Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Terrorismo")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2255

  • Page / 91
Export

Selection :

  • and

ISI 2004 : intelligence and security informatics (Tucson AZ, 10-11 June 2004)Chen, Hsinchun; Moore, Reagan; Zeng, Daniel D et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-22125-5, XV, 536 p, isbn 3-540-22125-5Conference Proceedings

Evaluating the efficacy of a terrorism question/answer systemSCHUMAKER, Robert P; YING LIU; GINSBURG, Mark et al.Communications of the ACM. 2007, Vol 50, Num 7, pp 74-80, issn 0001-0782, 7 p.Article

Research of characteristics of worm trafficYUFENG CHEN; YABO DONG; DONGMING LU et al.Lecture notes in computer science. 2004, pp 518-519, issn 0302-9743, isbn 3-540-22125-5, 2 p.Conference Paper

Suicide terrorists : Are they suicidal?TOWNSEND, Ellen.Suicide & life-threatening behavior. 2007, Vol 37, Num 1, pp 35-49, issn 0363-0234, 15 p.Article

Le médecin de premier recours, un acteur privilégié face au terrorisme : HypertensionCARRON, P.-N; BAUD, J; REIGNER, P et al.Revue médicale suisse. 2006, Vol 2, Num 78, pp 2066-2070, issn 1660-9379, 5 p.Article

Critical infrastructure integration modeling and simulationTOLONE, William J; WILSON, David; RAJA, Anita et al.Lecture notes in computer science. 2004, pp 214-225, issn 0302-9743, isbn 3-540-22125-5, 12 p.Conference Paper

Terrorism Knowledge Base, International Security and Counter-Terrorism Reference Center, and Past PansJACSO, Péter.Online (Weston, CT). 2008, Vol 32, Num 1, pp 51-54, issn 0146-5422, 4 p.Article

Post-9/11 evolution of Al QaedaGUNARATNA, Rohan.Lecture notes in computer science. 2004, pp 526-530, issn 0302-9743, isbn 3-540-22125-5, 5 p.Conference Paper

Conséquences psychologiques individuelles et communautaires du terrorismeCARRON, Pierre-Nicolas; VETTER, Stefan; REIGNER, Philippe et al.Revue médicale suisse. 2008, Vol 4, Num 173, pp 2115-2119, issn 1660-9379, 5 p.Article

The psychological aspects of terrorism : from denial to hyperboleALEXANDER, David A; KLEIN, Susan.Journal of the Royal Society of Medicine. 2005, Vol 98, Num 12, pp 557-562, issn 0141-0768, 6 p.Article

Vulnerability analysis and evaluation within an intranetPARK, Eungki; SEO, Jung-Taek; EUL GYU IM et al.Lecture notes in computer science. 2004, pp 514-515, issn 0302-9743, isbn 3-540-22125-5, 2 p.Conference Paper

Terrorisme et médecins de premier recours : gestion d'un événement avec multiples victimesYERSIN, B; REIGNER, P; CARRON, P.-N et al.Revue médicale suisse. 2006, Vol 2, Num 91, pp 2876-2879, issn 1660-9379, 4 p.Article

Measuring success in countering terrorism : Problems and pitfallsPROBST, Peter S.Lecture notes in computer science. 2005, pp 316-321, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

BioterrorismeBRICAIRE, François; BOSSI, Philippe.2003, 115 p., isbn 2-842-99387-XBook

The who, what, why, and how of counter terrorism issuesDENILEON, Gay Porter.Journal - American Water Works Association. 2001, Vol 93, Num 5, pp 78-85, issn 0003-150XArticle

Terrorisme : effets sur la santé ' publique et implications pour la médecine communautairePOTIN, Mathieu; POTIN, Mathieu et al.CARRON, Pierre-Nicolas; POTIN, Mathieu; POTIN, Mathieu et al.Revue médicale suisse. 2007, Vol 3, Num 116, issn 1660-9379, 1602-1607 [5 p.]Article

Combating terrorism insurgency resolution software : A research noteSINAI, Joshua.Lecture notes in computer science. 2006, pp 401-406, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 6 p.Conference Paper

Rational choice deterrence and israeli counter-terrorismRADLAUER, Don.Lecture notes in computer science. 2006, pp 609-614, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 6 p.Conference Paper

Brucellose par bioterrorisme = Bioterrorism with brucellosisGUIHOT, Amélie; BOSSI, Philippe; BRICAIRE, Francois et al.La Presse médicale (1983). 2004, Vol 33, Num 2, pp 119-122, issn 0755-4982, 4 p.Article

Terrorism and terroristCOSTANZO, S; CASERTA, P; NAZZARO, A et al.Forensic science international. 2004, Vol 146, pp S189-S190, issn 0379-0738, SUPConference Paper

Bioterrorism and how to cope with it : Gearing up for WarDOLEV, Eran.Clinics in dermatology. 2002, Vol 20, Num 4, pp 343-345, issn 0738-081X, 3 p.Article

Nuclear terrorism and the problem of burnsGOFFMAN, Thomas E.The American journal of emergency medicine. 2011, Vol 29, Num 2, pp 224-228, issn 0735-6757, 5 p.Article

La lutte contre les IED : défi et enjeu pour les forces armées et les populations civiles : Panorama de technolgoies pour la sécurité globale = The fight Counters the IED : Challenge & Stake for the Armed Forces & the Civil PopulationsAKMOUCHE, Walter.REE. Revue de l'électricité et de l'électronique. 2008, Num 6-7, issn 1265-6534, 71-76, 85 [7 p.]Article

Are your plants and pipelines safe from cyber attack?TEUMIM, David J.Chemical engineering progress. 2002, Vol 98, Num 2, pp 69-73, issn 0360-7275Article

Approche victimologique de la prise d'otage. Schèmes paradoxaux de comportement = Victimological approach of hostage kidnapping. Paradoxal shemas of behaviorZITTOUN, C.Psychiatrie française. 1988, Vol 19, Num 6, pp 58-60, issn 0755-9755Article

  • Page / 91