Mathematical Methods in Counterterrorism

  • Nasrullah Memon
  • Jonathan David Farley
  • David L. Hicks
  • Torben Rosenorn

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Mathematical Methods in Counterterrorism: Tools and Techniques for a New Challenge

    1. Front Matter
      Pages 1-1
    2. David L. Hicks, Nasrullah Memon, Jonathan D. Farley, Torben Rosenørn
      Pages 1-5
  3. Network Analysis

    1. Front Matter
      Pages 7-7
    2. Patricia Brantingham, Uwe Glässer, Piper Jackson, Mona Vajihollahi
      Pages 9-31
    3. Abbas K. Zaidi, Mashhood Ishaque, Alexander H. Levis
      Pages 69-90
  4. Forecasting

    1. Front Matter
      Pages 105-105
    2. James P. Ferry, Darren Lo, Stephen T Ahearn, Aaron M. Phillips
      Pages 161-181
  5. Communication/Interpretation

    1. Front Matter
      Pages 183-183
    2. Bert Hartnell, Georg Gunther
      Pages 185-204
    3. Roy Lindelauf, Peter Borm, Herbert Hamers
      Pages 215-228
    4. Fatih Ozgul, Zeki Erdem, Chris Bowerman
      Pages 229-249
  6. Behavior

    1. Front Matter
      Pages 251-251
    2. Amy Sliva, V.S. Subrahmanian, Vanina Martinez, Gerardo Simari
      Pages 253-269
    3. Mariagiovanna Baccara, Heski Bar-Isaac
      Pages 271-290
    4. Gordon H. McCormick, Guillermo Owen
      Pages 291-308
  7. Game Theory

    1. Front Matter
      Pages 317-317
    2. Francois Melese
      Pages 319-332
    3. Daniel G. Arce, Todd Sandler
      Pages 333-348
    4. Jacob N. Shapiro, David A. Siegel
      Pages 349-382
  8. History of the Conference on Mathematical Methods in Counterterrorism

    1. Front Matter
      Pages 383-383
    2. Jonathan David Farley
      Pages 385-389

About this book


Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern – sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive “weapon”, just as quiet – mathematics – can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.


Counterterrorism Data Analysis of terrorist activity ETA Emergency response and planning Homeland security Information harvesting Intelligence Mathematical Methods Palestine Liberation Organization Terrorist Topologie calculus computer security security terrorism

Editors and affiliations

  • Nasrullah Memon
    • 1
  • Jonathan David Farley
    • 2
  • David L. Hicks
    • 3
  • Torben Rosenorn
    • 4
  1. 1.The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkOdense MDenmark
  2. 2.Institut für AlgebraJohannes Kepler Universität LinzLinzAustria
  3. 3.Department of Computer Science and EngineeringAalborg University EsbjergEsbjergDenmark
  4. 4.Esbjerg Institute of TechnologyAalborg University EsbjergEsbjergDenmark

Bibliographic information

  • DOI
  • Copyright Information Springer Vienna 2009
  • Publisher Name Springer, Vienna
  • eBook Packages Computer Science
  • Print ISBN 978-3-211-09441-9
  • Online ISBN 978-3-211-09442-6
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software
Consumer Packaged Goods