Search Results for terrorism. - Narrowed by: Artificial intelligence. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dterrorism.$0026qf$003dSUBJECT$002509Subject$002509Artificial$002bintelligence.$002509Artificial$002bintelligence.$0026ps$003d300?dt=list 2026-03-28T22:27:13Z Intelligence Management Knowledge Driven Frameworks for Combating Terrorism and Organized Crime ent://SD_ILS/0/SD_ILS:173369 2026-03-28T22:27:13Z 2026-03-28T22:27:13Z Author&#160;Akhgar, Babak. editor.&#160;Yates, Simeon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-2140-4">http://dx.doi.org/10.1007/978-1-4471-2140-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning Techniques to Predict Terrorist Attacks Exemplified by Jama'at Nasr al-Islam wal Muslimin ent://SD_ILS/0/SD_ILS:609165 2026-03-28T22:27:13Z 2026-03-28T22:27:13Z Author&#160;Mostert, Laura. author.&#160;Lindelauf, Roy. author.&#160;Pulice, Chiara. author.&#160;Provoost, Marnix. author.&#160;Amin, Priyanka. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-93174-1">https://doi.org/10.1007/978-3-031-93174-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainability and Global Challenges Analysis by Mathematics of Uncertainty ent://SD_ILS/0/SD_ILS:604053 2026-03-28T22:27:13Z 2026-03-28T22:27:13Z Author&#160;Mordeson, John N. author.&#160;Mathew, Sunil. author. (orcid)0000-0001-8478-9245&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61770-6">https://doi.org/10.1007/978-3-031-61770-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Threats, Assessment and Responses ent://SD_ILS/0/SD_ILS:602378 2026-03-28T22:27:13Z 2026-03-28T22:27:13Z Author&#160;Montasari, Reza. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50454-9">https://doi.org/10.1007/978-3-031-50454-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-03-28T22:27:13Z 2026-03-28T22:27:13Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Complex Networks VI Proceedings of the 6th Workshop on Complex Networks CompleNet 2015 ent://SD_ILS/0/SD_ILS:529313 2026-03-28T22:27:13Z 2026-03-28T22:27:13Z Author&#160;Mangioni, Giuseppe. editor.&#160;Simini, Filippo. editor.&#160;Uzzo, Stephen Miles. editor.&#160;Wang, Dashun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-16112-9">https://doi.org/10.1007/978-3-319-16112-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>