| Contents |
Counterterrorism and open source intelligence models, tools, techniques, and case studies / Uffe Kock Wiil -- Targeting by transnational terrorist groups / Alexander Gutfraind -- A framework for analyst focus from computed significance / David Skillicorn and M.A.J. Bourassa -- Interdiction of plots with multiple operatives / Gordon Woo -- Understanding terrorists network topologies and their resilience against disruption / Roy Lindelauf, Peter Borm, and Herbert Hamers -- Co-offending network mining / Patricia L. Brantingham, Martin Ester, Richard Frank, Uwe Glässer, and Mohammad A. Tayebi -- Religion-based geospatial abduction with counter-IED applications / Paulo Shakarian and V.S. Subrahmanian -- Finding hidden links in terrorist networks by checking indirect links of different sub-networks / Alan Chen, Shag Gao, Panagiotis Karampelas, Reda Alhajj, and Jon Rokne -- The use of open source intelligence in the construction of covert social networks / Christopher J. Rhodes -- A novel method to analyze the importance of links in terrorist networks / Uffe Kock Wiil, Jolanta Gniadek, and Nasrullah Memon -- A global measure for estimating the degree of organization and effectiveness if individual actors with application to terrorist networks / Sara Aghakhani, Khaled Dawoud, Reda Alhajj, and Jon Rokne -- Counterterrorism mining for individuals semantically-similar to watchlist members / James A. Danowski -- Detection of illegitimate emails using boosting algorithm / Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil -- Cluster based text classification model / Sarwat Nizamani, Nasrullah Memon, and Uffe Kock Wiil -- Effectiveness of social networks for studying biological agents and identifying cancer biomarkers / Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, Keivan Kianmehr, Tansel Özyer, Jon Rokne, douglas Demetrick, Mick Ridley, and Reda alhajj -- From terrorism informatics to dark web research / Hsinchun Chen -- Investigating terrorist attacks using CDR data : a case study / Faith Ozgul, Ahmet Celik, Claus Atzenbeck, and Nadir Gergin -- Multilingual real-time event extraction for border security intelligence gathering / Martin Atkinson, Jakub Piskorski, Erik van der Goot, and Roman Yangarber -- Mining the web to monitor the political consensus / Federico Neri, Carlo Aliprandi, and Furio Camillo -- Exploring the evolution of terrorist networks / Nasrullah Memon, Uffe Kock Wiil, Pir Abdul Rasool Qureshi, and Panagiotis Karampelas -- The ultimate hack : re-inventing intelligence to re-engineer earth / Robert David Steele. |