Cargando…
Public support for counterterrorism efforts using probabilistic computing technologies to decipher terrorist communication on the internet
Advancements in big data analytics offer new avenues for the analysis and deciphering of suspicious activities on the internet. One promising new technology to increase the identification of terrorism threats is based on probabilistic computing. The technology promises to provide more efficient prob...
Autores principales: | Reimer, Torsten, Johnson, Nathanael |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8889383/ https://www.ncbi.nlm.nih.gov/pubmed/35250248 http://dx.doi.org/10.1007/s12144-022-02753-4 |
Ejemplares similares
-
The Science and Technology of Counterterrorism
por: Young, Carl
Publicado: (2014) -
Compassionate Counterterrorism
por: Olaimy, Leena
Publicado: (2019) -
Counterterrorism and cybersecurity: total information awareness
por: Lee, Newton
Publicado: (2013) -
Counterterrorism policies and practices: health and values at stake
por: Eckenwiler, Lisa, et al.
Publicado: (2015) -
Statistical methods in counterterrorism: game theory, modeling, syndromic surveillance, and biometric authentication
por: Wilson, Alyson, et al.
Publicado: (2006)