Applying methods of scientific inquiry into intelligence, security, and counterterrorism:
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
2019
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-573 DE-20 DE-1049 DE-898 Volltex |
Zusammenfassung: | "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- |
Beschreibung: | Description based on title screen (IGI Global, viewed 05/07/2019) |
Beschreibung: | 1 Online-Ressource (20 PDFs (396 pages)) |
ISBN: | 9781522589785 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046096359 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 190809s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781522589785 |9 978-1-5225-8978-5 | ||
024 | 7 | |a 10.4018/978-1-5225-8976-1 |2 doi | |
035 | |a (ZDB-1-IGE)00218561 | ||
035 | |a (OCoLC)1104873431 | ||
035 | |a (DE-599)BVBBV046096359 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-20 |a DE-1049 |a DE-898 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Applying methods of scientific inquiry into intelligence, security, and counterterrorism |c Arif Sari, editor |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c 2019 | |
300 | |a 1 Online-Ressource (20 PDFs (396 pages)) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on title screen (IGI Global, viewed 05/07/2019) | ||
520 | |a "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- | ||
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Cyberterrorism / Prevention | |
700 | 1 | |a Sari, Arif |d 1986- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1522589767 |z 9781522589761 |
856 | 4 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltex | |
912 | |a ZDB-1-IGE | ||
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079020249808896 |
---|---|
adam_text | |
any_adam_object | |
author2 | Sari, Arif 1986- |
author2_role | edt |
author2_variant | a s as |
author_facet | Sari, Arif 1986- |
building | Verbundindex |
bvnumber | BV046096359 |
collection | ZDB-1-IGE |
ctrlnum | (ZDB-1-IGE)00218561 (OCoLC)1104873431 (DE-599)BVBBV046096359 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV046096359</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190809s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522589785</subfield><subfield code="9">978-1-5225-8978-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-8976-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00218561</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1104873431</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046096359</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applying methods of scientific inquiry into intelligence, security, and counterterrorism</subfield><subfield code="c">Arif Sari, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (20 PDFs (396 pages))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 05/07/2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sari, Arif</subfield><subfield code="d">1986-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1522589767</subfield><subfield code="z">9781522589761</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltex</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046096359 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:20Z |
institution | BVB |
isbn | 9781522589785 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031477214 |
oclc_num | 1104873431 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource (20 PDFs (396 pages)) |
psigel | ZDB-1-IGE |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, editor Hershey, Pennsylvania IGI Global 2019 1 Online-Ressource (20 PDFs (396 pages)) txt rdacontent c rdamedia cr rdacarrier Description based on title screen (IGI Global, viewed 05/07/2019) "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections"-- Cyber intelligence (Computer security) Cyberterrorism / Prevention Sari, Arif 1986- edt Erscheint auch als Druck-Ausgabe 1522589767 9781522589761 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 Verlag URL des Erstveröffentlichers Volltex |
spellingShingle | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Cyber intelligence (Computer security) Cyberterrorism / Prevention |
title | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_auth | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_exact_search | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_full | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, editor |
title_fullStr | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, editor |
title_full_unstemmed | Applying methods of scientific inquiry into intelligence, security, and counterterrorism Arif Sari, editor |
title_short | Applying methods of scientific inquiry into intelligence, security, and counterterrorism |
title_sort | applying methods of scientific inquiry into intelligence security and counterterrorism |
topic | Cyber intelligence (Computer security) Cyberterrorism / Prevention |
topic_facet | Cyber intelligence (Computer security) Cyberterrorism / Prevention |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8976-1 |
work_keys_str_mv | AT sariarif applyingmethodsofscientificinquiryintointelligencesecurityandcounterterrorism |