Indian Mujahideen Computational Analysis and Public Policy /

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analyst...

Full description

Main Authors: Subrahmanian, V.S. (Author, http://id.loc.gov/vocabulary/relators/aut), Mannes, Aaron. (http://id.loc.gov/vocabulary/relators/aut), Roul, Animesh. (http://id.loc.gov/vocabulary/relators/aut), Raghavan, R.K. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2013.
Edition:1st ed. 2013.
Series:Terrorism, Security, and Computation,
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-02818-7
Table of Contents:
  • Introduction
  • Indian Mujahideen (IM)
  • Temporal Probabilistic Behavior Rules
  • Targeting Public Sites
  • Bombings
  • Simultaneous and Timed Attacks
  • Total Deaths in IM Attacks
  • Computing Policy Options
  • Suggested Counter-Terrorism Policies
  • Building a National Counter-Terrorism Center
  • Appendix A: Data Methodology
  • Appendix B: List of All Terrorist Attacks Carried out by IM
  • Appendix C: Temporal Probabilistic Rules Presented in This Book
  • Appendix D: Instances of Improved Diplomatic Relations between India and Pakistan
  • Appendix E: Instances of Indian Mujahideen Conferences
  • Appendix F: Indian Mujahideen Claims of Responsibility for Attacks
  • Appendix G: Instances of Indian Mujahideen Communications about its Terror Campaign.