A Machine Learning Based Model of Boko HaramOther Types of Attacks
A Machine Learning Based Model of Boko Haram: Other Types of Attacks
Subrahmanian, V. S.; Pulice, Chiara; Brown, James F.; Bonen-Clark, Jacob
2020-12-12 00:00:00
[In this chapter, we will discuss TP-rules that we have derived involving the following types of attacks by Boko Haram: the targeting of government officials, looting, the targeting of security installations, and attempted bombings. For the targeting of government officials, looting, and attempted bombings we will discuss the rules we derived to predict the occurrence of these events. For the targeting of security installations, we will look at TP-Rules that we derived to predict an absence of this event. At the end of the chapter we will also report the performance of our predictive models for each event.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/a-machine-learning-based-model-of-boko-haram-other-types-of-attacks-0arIdKvGyG
A Machine Learning Based Model of Boko HaramOther Types of Attacks
[In this chapter, we will discuss TP-rules that we have derived involving the following types of attacks by Boko Haram: the targeting of government officials, looting, the targeting of security installations, and attempted bombings. For the targeting of government officials, looting, and attempted bombings we will discuss the rules we derived to predict the occurrence of these events. For the targeting of security installations, we will look at TP-Rules that we derived to predict an absence of this event. At the end of the chapter we will also report the performance of our predictive models for each event.]
Published: Dec 12, 2020
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.