A Neural Network for Counter-Terrorism

被引:3
|
作者
Dixon, S. J. [1 ]
Dixon, M. B. [1 ]
Elliott, J. [1 ]
Guest, E. [1 ]
Mullier, D. J. [1 ]
机构
[1] Leeds Metropolitan Univ, Leeds LS1 3HE, W Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1007/978-1-4471-2318-7_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This article presents findings concerned with the use of neural networks in the identification of deceptive behaviour. A game designed by psychologists and criminologists was used for the generation of data used to test the appropriateness of different Al techniques in the quest for counter-terrorism. A feed forward back propagation network was developed and subsequent neural network experiments showed on average a 60% success rate and at best a 68% success rate for correctly identifying deceptive behaviour. These figures indicate that, as part of an investigator support system, a neural network would be a valuable tool in the identification of terrorists prior to an attack.
引用
收藏
页码:229 / 234
页数:6
相关论文
共 50 条
  • [41] THE PROBLEMS OF EVALUATING COUNTER-TERRORISM
    Spencer, Alexander
    REVISTA UNISCI, 2006, (12): : 179 - 201
  • [42] Behind the veil of counter-terrorism
    Daniels, Lesley-Ann
    REVISTA CIDOB D AFERS INTERNATIONALS, 2016, (112): : 255 - 257
  • [43] Are counter-terrorism strategies effective? the results of the Campbell systematic review on counter-terrorism evaluation research
    Lum C.
    Kennedy L.W.
    Sherley A.
    Journal of Experimental Criminology, 2006, 2 (4) : 489 - 516
  • [44] 9/11 and the politics of counter-terrorism: writing temporality in(to) counter-terrorism rhetoric and discourse in Nigeria
    Chukwuma, Kodili Henry
    CRITICAL STUDIES ON TERRORISM, 2021, 14 (04) : 421 - 424
  • [45] Network science's challenges and opportunities in counter-terrorism research
    The Police Officer College of Chinese Armed Police Force, Management Science and Project of Department, Chengdu 610213, China
    不详
    Complex Syst. Complexity Sci., 1 (60-66):
  • [46] Automating social network analysis: A power tool for counter-terrorism
    Ball, Leslie
    SECURITY JOURNAL, 2016, 29 (02) : 147 - 168
  • [47] Counter-terrorism via counter-proliferation
    Wirtz, JJ
    TERRORISM AND POLITICAL VIOLENCE, 2002, 14 (03) : 129 - 140
  • [48] Automating social network analysis: A power tool for counter-terrorism
    Leslie Ball
    Security Journal, 2016, 29 : 147 - 168
  • [49] A Neural Relation Extraction Model for Distant Supervision in Counter-Terrorism Scenario
    Hou, Jiaqi
    Li, Xin
    Zhu, Rongchen
    Zhu, Chongqiang
    Wei, Zeyu
    Zhang, Chao
    IEEE ACCESS, 2020, 8 (08): : 225088 - 225096
  • [50] Writing the War on Terrorism: Language, Politics and Counter-terrorism
    Egerton, Frazer
    INTELLIGENCE AND NATIONAL SECURITY, 2007, 22 (03) : 438 - 439