Applying methods of scientific inquiry into intelligence, security, and counterterrorism
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--
Saved in:
| Other Authors: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
IGI Global, Information Science Reference, an imprint of IGI Global
2019
|
| Series: | Premier reference source
Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.9.A25 A675 2019 |
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 91386 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220003237.0 | ||
| 008 | 220815 20192019xxu b 001 0 eng d | ||
| 020 | |a 9781522589761 (hbk) | ||
| 020 | |a 9781522589778 (pbk) | ||
| 020 | |a 9781522589785 (ebk) | ||
| 039 | 9 | |a 202301090944 |b hainim |y 202208150915 |z dewi | |
| 040 | |a MY-KlNDU |b eng |c MY-KlNDU |e rda | ||
| 050 | |a QA 76.9.A25 |b A675 2019 | ||
| 090 | |a QA 76.9.A25 |b A675 2019 | ||
| 245 | 1 | 0 | |a Applying methods of scientific inquiry into intelligence, security, and counterterrorism |c Arif Sari, Girne American University Canterbury, UK |
| 264 | 1 | |a Hershey, PA |b IGI Global, Information Science Reference, an imprint of IGI Global |c 2019 | |
| 264 | 4 | |a © 2019 | |
| 300 | |a xvi, 396 pages |b illustrations |c 27 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 490 | 1 | |a Premier reference source | |
| 490 | 1 | |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series |x 2327-0381 | |
| 504 | |a Includes bibliographical references (pages 360-388) and index | ||
| 520 | |a "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- |c Provided by publisher | ||
| 592 | |a IV-101731 |b 07/10/2022 |c RM832.00 |h YUHA Associates Sdn. Bhd | ||
| 650 | 0 | |a Cyber intelligence (Computer security) | |
| 650 | 0 | |a Cyberterrorism |x Prevention | |
| 650 | 0 | |a Terrorism |x Prevention | |
| 700 | 1 | |a Sari, Arif |d 1986 |e editor | |
| 830 | 0 | |a Premier reference source | |
| 830 | 0 | |a Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series |x 2327-0381 | |
| 999 | |a vtls000103839 |c 91386 |d 91386 | ||


