Open Access Open Access  Restricted Access Subscription or Fee Access

Security System Allocation with Terrorist Attacks

K. Senthamarai Kannan, M. Manikandan, S. Arumugam

Abstract


Data mining is one of the important methods of finding terrorist attacks and it is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. It has many applications in security distribution including national security and cyber security. Security system is one of the possibilities of preventing terrorist attacks. This study mainly focuses on the security system allocation and to take good decision for protecting terrorist attacks using probability model. The allocation is based on the risk of each country.

Keywords


Data Mining, Terrorism, Security System Allocation, Probability Model

Full Text:

PDF

References


Clauset, A., Young, M. and Gleditsch, K. S. On the frequency of severe terrorist events. Journal of Conflict Resolution. vol.No.51, 2007, pp. 58–87.

D.A.Wilkening, “A Simple Model for Calculating Ballistic Missile Defense Effectiveness,” Science and Global Security, Vol.8,1999, pp.183-215.

E.Brunswik, “Representative design and Probabilistic Theory in a Functional Psychology,” Psychological Review, Vol.62, 1995, pp.193-217.

Enders,W. and Sandler, T. The effectiveness of antiterrorism policies: A vector- autoregression- intervention analysis. The American Political Science Review Vol.No.4,1993, pp.829–844.

Hugo M.Mialon,(2012) “Torture in Counterterrorism: Agency Incentives and Slippery Slopes,” Journal of Public Economics, Vol.96, No.1–2, 2012, pp. 33-41.

Michael Stohl, “Networks, terrorists and criminals: the implications for community policing,” Journal of Crime Law Social Change, Vol.50, No.1, 2008, pp. 59-72.

Patrick T, Brandt, Todd Sandler, “Hostage Taking: Understanding Terrorism Event Dynamics,” Journal of Policy Modeling, Vol.31, 2009, pp. 758–778.

Robert J. Fischer, Edward Halibozek, and Gion Green, Introduction to Security, eighth edition, Elsevier, 2008, New York .

Sungsoon Park, LinRothrock, “Systematic analysis of framing bias in missile defense: Implication toward visualization design,” European Journal of Operation Research, Vol. 182, No.3, 2006, pp.1383-1398.

Todd Sandler and John Scott, “Terrorist Success in Hostage: Taking Incident: An Empirical Study,” the Journal of Conflict and Resolution, Vol. 31, No.1, pp. 35-53.

Walter Enders and Todd Sandler Patterns of Transnational Terrorism, 1970–1999: Alternative Time-Series Estimates International Studies Quarterly, Vol.46, 2002, pp. 145–165.

Yuval Wolf, Ofir Frankel, “Terrorism: Toward an overarched account and prevention with a special reference to pendulum interplay between both parties,” Aggression and Violent Behavior, Vol.12, 2007, pp. 259–279.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.