus Aufsatzsammlung |
url | https://doi.org/10.1002/9781119711629 |
work_keys_str_mv | AT panisubhendukumar intelligentdataanalyticsforterrorthreatpredictionarchitecturesmethodologiestechniquesandapplications AT singhsanjaykumar intelligentdataanalyticsforterrorthreatpredictionarchitecturesmethodologiestechniquesandapplications AT garglalit intelligentdataanalyticsforterrorthreatpredictionarchitecturesmethodologiestechniquesandapplications |