Indian Mujahideen Computational Analysis and Public Policy /
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analyst...
Main Authors: | , , , |
---|---|
Corporate Author: | |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2013.
|
Edition: | 1st ed. 2013. |
Series: | Terrorism, Security, and Computation,
|
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-319-02818-7 |
Table of Contents:
- Introduction
- Indian Mujahideen (IM)
- Temporal Probabilistic Behavior Rules
- Targeting Public Sites
- Bombings
- Simultaneous and Timed Attacks
- Total Deaths in IM Attacks
- Computing Policy Options
- Suggested Counter-Terrorism Policies
- Building a National Counter-Terrorism Center
- Appendix A: Data Methodology
- Appendix B: List of All Terrorist Attacks Carried out by IM
- Appendix C: Temporal Probabilistic Rules Presented in This Book
- Appendix D: Instances of Improved Diplomatic Relations between India and Pakistan
- Appendix E: Instances of Indian Mujahideen Conferences
- Appendix F: Indian Mujahideen Claims of Responsibility for Attacks
- Appendix G: Instances of Indian Mujahideen Communications about its Terror Campaign.