Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$71.27
Used and New from Other Sellers
Used and New from Other Sellers
from $44.67
Usually ships in 1-2 business days
(Save 44%)
Other sellers (Paperback)
  • All (9) from $44.67   
  • New (5) from $44.67   
  • Used (4) from $71.26   

Overview

All the data was out there to warn us of this impending attack, why didn't we see it?" This was a frequently asked question in the weeks and months after the terrorist attacks on the World Trade Center and the Pentagon on September 11, 2001. In the wake of the attacks, statisticians moved quickly to become part of the national response to the global war on terror. This book is an overview of the emerging research program at the intersection of national security and statistical sciences. A wide range of talented researchers address issues in

. Syndromic Surveillance—-How do we detect and recognize bioterrorist events?

. Modeling and Simulation—-How do we better understand and explain complex processes so that decision makers can take the best course of action?

. Biometric Authentication—-How do we pick the terrorist out of the crowd of faces or better match the passport to the traveler?

. Game Theory—-How do we understand the rules that terrorists are playing by?

This book includes technical treatments of statistical issues that will be of use to quantitative researchers as well as more general examinations of quantitative approaches to counterterrorism that will be accessible to decision makers with stronger policy backgrounds.

Dr. Alyson G. Wilson is a statistician and the technical lead for DoD programs in the Statistical Sciences Group at Los Alamos National Laboratory. Dr. Gregory D. Wilson is a rhetorician and ethnographer in the Statistical Sciences Group at Los Alamos National Laboratory. Dr. David H. Olwell is chair of the Department of Systems Engineering at the Naval Postgraduate School in Monterey, California.

Read More Show Less

Editorial Reviews

From the Publisher
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of statistics." Christine Anderson-Cook, JASA, Vol. 102, No. 478, June 2007
Read More Show Less

Product Details

  • ISBN-13: 9780387329048
  • Publisher: Springer New York
  • Publication date: 6/19/2006
  • Edition description: 2006
  • Edition number: 1
  • Pages: 292
  • Product dimensions: 9.21 (w) x 6.14 (h) x 0.64 (d)

Table of Contents

Game Theory in an Age of Terrorism (Ronald D. Fricker, Jr.).- Combining Game Theory and Risk Analysis in Counterterrorism: A Smallpox Example (David L. Banks, Steven Anderson).- Game-Theoretic and Reliability Methods in Counterterrorism and Security (Vicki Bier).- Biometric Authentication (David L. Banks).- Towards Statistically Rigorous Biometric Authentication Using Facial Images (Sinjini Mitra).- Recognition Problem of Biometrics: Nonparametric Dependence Measures and Aggregatd Algorithms (Andrew L. Rukhin).- Data Analysis Research Issues and Emerging Public Health Biosurveillance Directions (Henry Rolka).- Current and Potential Statsitical Methods for Monitoring Multiple Data Streams for Biosurveillance (Galit Shmueli, Stephen E. Fienberg).- Evaluating Statistical Methods for Syndromic Surveillance (Michael A. Stoto, Ronald D. Fricker, Jr., Arvind Jain, Alexis Diamond, John O. Davies-Cole, Chevelle Glymph, Gebreyesus Kidane, Garrett Lum, LaVerne Jones, Kerda Dehan, Christine Yuan).- A Spatio-Temporal Analysis of Syndromic Data for Biosurveillance (Laura Forsberg, Caroline Jeffery, Al Ozonoff, Marcello Pagano).- Modeling and Simulation for Defense and National Security (Wendy L. Martinez).- Modeling and Parameterization for Smallpox Simulation Study (Sarah Michalak, Gregory Wilson).- Approaches to Modeling the Concentration Field for Adaptive Sampling of Contaminants During Site Decontamination (William K. Sieber, James S. Bennett, Abera Wouhib, Joe Fred Gonzalez, Jr., Myron J. Katzoff, Stanley A. Shulman).- Secure Statistical Analysis of Distributed Databases (Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerome P. Reiter).- Statistical Evaluation of the Impact of Background Supression on the Sensitivity of Passive Radiation Detectors (Tom Burr, James Gattiker, Mark Mullen, George Tompkins).

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)