Counterterrorism and Open Source Intelligence最新文献

筛选
英文 中文
Counterterrorism and Open Source Intelligence 反恐和开源情报
Counterterrorism and Open Source Intelligence Pub Date : 2011-07-08 DOI: 10.1007/978-3-7091-0388-3
U. Wiil
{"title":"Counterterrorism and Open Source Intelligence","authors":"U. Wiil","doi":"10.1007/978-3-7091-0388-3","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133645032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer Biomarkers 研究生物制剂和识别癌症生物标志物的社会网络的有效性
Counterterrorism and Open Source Intelligence Pub Date : 2011-03-13 DOI: 10.1007/978-3-7091-0388-3_15
Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, K. Kianmehr, Tansel Özyer, J. Rokne, D. Demetrick, M. Ridley, R. Alhajj
{"title":"Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer Biomarkers","authors":"Ghada Naji, Mohamad Nagi, Abdallah M. ElSheikh, Shang Gao, K. Kianmehr, Tansel Özyer, J. Rokne, D. Demetrick, M. Ridley, R. Alhajj","doi":"10.1007/978-3-7091-0388-3_15","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3_15","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Understanding Terrorist Network Topologies and Their Resilience Against Disruption 了解恐怖分子网络拓扑结构及其抗破坏能力
Counterterrorism and Open Source Intelligence Pub Date : 2009-11-04 DOI: 10.1007/978-3-7091-0388-3_5
R. Lindelauf, P. Borm, H. Hamers
{"title":"Understanding Terrorist Network Topologies and Their Resilience Against Disruption","authors":"R. Lindelauf, P. Borm, H. Hamers","doi":"10.1007/978-3-7091-0388-3_5","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3_5","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116892970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Region-Based Geospatial Abduction with Counter-IED Applications 基于区域的地理空间绑架与反ied应用
Counterterrorism and Open Source Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-3-7091-0388-3_7
P. Shakarian, V. S. Subrahmanian
{"title":"Region-Based Geospatial Abduction with Counter-IED Applications","authors":"P. Shakarian, V. S. Subrahmanian","doi":"10.1007/978-3-7091-0388-3_7","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3_7","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122373526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cluster Based Text Classification Model 基于聚类的文本分类模型
Counterterrorism and Open Source Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-3-7091-0388-3_14
Sarwat Nizamani, N. Memon, U. Wiil
{"title":"Cluster Based Text Classification Model","authors":"Sarwat Nizamani, N. Memon, U. Wiil","doi":"10.1007/978-3-7091-0388-3_14","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3_14","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122592848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multilingual Real-time Event Extraction for Border Security Intelligence Gathering 面向边境安全情报收集的多语种实时事件提取
Counterterrorism and Open Source Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-3-7091-0388-3_18
M. Atkinson, J. Piskorski, E. V. D. Goot, R. Yangarber
{"title":"Multilingual Real-time Event Extraction for Border Security Intelligence Gathering","authors":"M. Atkinson, J. Piskorski, E. V. D. Goot, R. Yangarber","doi":"10.1007/978-3-7091-0388-3_18","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3_18","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128789418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Interdiction of Plots with Multiple Operatives 阻止有多名特工的阴谋
Counterterrorism and Open Source Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-3-7091-0388-3_4
G. Woo
{"title":"Interdiction of Plots with Multiple Operatives","authors":"G. Woo","doi":"10.1007/978-3-7091-0388-3_4","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3_4","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131508056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Use of Open Source Intelligence in the Construction of Covert Social Networks 开源智能在隐蔽社会网络构建中的应用
Counterterrorism and Open Source Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-3-7091-0388-3_9
C. J. Rhodes
{"title":"The Use of Open Source Intelligence in the Construction of Covert Social Networks","authors":"C. J. Rhodes","doi":"10.1007/978-3-7091-0388-3_9","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3_9","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126111798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Ultimate Hack: Re-inventing Intelligence to Re-engineer Earth 终极黑客:重新发明智能来重新设计地球
Counterterrorism and Open Source Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-3-7091-0388-3_21
R. Steele
{"title":"The Ultimate Hack: Re-inventing Intelligence to Re-engineer Earth","authors":"R. Steele","doi":"10.1007/978-3-7091-0388-3_21","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3_21","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130570708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Method to Analyze the Importance of Links in Terrorist Networks 一种分析恐怖分子网络中链路重要性的新方法
Counterterrorism and Open Source Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-3-7091-0388-3_10
U. Wiil, J. Gniadek, N. Memon, N. Memon
{"title":"A Novel Method to Analyze the Importance of Links in Terrorist Networks","authors":"U. Wiil, J. Gniadek, N. Memon, N. Memon","doi":"10.1007/978-3-7091-0388-3_10","DOIUrl":"https://doi.org/10.1007/978-3-7091-0388-3_10","url":null,"abstract":"","PeriodicalId":231065,"journal":{"name":"Counterterrorism and Open Source Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121109884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信