2013
DOI: 10.1007/978-1-4614-4769-6
|View full text |Cite
|
Sign up to set email alerts
|

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
27
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(27 citation statements)
references
References 0 publications
0
27
0
Order By: Relevance
“…The ability to classify objects of interest from a training set, whether those objects are terrorists (1), machines that need maintenance (2), or emails containing a malicious link (3), represents the greatest success in the field. Typically, no single machine learning algorithm does everything well.…”
mentioning
confidence: 99%
“…The ability to classify objects of interest from a training set, whether those objects are terrorists (1), machines that need maintenance (2), or emails containing a malicious link (3), represents the greatest success in the field. Typically, no single machine learning algorithm does everything well.…”
mentioning
confidence: 99%
“…The first dataset is synthetic dataset created by the authors. The second and third datasets are Sageman's Al-Qaeda network Sageman (2004) and Lashkar-e-Taiba network Subrahmanian et al (2012) respectively. The results show that STONE-Predict algorithm achieves 80% accuracy of predicting who will replace the removed person in the network when tested on those datasets.…”
Section: Ranking Individuals and Relationships In Crime Networkmentioning
confidence: 99%
“…Such rules can be extracted from the behavioral or spatial data previously mentioned (Khuller, Martinez, Nau, Simari, Sliva, & Subrahmanian, 2007). Figure 2 contains a sample of a probabilistic logic representation of some behaviors of a terror organization like LeT, indicating the probability of violent actions as a result of situational factors in the environment (Subrahmanian, Mannes, Sliva, Shakarian, & Dickerson, 2012). The first line says that if the group is experiencing conflict with another rival organization (i.e., interorganizational conflict), then the probability that it will use kidnapping as a strategy lies between 0.35 and 0.45.…”
Section: Abductive Reasoningmentioning
confidence: 99%