Out of the ordinary : finding hidden threats by analyzing unusual behavior /

Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypo...

Whakaahuatanga katoa

Ngā taipitopito rārangi puna kōrero
Kaituhi rangatōpū: Rand Corporation
Ētahi atu kaituhi: Hollywood, John S., 1973-
Hōputu: Licensed eBooks
Reo:Ingarihi
I whakaputaina: Santa Monica, Calif. : RAND Corp., 2004.
Urunga tuihono:https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304908
Rārangi ihirangi:
  • Introduction
  • Data analyzed in the ASAP Schema
  • The Atypical Signal Analysis and Processing Architecture
  • Finding the dots
  • Connecting the dots
  • Understanding the dots: generating and testing hypotheses
  • Conclusion
  • Case study: "The November 9th incident"
  • Systems realted to the ASAP architecture.