Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
116 | Avishag Gordon |
Homeland security literature in relation to terrorism publications: The source and the response. |
Scientometrics |
2005 |
DBLP DOI BibTeX RDF |
|
96 | Steven R. Haynes, Thomas George Kannampallil, Mark A. Cohen, Andrey Soares, Frank E. Ritter |
Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
Anti-terrorism planning, anti-terrorism resource allocation, service-oriented architectures, intelligent agents |
92 | Edna Reid, Hsinchun Chen |
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Fu Lee Wang, Christopher C. Yang, Xiaodong Shi |
Multi-document Summarization for Terrorism Information Extraction. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Abu Md. Zafor Alam, Abu Md. Siddique Alam, Mahjabeen Khan |
Terrorist Organizations and Effects of Terrorism in Bangladesh. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Hsinchun Chen |
Exploring Extremism and Terrorism on the Web: The Dark Web Project. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
terrorism informatics, dark web, intelligence and security informatics |
67 | Avishag Gordon |
Transient and continuant authors in a research field: The case of terrorism. |
Scientometrics |
2007 |
DBLP DOI BibTeX RDF |
|
67 | JinKyu Lee 0003, H. Raghav Rao |
Understanding Socio-Technical Environments for Acceptance of Inter-Agency Anti/Counter-Terrorism Information Sharing Systems. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Laura Dugan, Gary LaFree, Heather Fogg |
A First Look at Domestic and International Global Terrorism Events, 1970-1997. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Avishag Gordon |
The peripheral terrorism literature: Bringing it closer to the core. |
Scientometrics |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Sundri K. Khalsa |
Forecasting Terrorism: Indicators and Proven Analytic Techniques. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam |
Using Support Vector Machines for Terrorism Information Extraction. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
terrorism-related knowledge discovery, Information extraction |
62 | Mitko Bogdanoski, Aleksandar Risteski, Marjan Bogdanoski |
Steganography in Support of the Global Terrorism. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Nancy Houston |
How Human Issues Impact Confronting Cyber Terrorism. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Krishna R. Pattipati, Peter Willett 0001, Jefferey Allanach, Haiying Tu, Satnam Singh |
Hidden Markov Models and Bayesian Networks for Counter-Terrorism. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
62 | Mark Lazaroff, David Snowden |
Anticipatory Models for Counter-Terrorism. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
62 | Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski |
Applying Semantic Web Reasoning to Counter-Terrorism. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
62 | Aaron B. Frank, Desmond Saunders-Newton |
Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
62 | Paul Rosenzweig |
Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
54 | Dehai Liu |
Terrorism Root Cause Analysis Based on Subjective Game Model. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Yu-Ping Fan, Cheng-Wei Chen |
The performance analysis of anti- terrorism intelligence from Taiwan's Investigation Bureau of the Ministry of Justice. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna |
Event-Driven Document Selection for Terrorism Information Extraction. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
document selection, Information extraction |
51 | JinKyu Lee 0003, H. Raghav Rao |
Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. |
DG.O |
2007 |
DBLP BibTeX RDF |
anti/counter-terrorism, information sharing, disaster management, inter-organizational systems |
51 | H. Raghav Rao, JinKyu Lee 0003 |
Citizen centric analysis of anti/counter-terrorism e-government services. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
anti-/counter-terrorism (ACT), channel choice, source choice, e-government, user acceptance, public safety |
51 | Juan M. Estévez-Tapiador |
The Emergence of Cyber-Terrorism. |
IEEE Distributed Syst. Online |
2004 |
DBLP DOI BibTeX RDF |
cyber-terrorism, Black Ice, Dan Verton, critical infrastructure |
49 | Zao Liu |
Visualizing the intellectual structure in urban studies: A journal co-citation analysis (1992-2002). |
Scientometrics |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Robert J. Latino |
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
45 | David Mair |
Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Metodi Hadji-Janev |
Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Nancy Houston |
Cultural Aspects of Information Sharing and Collaboration. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Stefano Mele |
The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Ronald S. Bearse |
Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Alan Brill |
The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Stuart MacDonald |
Assessing and Responding to the Cyberterrorism Threat. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Alan Brill |
Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Elliot Zweig |
From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Raoul Chiesa |
Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do). |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Arthur L. Brocato Jr. |
Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Ivica Simonovski |
The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Zlatogor Minchev |
Human Factor Dual Role in Modern Cyberspace Social Engineering. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
45 | Brian P. Kettler, Gary Edwards, Mark Hoffman |
Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Jennifer Golbeck, Aaron Mannes, James A. Hendler |
Semantic Web Technologies for Terrorist Network Analysis. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | |
Legal Standards for Data Mining. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Janusz Marecki, Nathan Schurr, Milind Tambe |
Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran |
Analysis of Heterogeneous Data in Ultrahigh Dimensions. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors |
Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Seth Greenblatt, Thayne Coffman, Sherry Marcus |
Behavioral Network Analysis for Terrorist Detection. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti |
Information Processing at Very High Speed Data Ingestion Rates. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Kim A. Taipale |
Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Shuang Sun, Xiaocong Fan, John Yen |
Sharing Intelligence Using Information Supply Chains. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Douglas W. Oard |
Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Jeff Jonas, John Karat |
Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt |
Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Clifford Behrens, Hyong Sop Shim, Devasis Bassu |
Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | David B. Skillicorn |
Social Network Analysis Via Matrix Decompositions. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Nazli Choucri, Stuart E. Madnick, Michael D. Siegel |
Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
45 | Robert L. Popp, David Allen, Claudio Cioffi-Revilla |
Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. |
Emergent Information Technologies and Enabling Policies for Counter-Terrorism |
2006 |
DBLP BibTeX RDF |
|
42 | Daniel Zeng 0001, Donghua Wei, Michael Chau, Fei-Yue Wang 0001 |
Chinese Word Segmentation for Terrorism-Related Contents. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Ukkonen algorithm, Lidstone flatness, Mutual information, suffix tree, N-gram, Heuristic rules |
42 | Timothy William Hackworth, Philip C. Treleaven |
Modelling Terrorism. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang 0001 |
A Web Portal for Terrorism Activities in China. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Joshua Sinai |
Combating Terrorism Insurgency Resolution Software: A Research Note. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Xiaohua Hu 0001, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm |
Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Peter S. Probst |
Measuring Success in Countering Terrorism: Problems and Pitfalls. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Xiaohua Hu 0001, Illhoi Yoo, Peter Rumm, Michael E. Atwood |
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Le Gruenwald, Gary McNutt, Adrien Mercier |
Using an Ontology to Improve Search in a Terrorism Database System. |
DEXA Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Uraiwan Inyaem, Phayung Meesad, Choochart Haruechaiyasak, Dat Tran 0001 |
Construction of Fuzzy Ontology-Based Terrorism Event Extraction. |
WKDD |
2010 |
DBLP DOI BibTeX RDF |
terrorism domain, OWL, ontology construction, fuzzy ontology, event extraction |
38 | Phillip Galjano, Vasily Popovich |
Theoretical Investigation of Terrorism. Ontology Development. |
IF&GIS |
2009 |
DBLP DOI BibTeX RDF |
Security, Ontology, Geographic information system, Monitoring system, Terrorism |
38 | James A. Danowski |
Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism Campaigns. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
Anti-terrorism campaigns, optimal communication messages, emotional words, evaluative words, brain processing, semantic networks, persuasion, fMRI |
38 | In-Jung Kim, Cheol Won Lee, Eul-Gyu Im |
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
autogenous terror, cyber terrorism, CERT, ISAC |
38 | Robert P. Schumaker, Hsinchun Chen, Tao Wang, Jerod W. Wilkerson |
Terror tracker system: a web portal for terrorism research. |
JCDL |
2005 |
DBLP DOI BibTeX RDF |
news retrieval, security, terrorism |
35 | Daegeon Kim |
Prediction of terrorism pattern accompanied by cyber-terrorism and the development direction of corresponding legal systems. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Jens Edlund, Daniel Brodén, Mats Fridlund, Cecilia Lindhé, Leif-Jöran Olsson, Magnus P. Ängsal, Patrik Öhberg |
A Multimodal Digital Humanities Study of Terrorism in Swedish Politics: An Interdisciplinary Mixed Methods Project on the Configuration of Terrorism in Parliamentary Debates, Legislation, and Policy Networks 1968-2018. |
IntelliSys (2) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Linda Markowsky, George Markowsky |
Lattice-Based Technique to Visualize and Compare Regional Terrorism Using the Global Terrorism Database. |
IDAACS |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Raul Sormani |
Criticality assessment of terrorism related events at different time scales TENSOR clusTEriNg terroriSm actiOn pRediction. |
|
2016 |
RDF |
|
35 | Maria Rooijakkers, Abdul-Akeem Sadiq |
Critical infrastructure, terrorism, and the Chemical Facility Anti-Terrorism Standards: the need for collaboration. |
Int. J. Crit. Infrastructures |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Chris Arney, Zachary Silvis, Matthew Thielen, Jeff Yao |
Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the "Hearts and Minds". |
Int. J. Oper. Res. Inf. Syst. |
2013 |
DBLP DOI BibTeX RDF |
|
35 | Marc Cheong, Vincent C. S. Lee |
A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. |
Inf. Syst. Frontiers |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao, Yueh-Min Huang |
Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears. |
J. Univers. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Alvin M. Saperstein |
Mathematical modeling of the interaction between terrorism and counter-terrorism and its policy implications. |
Complex. |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Jie Xu 0001, Yilu Zhou, Robert P. Schumaker, Marc Sageman, Hsinchun Chen |
Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. |
ISI |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Philip Westmacott |
Anti-Terrorism Legislation - UK: Big Brother never Forgets - The Data Retention Provisions of the Anti-Terrorism, Crime and Security Act 2001. |
Comput. Law Secur. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Mariusz Chmielewski, Andrzej Galka, Piotr Jarema, Kamil Krasowski, Artur Kosinski |
Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems. |
ICCCI |
2009 |
DBLP DOI BibTeX RDF |
counter-terrorism, GTD, ontology, GIS, decision support, crisis management |
33 | Yilu Zhou, Edna Reid, Jialun Qin, Hsinchun Chen, Guanpi Lai |
US Domestic Extremist Groups on the Web: Link and Content Analysis. |
IEEE Intell. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Dark Web, Web harvesting, Web content analysis, Web link analysis, text mining, decision support systems, Web mining, data visualization, terrorism |
33 | Shenzhi Li, Tianhao Wu 0004, William M. Pottenger |
Distributed higher order association rule mining using information extracted from textual data. |
SIGKDD Explor. |
2005 |
DBLP DOI BibTeX RDF |
criminal justice, distributed association rule mining, data mining, machine learning, evaluation, artificial intelligence, text mining, knowledge discovery, association rule mining, privacy-preserving, distributed data mining, law enforcement, terrorism |
33 | Michael A. Caloyannides |
Is Privacy Really Constraining Security or Is this a Red Herring? |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
security, privacy, spam, terrorism |
33 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
30 | Yanzhao Li |
National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen |
Evaluating the efficacy of a terrorism question/answer system. |
Commun. ACM |
2007 |
DBLP DOI BibTeX RDF |
|
30 | JinKyu Lee 0003, H. Raghav Rao |
Citizen centric analysis of anti/counter-terrorism e-government services. |
DG.O |
2007 |
DBLP BibTeX RDF |
|
30 | Richard M. Adler |
A Dynamic Social Network Software Platform for Counter-Terrorism Decision Support. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Robert L. Popp, J. C. Poindexter |
Countering Terrorism through Information and Privacy Protection Technologies. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Paul Andrew Watters |
e-Learning for policing, intelligence and counter-terrorism: Performance. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Robert G. Ross |
Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Annette Sobel |
The Role of Information Superiority in the Global War on Terrorism. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Don Radlauer |
Rational Choice Deterrence and Israeli Counter-Terrorism. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yael Shahar |
Connections in the World of International Terrorism. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Robert P. Schumaker, Hsinchun Chen |
Question Answer TARA: A Terrorism Activity Resource Application. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
30 | W. Neville Holmes |
Terrorism, Technology, and the Profession. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Yi Zhang, Aixin Sun, Anwitaman Datta, Kuiyu Chang, Ee-Peng Lim |
Do Wikipedians follow domain experts?: a domain-specific study on Wikipedia knowledge building. |
JCDL |
2010 |
DBLP DOI BibTeX RDF |
contributing behavior, Wikipedia, knowledge building |