A Bayesian decision support system for counteracting activities of
terrorist groups
- URL: http://arxiv.org/abs/2007.04410v2
- Date: Thu, 16 Dec 2021 11:41:22 GMT
- Title: A Bayesian decision support system for counteracting activities of
terrorist groups
- Authors: Aditi Shenvi, F. Oliver Bunnin, Jim Q. Smith
- Abstract summary: Terrorist groups present a serious threat to the security and well-being of the general public.
Such observable behaviour and communications data can be utilised by the authorities to estimate the threat posed by a terrorist group.
Here we develop a Bayesian integrating decision support system that can bring together information relating to each of the members of a terrorist group as well as the combined activities of the group.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Activities of terrorist groups present a serious threat to the security and
well-being of the general public. Counterterrorism authorities aim to identify
and frustrate the plans of terrorist groups before they are put into action.
Whilst the activities of terrorist groups are likely to be hidden and
disguised, the members of such groups need to communicate and coordinate to
organise their activities. Such observable behaviour and communications data
can be utilised by the authorities to estimate the threat posed by a terrorist
group. However, to be credible, any such statistical model needs to fold in the
level of threat posed by each member of the group. Unlike in other benign forms
of social networks, considering the members of terrorist groups as exchangeable
gives an incomplete picture of the combined capacity of the group to do harm.
Here we develop a Bayesian integrating decision support system that can bring
together information relating to each of the members of a terrorist group as
well as the combined activities of the group.
Related papers
- Analysis of Unstructured High-Density Crowded Scenes for Crowd Monitoring [55.2480439325792]
We are interested in developing an automated system for detection of organized movements in human crowds.
Computer vision algorithms can extract information from videos of crowded scenes.
We can estimate the number of participants in an organized cohort.
arXiv Detail & Related papers (2024-08-06T22:09:50Z) - Multi-granular Adversarial Attacks against Black-box Neural Ranking Models [111.58315434849047]
We create high-quality adversarial examples by incorporating multi-granular perturbations.
We transform the multi-granular attack into a sequential decision-making process.
Our attack method surpasses prevailing baselines in both attack effectiveness and imperceptibility.
arXiv Detail & Related papers (2024-04-02T02:08:29Z) - Dynamic Matrix of Extremisms and Terrorism (DMET): A Continuum Approach
Towards Identifying Different Degrees of Extremisms [0.0]
We propose to extend the current binary understanding of terrorism (versus non-terrorism) with a Dynamic Matrix of Extremisms and Terrorism (DMET)
DMET considers the whole ecosystem of content and actors that can contribute to a continuum of extremism.
It organizes levels of extremisms by varying degrees of ideological engagement and the presence of violence.
arXiv Detail & Related papers (2023-12-01T04:13:48Z) - Hunting Group Clues with Transformers for Social Group Activity
Recognition [3.1061678033205635]
Social group activity recognition requires recognizing multiple sub-group activities and identifying group members.
Most existing methods tackle both tasks by refining region features and then summarizing them into activity features.
We propose to leverage attention modules in transformers to generate effective social group features.
Our method is designed in such a way that the attention modules identify and then aggregate features relevant to social group activities.
arXiv Detail & Related papers (2022-07-12T01:46:46Z) - Certifiably Robust Policy Learning against Adversarial Communication in
Multi-agent Systems [51.6210785955659]
Communication is important in many multi-agent reinforcement learning (MARL) problems for agents to share information and make good decisions.
However, when deploying trained communicative agents in a real-world application where noise and potential attackers exist, the safety of communication-based policies becomes a severe issue that is underexplored.
In this work, we consider an environment with $N$ agents, where the attacker may arbitrarily change the communication from any $CfracN-12$ agents to a victim agent.
arXiv Detail & Related papers (2022-06-21T07:32:18Z) - Zero-Query Transfer Attacks on Context-Aware Object Detectors [95.18656036716972]
Adversarial attacks perturb images such that a deep neural network produces incorrect classification results.
A promising approach to defend against adversarial attacks on natural multi-object scenes is to impose a context-consistency check.
We present the first approach for generating context-consistent adversarial attacks that can evade the context-consistency check.
arXiv Detail & Related papers (2022-03-29T04:33:06Z) - Multi-modal Networks Reveal Patterns of Operational Similarity of
Terrorist Organizations [8.813290741555994]
We propose a novel computational framework for detecting clusters of terrorist groups sharing similar behaviors.
We show that over the years global terrorism has been characterized by increasing operational cohesiveness.
Third, we demonstrate that operational similarity between two organizations is driven by three factors.
arXiv Detail & Related papers (2021-12-15T09:50:11Z) - An Investigation And Insight Into Terrorism In Nigeria [0.0]
This paper studies the terrorist activities in Nigeria from 1970 to 2019.
Insights are made on the occurrences of terrorist attacks, the localities of the target, and the successful and unsuccessful rates of such attacks.
arXiv Detail & Related papers (2021-09-22T20:22:43Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z) - Overcoming Data Sparsity in Group Recommendation [52.00998276970403]
Group recommender systems should be able to accurately learn not only users' personal preferences but also preference aggregation strategy.
In this paper, we take Bipartite Graphding Model (BGEM), the self-attention mechanism and Graph Convolutional Networks (GCNs) as basic building blocks to learn group and user representations in a unified way.
arXiv Detail & Related papers (2020-10-02T07:11:19Z) - A Complex Networks Approach to Find Latent Clusters of Terrorist Groups [5.746505534720595]
We build a multi-partite network that includes terrorist groups and related information on tactics, weapons, targets, active regions.
We show that groups belonging to opposite ideologies can share very common behaviors and that Islamist/jihadist groups hold behavioral characteristics with respect to the others.
arXiv Detail & Related papers (2020-01-10T10:08:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.