Suggested Topics within your search.
Suggested Topics within your search.
- Prevention
- Terrorism
- Civil rights 2
- Computer algorithms 2
- Computer simulation 2
- Data mining 2
- Emergency management 2
- Government policy 2
- Hazard mitigation 2
- Human rights 2
- Infrastructure (Economics) 2
- National security 2
- Political violence 2
- Psychological aspects 2
- Risk assessment 2
- Security measures 2
- Security, International 2
- Social aspects 2
- Terrorism risk assessment 2
-
1
Fighting terrorism in the liberal state an integrated model of research, intelligence and international law /
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
2
Tangled roots social and psychological factors in the genesis of terrorism /
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
3
Computational models of risks to infrastructure
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
Mining massive data sets for security advances in data mining, search, social networks and text mining, and their applications to security /
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Building terrorism resistant communities together against terrorism /
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
Building terrorism resistant communities together against terrorism /
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
Fighting terrorism in the liberal state an integrated model of research, intelligence and international law /
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
8
Tangled roots social and psychological factors in the genesis of terrorism /
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Computational models of risks to infrastructure
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
Mining massive data sets for security advances in data mining, search, social networks and text mining, and their applications to security /
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook