References
[1]. Jiang L, Chen Y, Yu L et al. A Data Analysis Method for Anti-terrorism Based on Clustering. Information Research 6(260), 74-77(2019).
[2]. Yang Z, Li Y, Zhong Z. Research on Judgment of Suspects of Terrorist Attack Based on Data Mining. Information Research 4(258), 35-40(2019).
[3]. Liu M. Risk Assessment of Civil Aviation Terrorism Based on K-means Clustering. Data Analysis and Knowledge Discovery 10(22), 21-26(2018).
[4]. Xiao Y, Zhang Y. Terrorist attack organization prediction method based on feature selection and hyperparameter optimization. Journal of Computer Applications 40(8), 2262-2267(2020).
[5]. Li H, Zhang N, Cao Z et al. Terrorist Prediction Algorithm Based on Machine Learning. Computer Engineering 46(2), 315-320(2020).
[6]. Qiu L, Han X, Hu X. Study on method of consequence prediction for terrorist attacks based on machine learning. Journal of Safety Science and Technology 16(1), 175-181(2020).
[7]. Kumar, Vivek, et al. "A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks." International Conference in Software Engineering for Defence Applications. Springer, Cham, 2018.
[8]. Onyekachi, Uche Stanley, and Tsopze Norbert2& Ebem Deborah Uzoamaka. "Data Mining Approach to Counterterrorism."
[9]. Soliman, Ghada MA, and Tarek HM Abou-El-Enien. "Terrorism Prediction Using Artificial Neural Network." Rev. d'Intelligence Artif. 33.2 (2019): 81-87.
[10]. Wen X, Zhong A, Hu X. The Classification of Urban Greening Tree Species Based on Feature Selection of Random Forest. Journal of Geo-Information Science 12, 1777-1786(2018).
[11]. Zhao Z, Fu X, Jin X et al. Spam Message Recognition Based on Random Forest Feature Selection. Computer and Information Technology 6, 24-26(2018).
[12]. Cao Y, Zhu M, Wang X. Wind Turbine Blade Icing Forecast Based on Feature Selection and XBGoost. Electrical Automation 41(3), 31-33,118(2019).
[13]. Cao Rui, Liao Bin, Li M et al. Predicting Prices and Analyzing Features of Online Short-Term Rentals Based on XGBoost. Data Analysis and Knowledge Discovery 6: 51-65(2021).
[14]. Dong S. Data preprocessing technology in data mining. China Computer&Communication 16,144-145(2018).
[15]. Li Y, Mei J, Qin G. Research on Data Preprocessing in the Field of Counter Terrorism Intelligence Analysis. Information Science 35(11), 103-107,113(2017).
Cite this article
Wang,Y. (2023). Machine Learning based Terrorist Attacks Prediction Algorithm. Applied and Computational Engineering,2,694-700.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 4th International Conference on Computing and Data Science (CONF-CDS 2022)
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).
References
[1]. Jiang L, Chen Y, Yu L et al. A Data Analysis Method for Anti-terrorism Based on Clustering. Information Research 6(260), 74-77(2019).
[2]. Yang Z, Li Y, Zhong Z. Research on Judgment of Suspects of Terrorist Attack Based on Data Mining. Information Research 4(258), 35-40(2019).
[3]. Liu M. Risk Assessment of Civil Aviation Terrorism Based on K-means Clustering. Data Analysis and Knowledge Discovery 10(22), 21-26(2018).
[4]. Xiao Y, Zhang Y. Terrorist attack organization prediction method based on feature selection and hyperparameter optimization. Journal of Computer Applications 40(8), 2262-2267(2020).
[5]. Li H, Zhang N, Cao Z et al. Terrorist Prediction Algorithm Based on Machine Learning. Computer Engineering 46(2), 315-320(2020).
[6]. Qiu L, Han X, Hu X. Study on method of consequence prediction for terrorist attacks based on machine learning. Journal of Safety Science and Technology 16(1), 175-181(2020).
[7]. Kumar, Vivek, et al. "A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks." International Conference in Software Engineering for Defence Applications. Springer, Cham, 2018.
[8]. Onyekachi, Uche Stanley, and Tsopze Norbert2& Ebem Deborah Uzoamaka. "Data Mining Approach to Counterterrorism."
[9]. Soliman, Ghada MA, and Tarek HM Abou-El-Enien. "Terrorism Prediction Using Artificial Neural Network." Rev. d'Intelligence Artif. 33.2 (2019): 81-87.
[10]. Wen X, Zhong A, Hu X. The Classification of Urban Greening Tree Species Based on Feature Selection of Random Forest. Journal of Geo-Information Science 12, 1777-1786(2018).
[11]. Zhao Z, Fu X, Jin X et al. Spam Message Recognition Based on Random Forest Feature Selection. Computer and Information Technology 6, 24-26(2018).
[12]. Cao Y, Zhu M, Wang X. Wind Turbine Blade Icing Forecast Based on Feature Selection and XBGoost. Electrical Automation 41(3), 31-33,118(2019).
[13]. Cao Rui, Liao Bin, Li M et al. Predicting Prices and Analyzing Features of Online Short-Term Rentals Based on XGBoost. Data Analysis and Knowledge Discovery 6: 51-65(2021).
[14]. Dong S. Data preprocessing technology in data mining. China Computer&Communication 16,144-145(2018).
[15]. Li Y, Mei J, Qin G. Research on Data Preprocessing in the Field of Counter Terrorism Intelligence Analysis. Information Science 35(11), 103-107,113(2017).