Applying methods of scientific inquiry into intelligence, security, and counterterrorism /
"This book examines the foremost techniques of hidden link predictions in stochastic social networks. It deals, principally, with methods and approaches that involve similarity index techniques, matrix factorization, reinforcement models, graph representations and community detections".
Main Author: | Sari, Arif, 1986- editor. 632038 |
---|---|
Format: | text |
Language: | eng |
Published: |
Hershey, PA : IGI Global, Information Science Reference, an imprint of IGI Global,
2019
|
Subjects: | |
Online Access: | https://www.igi-global.com/gateway/book/218561 |
Similar Items
-
Computer Security Threats /
by: Thomas, Ciza, editor 649415, et al.
Published: (2020) -
Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level /
by: Skopik, Florian editor
Published: (2018) -
Cyber crime, security and digital intelligence /
by: Johnson, Mark, 1959- author
Published: (2013) -
Stealing the network : the complete series collector's edition /
by: 273249 Russell, Ryan, et al.
Published: (2009) -
Websters new world hacker dictionary /
by: Schell, Bernadette H. (Bernadette Hlubik), 1952-, et al.
Published: (2006)