Applying methods of scientific inquiry into intelligence, security, and counterterrorism /

"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections".

Bibliographic Details
Main Author: Sari, Arif, 1986- editor. 632038
Format: text
Language:eng
Published: Hershey, PA : IGI Global, Information Science Reference, an imprint of IGI Global, 2019
Subjects:
Online Access:https://www.igi-global.com/gateway/book/218561
_version_ 1826469652142751744
author Sari, Arif, 1986- editor. 632038
author_facet Sari, Arif, 1986- editor. 632038
author_sort Sari, Arif, 1986- editor. 632038
collection OCEAN
description "This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections".
first_indexed 2024-03-05T16:36:29Z
format text
id KOHA-OAI-TEST:590093
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:36:29Z
publishDate 2019
publisher Hershey, PA : IGI Global, Information Science Reference, an imprint of IGI Global,
record_format dspace
spelling KOHA-OAI-TEST:5900932021-10-02T00:23:50ZApplying methods of scientific inquiry into intelligence, security, and counterterrorism / Sari, Arif, 1986- editor. 632038 text Electronic books 631902 Hershey, PA : IGI Global, Information Science Reference, an imprint of IGI Global,2019eng"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections".Includes bibliographical references (pages 360-388) and index."This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections".Cyber intelligence (Computer security)Cyberterrorismhttps://www.igi-global.com/gateway/book/218561URN:ISBN:Remote access restricted to users with a valid UTM ID via VPN
spellingShingle Cyber intelligence (Computer security)
Cyberterrorism
Sari, Arif, 1986- editor. 632038
Applying methods of scientific inquiry into intelligence, security, and counterterrorism /
title Applying methods of scientific inquiry into intelligence, security, and counterterrorism /
title_full Applying methods of scientific inquiry into intelligence, security, and counterterrorism /
title_fullStr Applying methods of scientific inquiry into intelligence, security, and counterterrorism /
title_full_unstemmed Applying methods of scientific inquiry into intelligence, security, and counterterrorism /
title_short Applying methods of scientific inquiry into intelligence, security, and counterterrorism /
title_sort applying methods of scientific inquiry into intelligence security and counterterrorism
topic Cyber intelligence (Computer security)
Cyberterrorism
url https://www.igi-global.com/gateway/book/218561
work_keys_str_mv AT sariarif1986editor632038 applyingmethodsofscientificinquiryintointelligencesecurityandcounterterrorism