Terrorism, Security, and Computation

Series • 8 Books • Computers
Discovering Hidden Gems in Foreign Languages Discovering Hidden Gems in Foreign Languages
M.D. Miller
Detecting Trust and Deception in Group Interaction Detecting Trust and Deception in Group Interaction
V. S. Subrahmanian, Judee K Burgoon & Norah E. Dunbar
A Machine Learning Based Model of Boko Haram A Machine Learning Based Model of Boko Haram
V. S. Subrahmanian, Chiara Pulice, James F. Brown & Jacob Bonen-Clark
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
Maurizio Martellini & Andrea Malizia
Anomaly Detection Principles and Algorithms Anomaly Detection Principles and Algorithms
Kishan G. Mehrotra, Chilukuri K. Mohan & HuaMing Huang
The Global Cyber-Vulnerability Report The Global Cyber-Vulnerability Report
V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras & Aditya Prakash
Violence in Nigeria Violence in Nigeria
Patricia Taft & Nate Haken
Indian Mujahideen Indian Mujahideen
V.S. Subrahmanian, Aaron Mannes, Animesh Roul & R.K. Raghavan