Applying methods of scientific inquiry into intelligence, security, and counterterrorism:
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Disseminator of Knowledge
[2019]
|
Schriftenreihe: | A volume in the Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-898 DE-1049 DE-91 DE-706 DE-83 Volltext |
Zusammenfassung: | "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- |
Beschreibung: | 1 Online-Ressource (xvi, 396 Seiten) Illustrationen, Diagramme |
ISBN: | 9781522589785 |
ISSN: | 2327-0373 |
DOI: | 10.4018/978-1-5225-8976-1 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV045920848 | ||
003 | DE-604 | ||
005 | 20211104 | ||
007 | cr|uuu---uuuuu | ||
008 | 190606s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781522589785 |9 978-1-5225-8978-5 | ||
024 | 7 | |a 10.4018/978-1-5225-8976-1 |2 doi | |
035 | |a (ZDB-98-IGB)978-1-5225-8978-5 | ||
035 | |a (OCoLC)1104873431 | ||
035 | |a (DE-599)BVBBV045920848 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-1049 |a DE-91 |a DE-898 |a DE-706 |a DE-83 | ||
245 | 1 | 0 | |a Applying methods of scientific inquiry into intelligence, security, and counterterrorism |c Arif Sari, Girne American University Canterbury, UK |
264 | 1 | |a Hershey PA, USA |b IGI Global, Disseminator of Knowledge |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a 1 Online-Ressource (xvi, 396 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a A volume in the Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series |x 2327-0373 | |
490 | 0 | |a Premier reference source | |
520 | |a "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- | ||
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Cyberterrorism / Prevention | |
650 | 7 | |a Cyber intelligence (Computer security) |2 fast | |
650 | 7 | |a Cyberterrorism / Prevention |2 fast | |
700 | 1 | |a Sari, Arif |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-8976-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 1-5225-8976-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, softcover |z 978-1-5225-8977-8 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-8976-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-8976-1 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8976-1 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8976-1 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE19 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8976-1 |l DE-91 |p ZDB-1-IGE |q TUM_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8976-1 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8976-1 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079018888757248 |
---|---|
adam_text | |
any_adam_object | |
author2 | Sari, Arif |
author2_role | edt |
author2_variant | a s as |
author_facet | Sari, Arif |
building | Verbundindex |
bvnumber | BV045920848 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)978-1-5225-8978-5 (OCoLC)1104873431 (DE-599)BVBBV045920848 |
doi_str_mv | 10.4018/978-1-5225-8976-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV045920848</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211104</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190606s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522589785</subfield><subfield code="9">978-1-5225-8978-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-8976-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-5225-8978-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1104873431</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045920848</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applying methods of scientific inquiry into intelligence, security, and counterterrorism</subfield><subfield code="c">Arif Sari, Girne American University Canterbury, UK</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 396 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">A volume in the Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series</subfield><subfield code="x">2327-0373</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sari, Arif</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-8976-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">1-5225-8976-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, softcover</subfield><subfield code="z">978-1-5225-8977-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-8976-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE19</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">TUM_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045920848 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:19Z |
institution | BVB |
isbn | 9781522589785 |
issn | 2327-0373 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031303343 |
oclc_num | 1104873431 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
owner_facet | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
physical | 1 Online-Ressource (xvi, 396 Seiten) Illustrationen, Diagramme |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE19 ZDB-1-IGE TUM_Paketkauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | A volume in the Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series Premier reference source |
spelling | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, Girne American University Canterbury, UK Hershey PA, USA IGI Global, Disseminator of Knowledge [2019] © 2019 1 Online-Ressource (xvi, 396 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier A volume in the Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series 2327-0373 Premier reference source "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- Cyber intelligence (Computer security) Cyberterrorism / Prevention Cyber intelligence (Computer security) fast Cyberterrorism / Prevention fast Sari, Arif edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-8976-1 Erscheint auch als Druck-Ausgabe, hardcover 1-5225-8976-7 Erscheint auch als Druck-Ausgabe, softcover 978-1-5225-8977-8 https://doi.org/10.4018/978-1-5225-8976-1 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Cyber intelligence (Computer security) Cyberterrorism / Prevention Cyber intelligence (Computer security) fast Cyberterrorism / Prevention fast |
title | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_auth | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_exact_search | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_full | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, Girne American University Canterbury, UK |
title_fullStr | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, Girne American University Canterbury, UK |
title_full_unstemmed | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, Girne American University Canterbury, UK |
title_short | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_sort | applying methods of scientific inquiry into intelligence security and counterterrorism |
topic | Cyber intelligence (Computer security) Cyberterrorism / Prevention Cyber intelligence (Computer security) fast Cyberterrorism / Prevention fast |
topic_facet | Cyber intelligence (Computer security) Cyberterrorism / Prevention |
url | https://doi.org/10.4018/978-1-5225-8976-1 |
work_keys_str_mv | AT sariarif applyingmethodsofscientificinquiryintointelligencesecurityandcounterterrorism |