A Machine Learning Based Model of Boko Haram A Machine Learning Based Model of Boko Haram
Terrorism, Security, and Computation

A Machine Learning Based Model of Boko Haram

V. S. Subrahmanian والمزيد
    • ‏119٫99 US$
    • ‏119٫99 US$

وصف الناشر

This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram’s behavior and reduce attacks by them. This book also identifies conditions that predict sexual violence, suicide bombings and attempted bombings, abduction, arson, looting, and targeting of government officials and security installations. 

After reducing Boko Haram’s history to a spreadsheet containing monthly information about different types of attacks and different circumstances prevailing over a 9 year period, this book introduces Temporal Probabilistic (TP) rules that can be automatically learned from data and are easy to explain to policy makers and security experts. This book additionally reports on over 1 year of forecasts made using the model in order to validate predictive accuracy. It also introduces a policy computation method to rein in Boko Haram’s attacks.

Applied machine learning researchers, machine learning experts and predictive modeling experts agree that this book is a valuable learning asset. Counter-terrorism experts, national and international security experts, public policy experts and Africa experts will also agree this book is a valuable learning tool.

النوع
علم وطبيعة
تاريخ النشر
٢٠٢٠
١١ ديسمبر
اللغة
EN
الإنجليزية
عدد الصفحات
١٤٧
الناشر
Springer International Publishing
البائع
Springer Nature B.V.
الحجم
٨٫٤
‫م.ب.‬
Information Warfare Information Warfare
٢٠١٢
Cyber-Terrorism Cyber-Terrorism
٢٠١٤
Cyberwar and Information Warfare Cyberwar and Information Warfare
٢٠١٢
Cyber Conflict Cyber Conflict
٢٠١٣
Business Continuity and the Pandemic Threat Business Continuity and the Pandemic Threat
٢٠٢٢
Cyber Threat Intelligence Cyber Threat Intelligence
٢٠٢٣
Detecting Trust and Deception in Group Interaction Detecting Trust and Deception in Group Interaction
٢٠٢١
Scalable Uncertainty Management Scalable Uncertainty Management
٢٠٠٧
Anomaly Detection Principles and Algorithms Anomaly Detection Principles and Algorithms
٢٠١٧
Violence in Nigeria Violence in Nigeria
٢٠١٥
Foreign Information Manipulation and Interference Foreign Information Manipulation and Interference
٢٠٢٥
Machine Learning Techniques to Predict Terrorist Attacks Machine Learning Techniques to Predict Terrorist Attacks
٢٠٢٥
Discovering Hidden Gems in Foreign Languages Discovering Hidden Gems in Foreign Languages
٢٠٢٣
Detecting Trust and Deception in Group Interaction Detecting Trust and Deception in Group Interaction
٢٠٢١