Yash Shirsath,
Vedant Bhosale,
Manoj Deshpande,
Shilpali Bansu,
- Student, Department of Artificial Intelligence and Data Science, Jawahar Education Society’s AC Patil College of Engineering, Kharghar, Navi Mumbai, Maharashtra, India
- Student, Department of Artificial Intelligence and Data Science, Jawahar Education Society’s AC Patil College of Engineering, Kharghar, Navi Mumbai, Maharashtra, India
- Head and Professor, Department of Computer Engineering, Jawahar Education Society’s AC Patil College of Engineering, Kharghar, Navi Mumbai, Maharashtra, India
- Head and Assistant Professor, Department of Artificial Intelligence and Data Science, Jawahar Education Society’s AC Patil College of Engineering, Kharghar, Navi Mumbai, Maharashtra, India
Abstract
The global landscape in the 21st century is marked by complex and evolving security challenges, none more pressing than the threat of terrorism. Acts of terror have left a profound impact on societies, economies, and governments worldwide, underscoring the critical importance of effective counter terrorism strategies. The “Counter Terrorism Prediction and Risk Evaluation (C-TRIP)” represents a significant stride in addressing this ever-pressing challenge. In a time marked by global security challenges, “Counter Terrorism Prediction and Risk Evaluation (C-TRIP)” is emerging as an innovative solution to deal with the ever-evolving terrorist threats. The project arises from the pressing need for predictive systems. It can anticipate and mitigate the possibility of terrorism. The motivation is external This effort is reflected in the rise and proliferation of terrorist incidents dramatically in recent years. Traditional counter terrorism response strategies are not the right length of time. Timely, data-driven interventions are needed to address this matter of great importance. This offers an extensive overview of current literature. Critically examines the strengths and limitations of past research. Define what is important is the research gap in the current work, and the search for a new framework was emphasized which can provide an accurate risk assessment and early warning. It employs a data-driven methodology utilizing machine learning and data analysis techniques to predict and assess terrorist incidents. C-TRIP aims to enhance decision-making in counter terrorism efforts by providing timely and accurate insights into the likelihood and severity of potential terrorist events.
Keywords: Counterterrorism, terrorism, security challenges, global landscape, predictive systems, data-driven interventions, global security, predictive systems, threat assessment, early warning, decision-making, methodology, architecture, experimental results
[This article belongs to International Journal of Information Security Engineering ]
Yash Shirsath, Vedant Bhosale, Manoj Deshpande, Shilpali Bansu. Counter Terrorism Prediction and Risk Evaluation (C-TRIP). International Journal of Information Security Engineering. 2024; 02(02):14-24.
Yash Shirsath, Vedant Bhosale, Manoj Deshpande, Shilpali Bansu. Counter Terrorism Prediction and Risk Evaluation (C-TRIP). International Journal of Information Security Engineering. 2024; 02(02):14-24. Available from: https://journals.stmjournals.com/ijise/article=2024/view=179570
References
- Miller E. (2022). A look back at 2020: Trends from the Global Terrorism Database (GTD)™. [Online] National Consortium for the Study of Terrorism and Responses to Terrorism, University of Maryland, College Park; A Department of Homeland Security Emeritus Center of Excellence led by the University of Maryland. Available from: https://www.start.umd.edu/look-back-2020-trends-global-terrorism-database-gtd
- United States Department of Homeland Security (DHS). (2024). All/PIA-084 Joint-Threat Information Management System (J-TIMS) [Online]. United States Department of Homeland Security. Available from: https://www.dhs.gov/publication/dhsallpia-084-joint-threat-information-management-system-j-tims
- ICSR Team. (2023). Financing violent extremism: An examination of maligned creativity in the use of financial technologies [Online]. ICSR. Available from: https://icsr.info/2023/04/12/
financing-violent-extremism-an-examination-of-maligned-creativity-in-the-use-of-financial-technologies/ - ProtectUK. (2022). Publicly Accessible Locations (PALs) Guidance. ProtectUK. [online] Available from: https://www.protectuk.police.uk/advice-and-guidance/risk/publicly-accessible-locations-pals-guidance
- Jones SG, Libicki MC. How Terrorist Groups End: Lessons for Countering al Qa’ida. Santa Monica (CA): RAND Corporation; 2008. Available from: https://www.rand.org/content/dam/rand/pubs/
monographs/2008/RAND_MG741-1.pdf - Aolain FN, Campbell C. Managing terrorism. J Nat’l Sec Law Policy. 2017;9:367–411.
- Gayathri Y, Sri Lalitha Y, Aditya Nag MV, Althaf Hussain Basha S. Data-driven prediction model for crime patterns. In: Satapathy SC, Bhateja V, Favorskaya MN, Adilakshmi T, editors. Smart computing techniques and applications. Smart Innovation, Systems and Technologies. Vol. 225. Singapore: Springer; 2021. pp. 47–58. DOI: 10.1007/978-981-16-0878-0_6.
- Goodchild MF, Janelle DG. Toward critical spatial thinking in the social sciences and humanities. GeoJournal. 2010;75:3–13. doi: 10.1007/s10708-010-9340-3.
- Kesavan T, Krishnamoorthy RK. An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction. J Intell Syst. 2022;31:979–91. doi: 10.1515/jisys-2022-0068.
- Valk CA, Lovei P, Cornelis H, Chuang Y, Visser T, Pu P, et al. Identifying a motivational profile for older adults towards increased physical activity. Int J Des. 2021;15:17–32.
- Sharma A, Bajaj V, Arora J. Machine learning techniques for real-time emotion detection from facial expressions. 2023 2nd Edition of IEEE Delhi Section Flagship Conference (DELCON), Rajpura, India. 2023. pp. 1–6. DOI: 10.1109/DELCON57910.2023.10127369.
Volume | 02 |
Issue | 02 |
Received | 27/06/2024 |
Accepted | 18/08/2024 |
Published | 24/10/2024 |