Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A Machine Learning Based Model of Boko HaramOther Types of Attacks

A Machine Learning Based Model of Boko Haram: Other Types of Attacks [In this chapter, we will discuss TP-rules that we have derived involving the following types of attacks by Boko Haram: the targeting of government officials, looting, the targeting of security installations, and attempted bombings. For the targeting of government officials, looting, and attempted bombings we will discuss the rules we derived to predict the occurrence of these events. For the targeting of security installations, we will look at TP-Rules that we derived to predict an absence of this event. At the end of the chapter we will also report the performance of our predictive models for each event.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/a-machine-learning-based-model-of-boko-haram-other-types-of-attacks-0arIdKvGyG
Publisher
Springer International Publishing
Copyright
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
ISBN
978-3-030-60613-8
Pages
107 –116
DOI
10.1007/978-3-030-60614-5_8
Publisher site
See Chapter on Publisher Site

Abstract

[In this chapter, we will discuss TP-rules that we have derived involving the following types of attacks by Boko Haram: the targeting of government officials, looting, the targeting of security installations, and attempted bombings. For the targeting of government officials, looting, and attempted bombings we will discuss the rules we derived to predict the occurrence of these events. For the targeting of security installations, we will look at TP-Rules that we derived to predict an absence of this event. At the end of the chapter we will also report the performance of our predictive models for each event.]

Published: Dec 12, 2020

There are no references for this article.