Machine Learning Techniques to Predict Terrorist Attacks: Exemplified by Jama'at Nasr al-Islam wal Muslimin

· · · · ·
· Springer Nature
Ebook
132
Pages
Ratings and reviews aren’t verified  Learn More

About this ebook

One of the most influential actors in spreading Islamist violence across the Sahel is Jama’at Nasr Al Islam Wal Muslimin (JNIM).This book provides the first systematic quantitative analysis of JNIM’s behavior by analyzing a 12-year database of JNIM’s attacks and the environment surrounding JNIM. This book leverages AI/ML predictive models to accurately predict almost 40 types of attacks using over 80 independent variables.

This book describes a set of temporal probabilistic rules that state that when the environment in which the group operates satisfies some conditions, then an attack of a certain type will likely occur in the next N months. This provides a deep, easy to comprehend understanding of the conditions under which JNIM carries various kinds of attacks up to 6 months into the future.

This book will serve as an invaluable guide to scholars (computer scientists, political scientists, policy makers). Military officers, intelligence personnel, and government employees, who seek to understand, predict, and eventually mitigate attacks by JNIM and bring peace to the nations of Mali, Burkina Faso, and Niger will want to purchase this book as well.

About the author

Laura Mostert is an officer in the Royal Netherlands Air Force with a background in war studies and cyber security governance.

Roy Lindelauf is the Chair Data Science in Military Operations at Faculty of Military Sciences at Netherlands Defence Academy and an Endowed Chair Data Science for Safety, Security at the Department of Cognitive Science & Artificial Intelligence at Tilburg School of Humanities and Digital Sciences. He is also Head of Data Science Center of Excellence at Netherlands Ministry of Defence.

Chiara Pulice is a Senior Research Associate in computer science with Northwestern University, Evanston, IL, USA. Her research interests include counter-terrorism and machine learning. She received the Ph.D. degree in computer and systems engineering from the University of Calabria, Cosenza, Italy, in 2015.

Marnix Provoost is an active duty officer in the Royal Netherlands Army. He holds a Master’s degree in Military Strategic Studies and is currently positioned at the Netherlands Defence Academy as a fulltime PhD student. His research is focused on insurgencies and their analogies with state formation.

Priyanka Amin has recently finished her undergraduate degree in computer science and global history at Northwestern University.

V.S. Subrahmanian is the Walter P. Murphy Professor of Computer Science and Buffett Faculty Fellow in the Buffett Institute for Global Affairs at Northwestern University where he also heads the Northwestern Security & AI Lab. He is one of the world’s foremost experts at the intersection of AI and Security matters ranging from counterterrorism to cybersecurity to border issues and warfare. An elected Fellow of AAAI and AAAS, he has previously served as Director of the Institute for Security, Technology, and Society at Dartmouth College and as Director of the University of Maryland Institute for Advanced Computer Studies.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.