This is the first study of Boko Haram that brings advanced data-driven, machine learning model...
Achieving a better solution or improving the performance of existing system design is a...
This is the first book that uses cyber-vulnerability data to explore the vulnerability of ove...
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
The importance and value of tracking and sharing the dispersed knowledge resources of contemporar...
Computational Analysis of Terrorist Groups: Lashkar-e-Taibaprovides an in-depth look at...
Terrorist groups throughout the world have been studied primarily through the use of social sc...
This book explores fundamental scientific problems essential for autonomous cyber defense. S...
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide varie...
Search games and rendezvous problems have received growing attention in computer science withi...
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy This book prese...