Normal view MARC view ISBD view

Applications of information systems to homeland security and defense / Hussein A. Abbass, Daryl Essam [editors].

Contributor(s): Abbass, Hussein A | Essam, Daryl, 1969- | IGI Global.
Material type: TextTextSeries: IGI Global Research Collection.Publisher: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2006Description: electronic texts (xii, 257 p. : ill. (some col.), col. maps) : digital files.ISBN: 9781591406433 (PDF); 1591406439 (PDF).Subject(s): Artificial intelligence -- Military applications | Information storage and retrieval systems | National security -- Technological innovations -- United States | Military art and science -- Data processing | Terrorism -- Prevention -- Technological innovations -- United StatesDDC classification: 363.32/0285 LOC classification: UG479 | .A67 2006Online resources: Click here to view this ebook. Also available in print.
Contents:
1. All hazards analysis : a complexity perspective / Daryl Essam, Hussein A. Abbass -- 2. Small & simple : application-specific multi-agent systems / Michael Barlow, Robert Cox -- 3. How hard is it to red team? / Ang Yang, Hussein A. Abbass, Ruhul Sarker -- 4. Network robustness for critical infrastructure networks / Anthony H. Dekker, Bernard Colbert -- 5. Distributed intrusion detection systems : a computational intelligence approach / Ajith Abraham, Johnson Thomas -- 6. The game of defense and security / Michael Barlow -- 7. Realized applications of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 8. The advancement of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 9. Simulating complexity-based ethics for crucial decision making in counter terrorism / Cecilia Andrews, Edward Lewis.
Summary: A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and defense applications. In today's uncertain times, these techniques can provide a breakthrough in the capability to model, plan and respond to critical events in modern society.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
UG479 .A67 2006 (Browse shelf) https://ezproxy.uttyler.edu/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-640-2 Available ocn707617025

Includes bibliographical references and index.

1. All hazards analysis : a complexity perspective / Daryl Essam, Hussein A. Abbass -- 2. Small & simple : application-specific multi-agent systems / Michael Barlow, Robert Cox -- 3. How hard is it to red team? / Ang Yang, Hussein A. Abbass, Ruhul Sarker -- 4. Network robustness for critical infrastructure networks / Anthony H. Dekker, Bernard Colbert -- 5. Distributed intrusion detection systems : a computational intelligence approach / Ajith Abraham, Johnson Thomas -- 6. The game of defense and security / Michael Barlow -- 7. Realized applications of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 8. The advancement of positioning technologies in defense intelligence / Katina Michael, Amelia Masters -- 9. Simulating complexity-based ethics for crucial decision making in counter terrorism / Cecilia Andrews, Edward Lewis.

Restricted to subscribers or individual electronic text purchasers.

A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and defense applications. In today's uncertain times, these techniques can provide a breakthrough in the capability to model, plan and respond to critical events in modern society.

Also available in print.

Mode of access: World Wide Web.

There are no comments for this item.

Log in to your account to post a comment.