Applying methods of scientific inquiry into intelligence, security, and counterterrorism /
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections".
Main Author: | |
---|---|
Format: | text |
Language: | eng |
Published: |
Hershey, PA : IGI Global, Information Science Reference, an imprint of IGI Global,
2019
|
Subjects: | |
Online Access: | https://www.igi-global.com/gateway/book/218561 |
_version_ | 1826469652142751744 |
---|---|
author | Sari, Arif, 1986- editor. 632038 |
author_facet | Sari, Arif, 1986- editor. 632038 |
author_sort | Sari, Arif, 1986- editor. 632038 |
collection | OCEAN |
description | "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections". |
first_indexed | 2024-03-05T16:36:29Z |
format | text |
id | KOHA-OAI-TEST:590093 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T16:36:29Z |
publishDate | 2019 |
publisher | Hershey, PA : IGI Global, Information Science Reference, an imprint of IGI Global, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5900932021-10-02T00:23:50ZApplying methods of scientific inquiry into intelligence, security, and counterterrorism / Sari, Arif, 1986- editor. 632038 text Electronic books 631902 Hershey, PA : IGI Global, Information Science Reference, an imprint of IGI Global,2019eng"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections".Includes bibliographical references (pages 360-388) and index."This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections".Cyber intelligence (Computer security)Cyberterrorismhttps://www.igi-global.com/gateway/book/218561URN:ISBN:Remote access restricted to users with a valid UTM ID via VPN |
spellingShingle | Cyber intelligence (Computer security) Cyberterrorism Sari, Arif, 1986- editor. 632038 Applying methods of scientific inquiry into intelligence, security, and counterterrorism / |
title | Applying methods of scientific inquiry into intelligence, security, and counterterrorism / |
title_full | Applying methods of scientific inquiry into intelligence, security, and counterterrorism / |
title_fullStr | Applying methods of scientific inquiry into intelligence, security, and counterterrorism / |
title_full_unstemmed | Applying methods of scientific inquiry into intelligence, security, and counterterrorism / |
title_short | Applying methods of scientific inquiry into intelligence, security, and counterterrorism / |
title_sort | applying methods of scientific inquiry into intelligence security and counterterrorism |
topic | Cyber intelligence (Computer security) Cyberterrorism |
url | https://www.igi-global.com/gateway/book/218561 |
work_keys_str_mv | AT sariarif1986editor632038 applyingmethodsofscientificinquiryintointelligencesecurityandcounterterrorism |