首页> 外文会议>Social computing, behavioral-cultural modeling and prediction >Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons
【24h】

Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons

机译:轮廓相似度方法论在识别使用或追求CBRN武器的恐怖分子团体中的应用

获取原文
获取原文并翻译 | 示例

摘要

No single profile fits all CBRN-active groups, and therefore it is important to identify multiple profiles. In the analysis of terrorist organizations, linear and generalized regression modeling provide a set of tools to apply to data that is in the form of cases (named groups) by variables (traits and behaviors of the groups). We turn the conventional regression modeling "inside out" to reveal a network of relations among the cases on the basis of their attribute and behavioral similarity. We show that a network of profile similarity among the cases is built in to standard regression modeling, and that the exploitation of this aspect leads to new insights helpful in the identification of multiple profiles for actors. Our application builds on a study of 108 Islamic jihadist organizations that predicts use or pursuit of CBRN weapons.
机译:没有单个配置文件适合所有CBRN活动组,因此识别多个配置文件很重要。在对恐怖组织的分析中,线性回归和广义回归建模提供了一套工具,可通过变量(群体的特征和行为)应用于案例(命名群体)形式的数据。我们将传统的回归建模“由内而外”,以根据案例的属性和行为相似性揭示案例之间的关系网络。我们表明,案例之间的配置文件相似性网络已内置到标准回归模型中,并且这一方面的利用导致了新的见解,有助于为演员确定多个配置文件。我们的应用基于对108个伊斯兰圣战组织的研究,该组织预测了CBRN武器的使用或追求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号