Fandom

VroniPlag Wiki

Nm/089

< Nm

31.373Seiten in
diesem Wiki
Seite hinzufügen
Diskussion0 Teilen

Störung durch Adblocker erkannt!


Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Investigative Data Mining: Mathematical Models for Analyzing, Visualizing and Destabilizing Terrorist Networks

von Nasrullah Memon

vorherige Seite | zur Übersichtsseite | folgende Seite
Statistik und Sichtungsnachweis dieser Seite findet sich am Artikelende
[1.] Nm/Fragment 089 01 - Diskussion
Zuletzt bearbeitet: 2012-05-11 21:08:19 WiseWoman
Dombroski Carley 2002, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 89, Zeilen: 1-2
Quelle: Dombroski Carley 2002
Seite(n): 1, Zeilen: 20-24
[NETEST provides functionalities to estimate a network’s size, determine its membership and structure, determine areas of the network where data is missing, perform cost and benefit analysis of additional information, assess group level capabilities] embedded in the network, and pose “what if” scenarios to destabilize a network and predict its evolution over time. Using NETEST, an investigator has the power to estimate a network’s size, determine its membership and structure, determine areas of the network where data is missing, perform cost/benefit analysis of additional information, assess group level capabilities embedded in the network, and pose “what if” scenarios to destabilize a network and predict its evolution over time.
Anmerkungen

The copied text starts on the previous page. A reference is not given.

Sichter
(Hindemith), WiseWoman

[2.] Nm/Fragment 089 03 - Diskussion
Zuletzt bearbeitet: 2012-05-07 16:20:42 Hindemith
CNS 2002, Fragment, Gesichtet, Nm, SMWFragment, Schutzlevel sysop, Verschleierung

Typus
Verschleierung
Bearbeiter
Hindemith
Gesichtet
Yes.png
Untersuchte Arbeit:
Seite: 89, Zeilen: 3-25
Quelle: CNS_2002
Seite(n): 14, 18, 20, Zeilen: 14: 11-17; 18: 28-31; 20: 23-26
THREATFINDER – this tool originated in the corporate

realm. Certain individuals within an organization are more likely than others to pose threats. The research involves looking for threat indicators for who could launch an attack i.e. using a network/organizational perspective, Threatfinder identifies threats within an organization.

Tsvetovat Maksim and Kathleen Carley (2002) proposed a methodology for realistically simulating terrorist networks in order to develop network metrics to test strategies of destabilizing them, provided a model of antiterrorist policy. They have not discussed behavior or real group interaction and the model is limited in scope and depth. It may be used as a starting point to focus terrorist organization and network

Michael J. North and his colleagues (North, J. M; Nicholson, T. C; and Jerry R. V., 2006) worked on a model of terrorist networks— looking at relationships between different terrorist structures. Their models show whether or not particular terrorist group fits in a given structure.

The authors modeled terrorists as genetic algorithms. The models also look at counter forces. Social factors, such as propagation of dangerous ideas, are built into the model. The model uses REPAST tool (developed by University of Chicago) which, as opposed to SWARM (which they believe is getting old).

[page 18]

THREATFINDER – this tool originated in the corporate realm. Certain individuals within an organization are more likely than others to pose threats. The research involves looking for threat indicators for who could launch an attack i.e. using a network/organizational perspective, Threatfinder identifies threats within an organization.

[page 20]

The paper proposes a methodology for realistically simulating terrorist networks in order to develop network metrics to test strategies of destabilizing them; provides a model of anti-terrorist policy; doesn't provide behavior or real group interaction and is limited in scope and depth; may be used as a starting point; focus: terrorist organization and network

[page 14]

- He is working on a model of terrorist networks – looking at relationships between different terrorist structures.

- His models let people test whether or not a particular terrorist group fits a given structure.

- Terrorists are modeled as genetic algorithms.

- The model also looks at counterforces.

- Social factors, such as the propagation of dangerous ideas, are built into the model.

- The model uses REPAST (developed by the University of Chicago) which is written in Java, as opposed to SWARM which is written in C (and he believes is getting old).

Anmerkungen

No source given

Sichter
(Hindemith), Bummelchen


vorherige Seite | zur Übersichtsseite | folgende Seite
Letzte Bearbeitung dieser Seite: durch Benutzer:Hindemith, Zeitstempel: 20120507162229

Auch bei Fandom

Zufälliges Wiki