Intelligent data analytics for terror threat prediction: architectures, methodologies, techniques and applications
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2021
Beverly, MA Scrivener Publishing 2021 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xix, 319 Seiten Illustrationen, Diagramme |
ISBN: | 9781119711094 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047509312 | ||
003 | DE-604 | ||
005 | 20211129 | ||
007 | t| | ||
008 | 211013s2021 xxua||| |||| 00||| eng d | ||
020 | |a 9781119711094 |c Festeinband |9 978-1-119-71109-4 | ||
035 | |a (OCoLC)1286857743 | ||
035 | |a (DE-599)KXP1744473315 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-706 |a DE-634 | ||
050 | 0 | |a HV6431 | |
082 | 0 | |a 363.325/1702856312 | |
245 | 1 | 0 | |a Intelligent data analytics for terror threat prediction |b architectures, methodologies, techniques and applications |c edited by Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang |
264 | 1 | |a Hoboken, NJ |b Wiley |c 2021 | |
264 | 1 | |a Beverly, MA |b Scrivener Publishing |c 2021 | |
300 | |a xix, 319 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenanalyse |0 (DE-588)4123037-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Gefahrenabwehr |0 (DE-588)4113681-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Attentat |0 (DE-588)4003451-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
653 | 0 | |a Terrorism / Prevention | |
653 | 0 | |a Computer communication systems | |
653 | 0 | |a Data mining | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 1 | |a Attentat |0 (DE-588)4003451-3 |D s |
689 | 0 | 2 | |a Gefahrenabwehr |0 (DE-588)4113681-0 |D s |
689 | 0 | 3 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |D s |
689 | 0 | 4 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 5 | |a Datenanalyse |0 (DE-588)4123037-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Pani, Subhendu Kumar |d 1980- |0 (DE-588)1243682256 |4 edt | |
700 | 1 | |a Singh, Sanjay Kumar |0 (DE-588)1243683449 |4 edt | |
700 | 1 | |a Garg, Lalit |d 1977- |0 (DE-588)1224634063 |4 edt | |
700 | 1 | |a Pachori, Ram Bilas |d 1979- |0 (DE-588)1245956965 |4 edt | |
700 | 1 | |a Zhang, Xiaobo |0 (DE-588)1245957430 |4 edt | |
776 | 0 | |z 9781119711612 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-119-71161-2 |
856 | 4 | 2 | |m V:DE-576;B:DE-Frei85 |q application/pdf |u http://swbplus.bsz-bw.de/bsz1744473315inh.htm |v 20210520171504 |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032910217 |
Datensatz im Suchindex
_version_ | 1820572479118114816 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Pani, Subhendu Kumar 1980- Singh, Sanjay Kumar Garg, Lalit 1977- Pachori, Ram Bilas 1979- Zhang, Xiaobo |
author2_role | edt edt edt edt edt |
author2_variant | s k p sk skp s k s sk sks l g lg r b p rb rbp x z xz |
author_GND | (DE-588)1243682256 (DE-588)1243683449 (DE-588)1224634063 (DE-588)1245956965 (DE-588)1245957430 |
author_facet | Pani, Subhendu Kumar 1980- Singh, Sanjay Kumar Garg, Lalit 1977- Pachori, Ram Bilas 1979- Zhang, Xiaobo |
building | Verbundindex |
bvnumber | BV047509312 |
callnumber-first | H - Social Science |
callnumber-label | HV6431 |
callnumber-raw | HV6431 |
callnumber-search | HV6431 |
callnumber-sort | HV 46431 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)1286857743 (DE-599)KXP1744473315 |
dewey-full | 363.325/1702856312 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/1702856312 |
dewey-search | 363.325/1702856312 |
dewey-sort | 3363.325 101702856312 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
discipline_str_mv | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV047509312</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211129</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">211013s2021 xxua||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119711094</subfield><subfield code="c">Festeinband</subfield><subfield code="9">978-1-119-71109-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1286857743</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1744473315</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6431</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325/1702856312</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligent data analytics for terror threat prediction</subfield><subfield code="b">architectures, methodologies, techniques and applications</subfield><subfield code="c">edited by Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beverly, MA</subfield><subfield code="b">Scrivener Publishing</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xix, 319 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenanalyse</subfield><subfield code="0">(DE-588)4123037-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Gefahrenabwehr</subfield><subfield code="0">(DE-588)4113681-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Terrorism / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data mining</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Gefahrenabwehr</subfield><subfield code="0">(DE-588)4113681-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Datenanalyse</subfield><subfield code="0">(DE-588)4123037-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pani, Subhendu Kumar</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1243682256</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Sanjay Kumar</subfield><subfield code="0">(DE-588)1243683449</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Garg, Lalit</subfield><subfield code="d">1977-</subfield><subfield code="0">(DE-588)1224634063</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pachori, Ram Bilas</subfield><subfield code="d">1979-</subfield><subfield code="0">(DE-588)1245956965</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Xiaobo</subfield><subfield code="0">(DE-588)1245957430</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="z">9781119711612</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-119-71161-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">V:DE-576;B:DE-Frei85</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://swbplus.bsz-bw.de/bsz1744473315inh.htm</subfield><subfield code="v">20210520171504</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032910217</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047509312 |
illustrated | Illustrated |
index_date | 2024-07-03T18:21:23Z |
indexdate | 2025-01-07T07:00:14Z |
institution | BVB |
isbn | 9781119711094 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032910217 |
oclc_num | 1286857743 |
open_access_boolean | |
owner | DE-706 DE-634 |
owner_facet | DE-706 DE-634 |
physical | xix, 319 Seiten Illustrationen, Diagramme |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Wiley Scrivener Publishing |
record_format | marc |
spelling | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications edited by Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang Hoboken, NJ Wiley 2021 Beverly, MA Scrivener Publishing 2021 xix, 319 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Computerunterstützte Kommunikation (DE-588)4535905-2 gnd rswk-swf Datenanalyse (DE-588)4123037-1 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Gefahrenabwehr (DE-588)4113681-0 gnd rswk-swf Attentat (DE-588)4003451-3 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Terrorism / Prevention Computer communication systems Data mining (DE-588)4143413-4 Aufsatzsammlung gnd-content Terrorismus (DE-588)4059534-1 s Attentat (DE-588)4003451-3 s Gefahrenabwehr (DE-588)4113681-0 s Computerunterstützte Kommunikation (DE-588)4535905-2 s Data Mining (DE-588)4428654-5 s Datenanalyse (DE-588)4123037-1 s DE-604 Pani, Subhendu Kumar 1980- (DE-588)1243682256 edt Singh, Sanjay Kumar (DE-588)1243683449 edt Garg, Lalit 1977- (DE-588)1224634063 edt Pachori, Ram Bilas 1979- (DE-588)1245956965 edt Zhang, Xiaobo (DE-588)1245957430 edt 9781119711612 Erscheint auch als Online-Ausgabe 978-1-119-71161-2 V:DE-576;B:DE-Frei85 application/pdf http://swbplus.bsz-bw.de/bsz1744473315inh.htm 20210520171504 Inhaltsverzeichnis |
spellingShingle | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Datenanalyse (DE-588)4123037-1 gnd Data Mining (DE-588)4428654-5 gnd Gefahrenabwehr (DE-588)4113681-0 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4535905-2 (DE-588)4123037-1 (DE-588)4428654-5 (DE-588)4113681-0 (DE-588)4003451-3 (DE-588)4059534-1 (DE-588)4143413-4 |
title | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications |
title_auth | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications |
title_exact_search | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications |
title_exact_search_txtP | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications |
title_full | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications edited by Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang |
title_fullStr | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications edited by Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang |
title_full_unstemmed | Intelligent data analytics for terror threat prediction architectures, methodologies, techniques and applications edited by Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori, Xiaobo Zhang |
title_short | Intelligent data analytics for terror threat prediction |
title_sort | intelligent data analytics for terror threat prediction architectures methodologies techniques and applications |
title_sub | architectures, methodologies, techniques and applications |
topic | Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Datenanalyse (DE-588)4123037-1 gnd Data Mining (DE-588)4428654-5 gnd Gefahrenabwehr (DE-588)4113681-0 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | Computerunterstützte Kommunikation Datenanalyse Data Mining Gefahrenabwehr Attentat Terrorismus Aufsatzsammlung |
url | http://swbplus.bsz-bw.de/bsz1744473315inh.htm |
work_keys_str_mv | AT panisubhendukumar intelligentdataanalyticsforterrorthreatpredictionarchitecturesmethodologiestechniquesandapplications AT singhsanjaykumar intelligentdataanalyticsforterrorthreatpredictionarchitecturesmethodologiestechniquesandapplications AT garglalit intelligentdataanalyticsforterrorthreatpredictionarchitecturesmethodologiestechniquesandapplications AT pachorirambilas intelligentdataanalyticsforterrorthreatpredictionarchitecturesmethodologiestechniquesandapplications AT zhangxiaobo intelligentdataanalyticsforterrorthreatpredictionarchitecturesmethodologiestechniquesandapplications |