Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Merkle, Ralph C")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 63

  • Page / 3
Export

Selection :

  • and

Forecasting terrorism : Indicators and proven analytic techniquesKHALSA, Sundri K.Lecture notes in computer science. 2005, pp 561-566, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Incident and casualty databases as a tool for understanding low-intensity conflictsRADLAUER, Don.Lecture notes in computer science. 2005, pp 153-170, issn 0302-9743, isbn 3-540-25999-6, 18 p.Conference Paper

A new conceptual framework to resolve terrorism's root causesSINAI, Joshua.Lecture notes in computer science. 2005, pp 280-286, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper

Forecasting terrorist Groups' warfare : 'conventional' to CBRNSINAI, Joshua.Lecture notes in computer science. 2005, pp 567-570, issn 0302-9743, isbn 3-540-25999-6, 4 p.Conference Paper

Beyond keyword filtering for message and conversation detectionSKILLICORN, D. B.Lecture notes in computer science. 2005, pp 231-243, issn 0302-9743, isbn 3-540-25999-6, 13 p.Conference Paper

Efficient discovery of new information in large text databasesBRADFORD, R. B.Lecture notes in computer science. 2005, pp 374-380, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper

Connections in the world of international terrorismSHAHAR, Yael.Lecture notes in computer science. 2005, pp 554-560, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper

The qualitative challenge of insurgency informaticsTOUSLEY, Scott.Lecture notes in computer science. 2005, pp 571-578, issn 0302-9743, isbn 3-540-25999-6, 8 p.Conference Paper

Toward a target-specific method of threat assessmentSHAHAR, Yael.Lecture notes in computer science. 2005, pp 139-152, issn 0302-9743, isbn 3-540-25999-6, 14 p.Conference Paper

Design principles of coordinated multi-incident emergency response systemsRUI CHEN; SHARMAN, Raj; RAGHAV RAO, H et al.Lecture notes in computer science. 2005, pp 81-98, issn 0302-9743, isbn 3-540-25999-6, 18 p.Conference Paper

Learning classifiers for misuse detection using a bag of system calls representationKANG, Dae-Ki; FULLER, Doug; HONAVAR, Vasant et al.Lecture notes in computer science. 2005, pp 511-516, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Multi-modal biometrics with PKI technologies for border control applicationsKWON, Taekyoung; MOON, Hyeonjoon.Lecture notes in computer science. 2005, pp 99-114, issn 0302-9743, isbn 3-540-25999-6, 16 p.Conference Paper

An ontological approach to the document access problem of insider threatALEMAN-MEZA, Boanerges; BURNS, Phillip; EAVENSON, Matthew et al.Lecture notes in computer science. 2005, pp 486-491, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Collecting and analyzing the presence of terrorists on the web : A case study of jihad websitesREID, Edna; JIALUN QIN; YILU ZHOU et al.Lecture notes in computer science. 2005, pp 402-411, issn 0302-9743, isbn 3-540-25999-6, 10 p.Conference Paper

Thematic indicators derived from world news reportsBEST, Clive; VAN DER GOOT, Erik; DE PAOLA, Monica et al.Lecture notes in computer science. 2005, pp 436-447, issn 0302-9743, isbn 3-540-25999-6, 12 p.Conference Paper

Lsi-based taxonomy generation : The taxonomist systemWNEK, Janusz.Lecture notes in computer science. 2005, pp 389-394, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Measuring success in countering terrorism : Problems and pitfallsPROBST, Peter S.Lecture notes in computer science. 2005, pp 316-321, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

ISI 2005 : intelligence and security informatics (Atlanta GA, 19-20 May 2005)Kantor, Paul; Muresan, Gheorghe; Roberts, Fred et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25999-6, XVIII, 674 p, isbn 3-540-25999-6Conference Proceedings

The application of PROACT® RCA to terrorism/counter terrorism related eventsLATINO, Robert J.Lecture notes in computer science. 2005, pp 579-589, issn 0302-9743, isbn 3-540-25999-6, 11 p.Conference Paper

CODESSEAL : Compiler/FPGA approach to secure applicationsGELBART, Olga; OTT, Paul; NARAHARI, Bhagirath et al.Lecture notes in computer science. 2005, pp 530-535, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Automatically determining an anonymous Author's native languageKOPPEL, Moshe; SCHLER, Jonathan; ZIGDON, Kfir et al.Lecture notes in computer science. 2005, pp 209-217, issn 0302-9743, isbn 3-540-25999-6, 9 p.Conference Paper

Modeling and multiway analysis of chatroom tensorsACAR, Evrim; QAMTEPE, Seyit A; KRISHNAMOORTHY, Mukkai S et al.Lecture notes in computer science. 2005, pp 256-268, issn 0302-9743, isbn 3-540-25999-6, 13 p.Conference Paper

A conceptual model of counterterrorist operationsDAVIS, David; FRENDAK-BLUME, Allison; WHEELER, Jennifer et al.Lecture notes in computer science. 2005, pp 305-315, issn 0302-9743, isbn 3-540-25999-6, 11 p.Conference Paper

Digging in the details : A case study in network data miningGALLOWAY, John; SIMOFF, Simeon J.Lecture notes in computer science. 2005, pp 14-26, issn 0302-9743, isbn 3-540-25999-6, 13 p.Conference Paper

Active automation of the DITSCAPSEOK WON LEE; GANDHI, Robin A; AHN, Gail-Joon et al.Lecture notes in computer science. 2005, pp 479-485, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper

  • Page / 3