001433151 000__ 04438cam\a2200733\i\4500 001433151 001__ 1433151 001433151 003__ OCoLC 001433151 005__ 20230309003551.0 001433151 006__ m\\\\\o\\d\\\\\\\\ 001433151 007__ cr\nn\nnnunnun 001433151 008__ 201211s2021\\\\sz\a\\\\ob\\\\000\0\eng\d 001433151 019__ $$a1226783130$$a1227386821$$a1228843906$$a1232853945$$a1241065628$$a1244634200$$a1246359419$$a1249944411$$a1253404082 001433151 020__ $$a9783030606145$$q(electronic bk.) 001433151 020__ $$a3030606147$$q(electronic bk.) 001433151 020__ $$a9783030606152$$q(print) 001433151 020__ $$a3030606155 001433151 020__ $$a9783030606169$$q(print) 001433151 020__ $$a3030606163 001433151 020__ $$z9783030606138 001433151 020__ $$z3030606139 001433151 0247_ $$a10.1007/978-3-030-60614-5$$2doi 001433151 035__ $$aSP(OCoLC)1228649730 001433151 040__ $$aSFB$$beng$$erda$$epn$$cSFB$$dOCLCO$$dOCLCF$$dGW5XE$$dUPM$$dERF$$dEBLCP$$dYDX$$dOCLCO$$dLEATE$$dVT2$$dLIP$$dOCL$$dN$T$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001433151 049__ $$aISEA 001433151 050_4 $$aHV6433.A35 001433151 08204 $$a363.325096$$223 001433151 1001_ $$aSubrahmanian, V. S.,$$eauthor. 001433151 24512 $$aA machine learning based model of Boko Haram /$$cV.S. Subrahmanian, Chiara Pulice, James F. Brown, Jacob Bonen-Clark ; foreword by Geert Kuiper. 001433151 264_1 $$aCham :$$bSpringer,$$c[2021] 001433151 300__ $$a1 online resource (xii, 135 pages) :$$billustrations (chiefly color) 001433151 336__ $$atext$$btxt$$2rdacontent 001433151 337__ $$acomputer$$bc$$2rdamedia 001433151 338__ $$aonline resource$$bcr$$2rdacarrier 001433151 347__ $$atext file 001433151 347__ $$bPDF 001433151 4901_ $$aTerrorism, security, and computation,$$x2197-8778 001433151 504__ $$aIncludes bibliographical references. 001433151 5050_ $$aChapter 1: Introduction -- Chapter 2: History of Boko Haram -- Chapter 3: Temporal Probabilistic Rules and Policy Computation Algorithms -- Chapter 4: Sexual Violence -- Chapter 5: Suicide Bombings -- Chapter 6: Abductions -- Chapter 7: Arson -- Chapter 8: Other Types of Attacks -- Appendix A: All TP-Rules -- Appendix B: Data Collection -- Appendix C: Most Used Variables -- Appendix D: Sample Boko Haram Report. 001433151 506__ $$aAccess limited to authorized users. 001433151 520__ $$aThis is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram's behavior and reduce attacks by them. This book also identifies conditions that predict sexual violence, suicide bombings and attempted bombings, abduction, arson, looting, and targeting of government officials and security installations. After reducing Boko Haram's history to a spreadsheet containing monthly information about different types of attacks and different circumstances prevailing over a 9 year period, this book introduces Temporal Probabilistic (TP) rules that can be automatically learned from data and are easy to explain to policy makers and security experts. This book additionally reports on over 1 year of forecasts made using the model in order to validate predictive accuracy. It also introduces a policy computation method to rein in Boko Haram's attacks. Applied machine learning researchers, machine learning experts and predictive modeling experts agree that this book is a valuable learning asset. Counter-terrorism experts, national and international security experts, public policy experts and Africa experts will also agree this book is a valuable learning tool. 001433151 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 24, 2021). 001433151 61020 $$aBoko Haram. 001433151 650_0 $$aTerrorism$$xForecasting. 001433151 650_0 $$aTerrorism$$xPrevention. 001433151 650_0 $$aMachine learning. 001433151 650_0 $$aData mining. 001433151 650_0 $$aPolitical violence. 001433151 650_6 $$aTerrorisme$$xPrévision. 001433151 650_6 $$aTerrorisme$$xPrévention. 001433151 650_6 $$aApprentissage automatique. 001433151 650_6 $$aExploration de données (Informatique) 001433151 650_6 $$aViolence politique. 001433151 655_0 $$aElectronic books. 001433151 7001_ $$aPulice, Chiara,$$eauthor. 001433151 7001_ $$aBrown, James F.,$$eauthor. 001433151 7001_ $$aBonen-Clark, Jacob,$$eauthor. 001433151 77608 $$iPrint version:$$z3030606139 001433151 830_0 $$aTerrorism, security, and computation.$$x2197-8778 001433151 852__ $$bebk 001433151 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-60614-5$$zOnline Access$$91397441.1 001433151 909CO $$ooai:library.usi.edu:1433151$$pGLOBAL_SET 001433151 980__ $$aBIB 001433151 980__ $$aEBOOK 001433151 982__ $$aEbook 001433151 983__ $$aOnline 001433151 994__ $$a92$$bISE