首页> 美国政府科技报告 >Examining a Terrorist Network Using Contingency Table Analysis.
【24h】

Examining a Terrorist Network Using Contingency Table Analysis.

机译:使用列联表分析检查恐怖网络。

获取原文

摘要

The information revolution of the 21st century has changed the nature of war to focus on the area of network-centric warfare. While the number and strength of dark networks continue to increase, the U.S. Department of Defense seeks to identify, predict, and counteract possible terrorist threats. The intelligence community is undertaking the seemingly impossible task of using the information that is currently available through social networks and military reports. This report will examine the Ali Baba data set that was created in 2003 for the National Security Agency (NSA) by Mark Jaworoski and Steve Pavlak. The Ali Baba data set contains fictitious Word documents that have recorded the actions of a suspected terrorist network. This report will demonstrate the use of statistics in examining terrorist organizations. Specifically, it will determine if contingency table analysis using the R programming language can be used to analyze a terrorist network.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号