ТОП просматриваемых книг сайта:
Intelligent Data Analytics for Terror Threat Prediction. Группа авторов
Читать онлайн.Название Intelligent Data Analytics for Terror Threat Prediction
Год выпуска 0
isbn 9781119711513
Автор произведения Группа авторов
Жанр Программы
Издательство John Wiley & Sons Limited
Table of Contents
1 Cover
4 Preface
5 1 Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media 1.1 Introduction 1.2 Social Networks 1.3 What Is Cyber-Crime? 1.4 Rumor Detection 1.5 Factors to Detect Rumor Source 1.6 Source Detection in Network 1.7 Conclusion References
6 2 Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction 2.1 Introduction 2.2 Advancement of Internet 2.3 Internet of Things (IoT) and Machine to Machine (M2M) Communication 2.4 A Definition of Security Frameworks 2.5 M2M Devices and Smartphone Technology 2.6 Explicit Hazards to M2M Devices Declared by Smartphone Challenges 2.7 Security and Privacy Issues in IoT 2.8 Protection in Machine to Machine Communication 2.9 Use Cases for M2M Portability 2.10 Conclusion References
7 3 Crime Predictive Model Using Big Data Analytics 3.1 Introduction 3.2 Crime Data Mining 3.3 Visual Data Analysis 3.4 Technological Analysis 3.5 Big Data Framework 3.6 Architecture for Crime Technical Model 3.7 Challenges 3.8 Conclusions References
8 4 The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks 4.1 Introduction 4.2 Database and Methods 4.3 Discussion and Analysis 4.4 Role of Remote Sensing and GIS 4.5 Cartographic Model 4.6 Mapping Techniques Used for Defense Purposes 4.7 Naval Operations 4.8 Future Sphere of GIS in Military Science 4.9 Terrain Evolution 4.10 Conclusion References
9 5 Text Mining for Secure Cyber Space 5.1 Introduction 5.2 Literature Review 5.3 Latent Semantic Analysis 5.4 Proposed Work 5.5 Detailed Work Flow of Proposed Approach 5.6 Results and Discussion 5.7 Conclusion References
10 6 Analyses on Artificial Intelligence Framework to Detect Crime Pattern 6.1 Introduction 6.2 Related Works 6.3 Proposed Clustering for Detecting Crimes 6.4 Performance Evaluation 6.5 Conclusions References
11 7 A Biometric Technology-Based Framework for Tackling and Preventing Crimes 7.1 Introduction 7.2 Biometrics 7.3 Surveillance Systems (CCTV) 7.4 Legality to Surveillance and Biometrics vs. Privacy and Human Rights 7.5 Proposed Work (Biometric-Based CCTV System) 7.6 Conclusion References
12