期刊文献+
共找到71篇文章
< 1 2 4 >
每页显示 20 50 100
Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
1
作者 Mohammed Abdalsalam Chunlin Li +1 位作者 Abdelghani Dahou Natalia Kryvinska 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1427-1467,共41页
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli... One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier. 展开更多
关键词 Artificial intelligence machine learning natural language processing data analytic DistilBERT feature extraction terrorism classification GTD dataset
下载PDF
Cybersecurity and Domestic Terrorism: Purpose and Future
2
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期548-560,共13页
The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electroni... The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity. 展开更多
关键词 Cyber-Attacks CYBERCRIME CYBERSECURITY Cyber Threats Domestic terrorism
下载PDF
Disaster preparedness, pediatric considerations in primary blast injury, chemical, and biological terrorism 被引量:14
3
作者 Mitchell Hamele William Bradley Poss Jill Sweney 《World Journal of Critical Care Medicine》 2014年第1期15-23,共9页
Both domestic and foreign terror incidents are an unfortunate outgrowth of our modern times from the Oklahoma City bombings, Sarin gas attacks in Japan, the Madrid train bombing, anthrax spores in the mail, to the Wor... Both domestic and foreign terror incidents are an unfortunate outgrowth of our modern times from the Oklahoma City bombings, Sarin gas attacks in Japan, the Madrid train bombing, anthrax spores in the mail, to the World Trade Center on September 11 th, 2001. The modalities used to perpetrate these terrorist acts range from conventional weapons to high explosives, chemical weapons, and biological weapons all of which have been used in the recent past. While these weapons platforms can cause significant injury requiring critical care the mechanism of injury, pathophysiology and treatment of these injuries are unfamiliar to many critical care providers. Additionally the pediatric population is particularly vulnerable to these types of attacks. In the event of a mass casualty incident both adult and pediatric critical care practitioners will likely be called upon to care for children and adults alike. We will review the presentation, pathophysiology, and treatment of victims of blast injury, chemical weapons, and biological weapons. The focus will be on those injuries not commonly encountered in critical care practice, primary blast injuries, category A pathogens likely to be used in terrorist incidents, and chemical weapons including nerve agents, vesicants, pulmonary agents, cyanide, and riot control agents with special attention paid to pediatric specific considerations. 展开更多
关键词 terrorism BIOterrorism CHEMICAL terrorism Blast injuries Mass CASUALTY incidents DISASTERS PEDIATRICS
下载PDF
Media Coverage of Terrorism and Mental Health Concerns among Youth: Testing Moderated Mediation by Spirituality and Resilience
4
作者 Mian Ahmad Hanan Arooj Arshad +1 位作者 Noshina Saleem Shamaila Asad 《International Journal of Mental Health Promotion》 2021年第4期565-575,共11页
Previous research on media coverage of terrorism and its associated psychological consequences was explored internationally particularly after 9/11 attacks in the US.Also,the constructive role of resilience in this tr... Previous research on media coverage of terrorism and its associated psychological consequences was explored internationally particularly after 9/11 attacks in the US.Also,the constructive role of resilience in this traumatic era has also been explored internationally.However,some studies have been conducted on the effect of media coverage of national terrorism on people that have endured a nearby terrorist attack.Moreover,knowledge about how the media coverage of terrorism,as a secondary source of evidence,can have devastated effects on native’s mental health and how resilience work in this relationship is rather limited.For example,it is possible that different cultures have their own coping strategies(resilience&spirituality)to be adopted as they perceive and respond to terrorism coverage on media differently.Hence,this study examines the moderated role of spirituality as an adaptive mechanism along with resilience as a mediating factor in the relationship between media coverage of terrorists’incidents and mental health concerns such as perceived stress,generalized anxiety and perceived fear among Pakistani youth.Thefindings show significant results as expected,people having high level of spirituality effectively cope with the media coverage of terrorist incidents by facing the situation with more resilient personality and therefore experience less mental health concerns compared to those with low level of spirituality. 展开更多
关键词 Anxiety FEAR online terrorism exposure psychological concerns RESILIENCE stress terrorism coverage
下载PDF
The Origins of the War on Terrorism Paradigm
5
作者 Alex Hobson 《International Relations and Diplomacy》 2020年第3期120-125,共6页
It is now widely accepted among scholars that a new national security paradigm emerged in the United States after 9/11.This paradigm shift accompanied the George W.Bush administration’s declaration of a“global war o... It is now widely accepted among scholars that a new national security paradigm emerged in the United States after 9/11.This paradigm shift accompanied the George W.Bush administration’s declaration of a“global war on terror”and consisted of new interpretations of domestic and international law,new recognition of the threats posed by non-state actors,and a stated determination to eradicate threats everywhere before they emerged.Yet most scholarship has neglected examination of this paradigm’s origins.It became dominant after 9/11,but it did not originate then.Examination of these origins and the original context shows that the war on terrorism paradigm was not created in response to a catastrophic attack on the American“homeland”;rather it arose out of anxieties about U.S.capacity exert its will in the Third World.Its foundations were established long before its post-9/11 revival.This paper places these origins within the context of U.S.-Middle East relations in the 1980s.It reads together the public discourses of Lebanese Hizbullah and of U.S.Secretary of State George P.Shultz who,more than any other U.S.official,promulgated the justifications for the war on terrorism,to show that the notion of a jihad aimed at American power and of a war on terrorism had a basis in anxieties about the capacity of American power in the Middle East.The article uses the author’s original translation of the Hizbullah’s 1985“Open Letter to the Oppressed”alongside George Shultz’s public pronouncements between the start of the U.S.intervention in Lebanon in 1982 and the climax of the Iran-Contra scandal.It argues that provocations of the war on terrorism and the war on terrorism itself emerged out of emotions connected to the efficacy of American power in the Middle East. 展开更多
关键词 terrorism COUNTERterrorism WAR
下载PDF
Awareness of the Potential Threat of Cyberterrorism to the National Security
6
作者 Abdulrahman Alqahtani 《Journal of Information Security》 2014年第4期137-146,共10页
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of sec... The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries, who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This paper uses qualitative data to develop a conceptual framework for awareness of cyberterrorism threat from the viewpoint of experts and security officials in critical infrastructure. Empirical data collected from in-depth interviews were analysed using grounded theory approach. This study applied to Saudi Arabia as a case study. 展开更多
关键词 CYBERterrorism terrorism National Security Critical Infrastructure CONCEPTUAL Framework
下载PDF
The Counterterrorism Mechanism Integrated into Human Rights
7
作者 何志鹏 REN Zhengping(译) 《The Journal of Human Rights》 2019年第5期579-589,共11页
Through investigation and analysis of the counterterrorism operations carried out both at home and abroad,we can draw some initial conclusions on their effectiveness.By its very nature,counterterrorism should be recog... Through investigation and analysis of the counterterrorism operations carried out both at home and abroad,we can draw some initial conclusions on their effectiveness.By its very nature,counterterrorism should be recognized as an integral part of human rights rather than a legal or political mechanism apart from human rights.The serious conflict between the counterterrorism measures and other human rights protection measures results from the scarcity of resources,to which different countries and international community should pay serious attention.Counterterrorism measures should both advance with the times and fully leverage modern technological means.The development idea of a community with a shared future for human beings helps us identify the development direction and fundamental principles of the counterterrorism system. 展开更多
关键词 COUNTERterrorism human RIGHTS RULE of LAW terrorism
下载PDF
U.S. Financial War on Terrorism vs. International Financial System 被引量:1
8
作者 Su Jingxiang Associate Research ProfessorDeputy Director at Division for World Economics Studies, China Institute of Contemporary International Relations. 《Contemporary International Relations》 2002年第4期21-32,共12页
After September 11 events, America has launched a worldwide financial war against terrorism with a series of farreaching measures. It is not only confined to combating international terrorist activities, but will also... After September 11 events, America has launched a worldwide financial war against terrorism with a series of farreaching measures. It is not only confined to combating international terrorist activities, but will also exert great 展开更多
关键词 FATF International Financial System Financial War on terrorism vs U.S
下载PDF
Prediction of Extremist Behaviour and Suicide Bombing from Terrorism Contents Using Supervised Learning
9
作者 Nasir Mahmood Muhammad Usman Ghani Khan 《Computers, Materials & Continua》 SCIE EI 2022年第3期4411-4428,共18页
This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings.By linking‘dots’of police data comprising scattered information of people,groups,logistics,location... This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings.By linking‘dots’of police data comprising scattered information of people,groups,logistics,locations,communication,and spatiotemporal characters on different social media groups,the proposed architecture will spawn beneficial information.This useful information will,in turn,help the police both in predicting potential terrorist events and in investigating previous events.Furthermore,this architecture will aid in the identification of criminals and their associates and handlers.Terrorism is psychological warfare,which,in the broadest sense,can be defined as the utilisation of deliberate violence for economic,political or religious purposes.In this study,a supervised learning-based approach was adopted to develop the proposed architecture.The dataset was prepared from the suicide bomb blast data of Pakistan obtained from the South Asia Terrorism Portal(SATP).As the proposed architecture was simulated,the supervised learning-based classifiers na飗e Bayes and Hoeffding Tree reached 72.17%accuracy.One of the additional benefits this study offers is the ability to predict the target audience of potential suicide bomb blasts,which may be used to eliminate future threats or,at least,minimise the number of casualties and other property losses. 展开更多
关键词 EXTREMISM terrorism suicide bombing crime prediction pattern recognition machine learning supervised learning
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part 1
10
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2019年第11期539-547,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability―theoretical reasonableness of deception,which destroys the system of contracts as a condition of the world order,leaped as a report at the University of London(Birkbeck)on Feb.9,2018,which the relevance of its problems beat real events in because the state of modern“utopianism”―the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence―“occupy”(seizure of the“alien”)―has never changed.As in the case of Marks’s“capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:The norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society―such are the“difficulties to the stars”:Without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra TERROR TROJAN terrorism TIMOR PIRACY technology of lies Myth
下载PDF
On Uzbekistan's Experience Countering Religious Extremism and Terrorism
11
作者 Mirgiyos Azimov 《Contemporary International Relations》 2017年第5期150-154,共5页
Since the first years of independence,Uzbekistan began to develop and implement a policy of countering religious extremism and addressing the ideological basis of terrorism.Taking into consideration the complexity of ... Since the first years of independence,Uzbekistan began to develop and implement a policy of countering religious extremism and addressing the ideological basis of terrorism.Taking into consideration the complexity of this problem,Uzbekistan is comprehensively combating expressions of extremism and terrorism. 展开更多
关键词 Uzbekistan experience religious extremism terrorism
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part Ⅱ
12
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2020年第9期409-417,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability-theoretical reasonableness of Deception,which destroys the system of contracts as a condition of the world order.My report at the University of London(Birkbeck)on Feb.9,2018,which was read in English,still not the latest direct evidence of the use of this scandalous method of“Trojan terrorism”—the defamation of the whole country(Russia),plus violation of territorial integrity,including and military attack,another country that lies on the other side of the ocean(Syria),and which is accused of not living by the rules(the“Absolute”method by Caesar),the relevance of its problems beat real events in because the state of modern“utopianism”-the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence-“occupy”(seizure of the“alien”)-has never changed,and the March-April events in international politics are just another notch on this dead python,which is called“democratic values”.As in the case of Marks’s“Capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:the norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society-such are the“difficulties to the stars”:without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra TERROR “Trojan terrorism PIRACY technology of lies Myth
下载PDF
INTERNATIONAL TERRORISM:NEW TRENDS
13
作者 Qin Xingda Qin Xingda Research Professor,Division for Social Studies,China Institute of Contemporary International Relations. 《Contemporary International Relations》 1998年第2期1-8,共8页
New trends have surfaced in a variety of international struggles and contradic-tions coupled with marked alternations in their manifestations since the end ofthe Cold War.Similarly.international terrorism as a peculia... New trends have surfaced in a variety of international struggles and contradic-tions coupled with marked alternations in their manifestations since the end ofthe Cold War.Similarly.international terrorism as a peculiar phenomenon in con-temporary world politics has also been spreading with some new characteristicsmainly in the following aspects. 展开更多
关键词 In OVER INTERNATIONAL terrorism
下载PDF
The Application of Mixed Method in Developing a Cyber Terrorism Framework
14
作者 Rabiah Ahmad Zahri Yunos 《Journal of Information Security》 2012年第3期209-214,共6页
Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of... Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of mixed method in developing a cyber terrorism framework. This project has two primary goals: firstly is to discover the theory and then develop a conceptual framework that describes the phenomena, and secondly is to verify the conceptual framework that describes the phenomena. In order to achieve conclusive findings of the study, a mixed method research is recommended: qualitative data and quantitative data are collected and analyzed respectively in a separate phase. The mixed method approach improves the rigor and explanation of the research results, thus bring conclusive findings to the study outcome. By utilizing qualitative and quantitative techniques within the same study, we are able to incorporate the strength of both methodologies and fit together the insights into a workable solution. 展开更多
关键词 MIXED Method Research METHODOLOGY DATA Analysis DATA COLLECTION CYBER terrorism
下载PDF
Perception on Cyber Terrorism: A Focus Group Discussion Approach
15
作者 Rabiah Ahmad Zahri Yunos +1 位作者 Shahrin Sahib Mariana Yusoff 《Journal of Information Security》 2012年第3期231-237,共7页
Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study... Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discussion. The proposed cyber terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed cyber terrorism framework is acceptable by the participants. The present study supports our initial research that the cyber terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact. 展开更多
关键词 CYBER terrorism COMPONENTS Framework FOCUS GROUP
下载PDF
Thoughts on Terrorism
16
作者 Li Wei Li Wei is Executive Director at Center for Counter-Terrorism Studies, China Institute of Contemporary International Relations 《Contemporary International Relations》 2001年第10期26-40,共15页
The earthshaking terrorist attacks on the United States on September 11,2001 have once again brought terrorism into focus of the international relations. More and more evidences show that threats of terrorism to the w... The earthshaking terrorist attacks on the United States on September 11,2001 have once again brought terrorism into focus of the international relations. More and more evidences show that threats of terrorism to the world peace and development as well as the international communlty are on theincrease. Worse stin, it has become more possible that the 展开更多
关键词 Thoughts on terrorism
下载PDF
The Fight Against Terrorism and Extremism and Human Rights Protection in Xinjiang
17
作者 《The Journal of Human Rights》 2019年第3期365-383,共19页
March 2019 Contents Foreword I.Xinjiang Has Long Been an Inseparable Part of Chinese Territory II.The Origin of Terrorism and Extremism in Xinjiang III.Violent Terrorism and Religious Extremism Are Grave Abuses of Hum... March 2019 Contents Foreword I.Xinjiang Has Long Been an Inseparable Part of Chinese Territory II.The Origin of Terrorism and Extremism in Xinjiang III.Violent Terrorism and Religious Extremism Are Grave Abuses of Human Rights IV.Striking at Terrorism and Extremism in Accordance with the Law V.Giving Top Priority to a Preventive Counterterrorism Approach VI.Finding Experience for Counterterrorism and De-radicalization VII. 展开更多
关键词 China The FIGHT AGAINST terrorism and EXTREMISM Human RIGHTS Protection in XINJIANG
下载PDF
Protection of Basic Human Rights in the Application of Big Data to Counter Terrorism
18
作者 夏雨 齐延平 PAN Yingzhao(译) 《The Journal of Human Rights》 2019年第5期590-602,共13页
In the era of big data,the ways people work,live and think have changed dramatically,and the social governance system is also being restructured.Achieving intelligent social governance has now become a national strate... In the era of big data,the ways people work,live and think have changed dramatically,and the social governance system is also being restructured.Achieving intelligent social governance has now become a national strategy.The application of big data technology to counterterrorism efforts has become a powerful weapon for all countries.However,due to the uncertainty,difficulty of interpretation and potential risk of discrimination in big data technology and algorithm models,basic human rights,freedom and even ethics are likely to be impacted and challenged.As a result,there is an urgent need to prioritize basic human rights and regulate the application of big data for counter terrorism purposes.The legislation and law enforcement regarding the use of big data to counter terrorism must be subject to constitutional and other legal reviews,so as to strike a balance between safeguarding national security and protecting basic human rights. 展开更多
关键词 the application of BIG data to COUNTER terrorism algorithm DISCRIMINATION national security basic human RIGHTS the principle of BALANCE
下载PDF
On the Conflict and Balance Between Anti-terrorism and Protection of Human Rights
19
作者 丁守庆 古丽燕 LU Mimi(译) 《The Journal of Human Rights》 2019年第5期564-578,共15页
With the increasingly serious global terrorism situation,all countries have continuously revised their anti-terrorism laws and related criminal laws,adopting legislation to restrict and derogate civil liberties,increa... With the increasingly serious global terrorism situation,all countries have continuously revised their anti-terrorism laws and related criminal laws,adopting legislation to restrict and derogate civil liberties,increased the punishment for terrorists,and adopted corresponding anti-terrorism measures to increase monitoring of suspicious persons.In this context,conflicts and contradictions in human rights protection and the fight against terrorism often arise.The Xinjiang uygur Autonomous Region is at the forefront of China’s anti-terrorism efforts.Facing the special situation of dealing simultaneously with the slowdown in economic growth,making difficult structural adjustments,and absorbing the effects of the previous economic stimulus policies,since 2014,the local government of Xinjiang has adopted a combination of measures on anti-terrorism and de-extremism work and achieved significant results under the correct guidance of the strategy of governance in Xinjiang proposed by the central government.The most important consideration of anti-terrorism lies in the analysis Chinese and Western human rights values,coordinate and balance the relationship between anti-terrorism and human rights protection within the existing legal framework. 展开更多
关键词 terrorism XINJIANG GOVERNANCE human RIGHTS PROTECTION
下载PDF
A Forensic Investigation of Terrorism in Nigeria: An Apriori Algorithm Approach
20
作者 Aamo Iorliam Raymond U. Dugeri +1 位作者 Beatrice O. Akumba Samera Otor 《Journal of Information Security》 2021年第4期270-280,共11页
Investigations towards studying terrorist activities have recently attracted a great amount of research interest. In this paper, we investigate the use of the Apriori algorithm on the Global Terrorism Database (GTD) f... Investigations towards studying terrorist activities have recently attracted a great amount of research interest. In this paper, we investigate the use of the Apriori algorithm on the Global Terrorism Database (GTD) for forensic investigation purposes. Recently, the Apriori algorithm, which could be considered a forensic tool</span><span style="font-family:Verdana;">,</span><span style="font-family:Verdana;"> has been used to study terrorist activities and patterns across the world. As such, our motivation is to utilise the Apriori algorithm approach on the GTD to study terrorist activities and the areas/states in Nigeria with high frequencies of terrorist activities. We observe that the most preferred method of terrorist attacks in Nigeria is through armed assault. Again, our experiment shows that attacks in Nigeria are mostly successful. Also, we observe from our investigations that most terrorists in Nigeria are not suicidal. The main application of this work can be used by forensic experts to assist law enforcement agencies in decision making when handling terrorist attacks in Nigeria</span><span style="font-family:Verdana;">. </p> 展开更多
关键词 FORENSICS terrorism NIGERIA Apriori Algorithm
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部