Light theme
Dark theme
Automatic (use operating system setting)
Shared: 1,743 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
THINGIVERSE
Copy links to clipboard
Copy
Open
www.munfred.com/proteins.html
3D Printing and Molecular Models | Barney Lab
About educator - Thingiverse
About chemteacher628 - Thingiverse
Eduardo’s Guide for 3D Printing Proteins with Chimera by Munfred - Thingiverse
popular - Thingiverse
About Munfred - Thingiverse
About MoleculeMaker - Thingiverse
About EvilOverlordX - Thingiverse
About Ocram - Thingiverse
Topics - DIY Bio Laboratory - Groups - Thingiverse
Things tagged with 'Science' - Thingiverse
DARPin in Complex with IL-4 (two models, snap together) PDB 4YDY by Ocram - Thingiverse
Hemoglobin molecule by se3dedu - Thingiverse
About aarono - Thingiverse
About aarono - Thingiverse
About alavanimation - Thingiverse
About alavanimation - Thingiverse
About BioInteractive - Thingiverse
About Carolina9999 - Thingiverse
Things to Make collection - Thingiverse
macromolecules collection - Thingiverse
About Charlie_at_Truman - Thingiverse
About destroyer2012 - Thingiverse
newest - Thingiverse
popular - Thingiverse
Topics - 3D-Printing In Education - Groups - Thingiverse
Topics - Classroom 3D - Groups - Thingiverse
Members - Classroom 3D - Groups - Thingiverse
Topics - Mathematica - Groups - Thingiverse
About hashampersand - Thingiverse
About HybridDK - Thingiverse
About ImmunoUPS - Thingiverse
About ImmunoUPS - Thingiverse
Things to Make collection - Thingiverse
Jaque - Biologia y Anatomia Humana collection - Thingiverse
About medakachou - Thingiverse
About mkuiper - Thingiverse
Things to Make collection - Thingiverse
About pmueller - Thingiverse
About se3dedu - Thingiverse
Proteins collection - Thingiverse
Things tagged with 'Amino acid' - Thingiverse
Things tagged with 'Cell' - Thingiverse
Things tagged with 'Crystallography' - Thingiverse
Things tagged with 'Enzyme' - Thingiverse
Things tagged with 'Enzyme' - Thingiverse
Things tagged with 'Molecular biology' - Thingiverse
Things tagged with 'Molecular model' - Thingiverse
Things tagged with 'Protein' - Thingiverse
Things tagged with 'Protein' - Thingiverse
Things tagged with 'RNA' - Thingiverse
Things tagged with 'Virus' - Thingiverse
Formin Homology Domain by destroyer2012 - Thingiverse
Histone by destroyer2012 - Thingiverse
Actin filament construction set by destroyer2012 - Thingiverse
Proteasome Assembly Kit by destroyer2012 - Thingiverse
DNA repair enzyme MutS from E. coli by destroyer2012 - Thingiverse
Glycolysis Series #10: Pyruvate Kinase by vosslab - Thingiverse
3D Print Any Protein! by yehsk8rz - Thingiverse
Biropette: customisable, high precision pipette. by BadenLab - Thingiverse
DPP-4 peptidase by HybridDK - Thingiverse
DPP-4 peptidase by HybridDK - Thingiverse
Influenza Virus Neuraminidase With Anti-flu Drug Relenza by aarono - Thingiverse
Cellulose Chain by MoleculeMaker - Thingiverse
E. coli Biotin Carboxylase in complex with ADP, bicarbonate and biotin by medakachou - Thingiverse
Class II tRNA enzyme by vosslab - Thingiverse
Conceptual representation of enzyme by HybridDK - Thingiverse
transfer RNA by aarono - Thingiverse
transfer RNA by aarono - Thingiverse
NU-100 by patrickfuller - Thingiverse
Lactic acid Molecule by raphnn - Thingiverse
Long chain acyl-CoA carboxylase by medakachou - Thingiverse
Aquaporin by se3dedu - Thingiverse
ATP Synthase by chemteacher628 - Thingiverse
Animal and Plant Cell Construction Kit by mfritz - Thingiverse
Molecule Construction Kit by mfritz - Thingiverse
DNA/RNA Building Set/Transcription and Translation Model by chemteacher628 - Thingiverse
TMV Subunit by milenovic - Thingiverse
animal cell / eukaryotic cell -model by alavanimation - Thingiverse
CRISPER / CAS9 Restriction enzyme set by Eagleknot - Thingiverse
RNA Strand by TK3DPrinting - Thingiverse
Biology Models collection - Thingiverse
Biology Models collection - Thingiverse
Molecules and Biology collection - Thingiverse
About vosslab - Thingiverse
Math and Science collection - Thingiverse
ME ME ME
Copy links to clipboard
Copy
Open
Smartphone-Based Mobile Testing Technique for Quick Bridge Cable–Force Measurement: Journal of Bridge Engineering: (ASCE)
Information diffusion and opinion change during the gezi park protests
Information worth spreading
Using low-cost electroencephalography (EEG) sensor to identify perceived relevance on web search
What social media data should i use in my research?
Architectural work for modeling and simulation combining the NATO Architecture Framework and C3 Taxonomy
Risk perception of complex technology innovations: Perspectives of experts and laymen - IEEE Xplore Document
Detecting anomalies in Twitter stream for public security issues - IEEE Xplore Document
Association between smartphone-based activity monitoring and traditional clinical assessment tools in community-dwelling older people - IEEE Xplore Document
Free context smartphone based application for motor activity levels recognition - IEEE Xplore Document
Leading causes of outages for transmission elements of the North American bulk power system - IEEE Xplore Document
Towards smarter cities: A self-healing resilient Microgrid Social Network - IEEE Xplore Document
The value of aggregation under minimax pricing scheme in the electricity retail market - IEEE Xplore Document
Online Analysis of Security Risks in Elastic Cloud Applications - IEEE Xplore Document
The Fog of War in Cyberspace - IEEE Xplore Document
Software Architecture Challenges and Emerging Research in Software-Intensive Systems-of-Systems - Springer
International Journal of Conflict and Violence (IJCV)
Intelligence Policy Center | RAND
3D Printing Proteins and Stuff - Google Photos
GoonerTPB - TPB
Cell Phone Chemical Sensor - Google Search
Trump Tracker
DIY Microsopy by TeZ @ Academie Minerva Groningen «
Yabe-LINE貼圖代購 | 台灣No.1,最便宜高效率的代購網
Show Music for Show People
PLOS ONE: Search Results
MIT Lincoln Laboratory: Cyber Security and Information Sciences: Publications: William M. Campbell
STO-MP-IST-123
Data mining of Twitter posts can help identify when people become sympathetic to groups like ISIS
OneTab shared tabs
TimesTalks - YouTube
OneTab shared tabs
THE SOURCE INTELLIGENCE CENTER – WORLDBEAT
Toby - Stop browser tab overload
DARPAtv - YouTube
Benjamin Rauhala - YouTube
Sign in to Your 3DVIA Account
Search Results : Analytical Support to Operations"
U.S. Passports & International Travel
Data mining of Twitter posts can help identify when people become sympathetic to groups like ISIS
15 New IFTTT Triggers to Make Life Easier
BROADWAY MUSICS TO DL
Copy links to clipboard
Copy
Open
Damien Slattery - YouTube
mmendoza0627 - YouTube
jaszon25 - YouTube
aurora spiderwoman - YouTube
Linda Wellington - YouTube
CANCER SUCKS
Copy links to clipboard
Copy
Open
Nivolumab Combined With Ipilimumab Versus Sunitinib in Previously Untreated Advanced or Metastatic Renal Cell Carcinoma (CheckMate 214) - Full Text View - ClinicalTrials.gov
PubPDF - Full Text Article: Nivolumab in the treatment of advanced renal cell carcinoma: clinical trial evidence and experience.
PubPDF - Find Full Text Journal Articles about Renal Cell Carcinoma
European Medicines Agency - Find medicine - Yervoy
Combined Nivolumab and Ipilimumab or Monotherapy in Untreated Melanoma — NEJM
What’s new in kidney cancer research and treatment?
Immunotherapy for Kidney Cancer - CRI
Renal Cell Carcinoma Treatment - NFCR
Emerging Role of Combination Immunotherapy Regimens in Metastatic Renal Cell Carcinoma - Google Search
Renal Cell Carcinoma Treatment & Research Updates - Google Search
Nivolumab + Ipilimumab Shows Promise in Metastatic Renal Cell Carcinoma pdf - Google Scholar
Immune Checkpoint Blockade: A Common Denominator Approach to Cancer Therapy: Cancer Cell
ipilimumab rcc - Google Scholar
Emerging monoclonal antibodies for the treatment of renal cell carcinoma (RCC): Expert Opinion on Emerging Drugs: Vol 21, No 3
MAC SUCSCRIPTIONS
Copy links to clipboard
Copy
Open
1Password
The Parallels Black Friday Mac App Bundle FAQ - Pocket Support
TextExpander
Parallels: Mac & Windows Virtualization, Remote Application Server, Mac Management Solutions
KB Parallels: How can I install and activate Kaspersky Security for Mac in Parallels Desktop 12?
KB Parallels: What bonus software comes with Parallels Desktop 12 for Mac?
KB Parallels: Getting started with Parallels Toolbox
KB Parallels: Getting Started with Parallels Access
Parallels Online Store
Parallels - 1Password
FLIC - The Wireless Smart Button
Commander One PRO 1.5.2 – Mac Torrents
Best Cyber Monday 2016 Deals on iPhone and iPad Apps
InFocus Pro - All-in-One Organizer on the App Store
Dispatch: Email meets GTD on the App Store
Deckset on the Mac App Store
Hype 3 on the Mac App Store
Notability on the Mac App Store
CodeRunner 2 on the Mac App Store
DEVONthink To Go on the App Store
Dropshare - Powerful File Sharing on the App Store
Linky — Share webpage links, images and text on the App Store
Prizmo - Scanning, OCR, and Speech on the App Store
LongScreen on the App Store
Screens VNC - Remote Access To Your Computer on the App Store
Cyber Monday 2016: The Best Deals for Tech
Apple Cyber Monday Roundup: Find the best deals & lowest prices on iPhone, MacBook, iPad, iMac and Apple Watch
JumpDesktop - Google Search
Your Screens License - scitrenbaum@gmail.com - Gmail
Screens - Control Your Computer Remotely - Edovia
Yoink - Improved Drag & Drop File Management on the Mac App Store
DEVONagent Express on the Mac App Store
Outline – note app with local storage & cloud sync on the Mac App Store
Outline - your digital notebook for iPad and Mac
Just Press Record on the Mac App Store
Outline – Notes with Beautiful UI "OneNote Ed." on the App Store
Graphic - illustration and design on the App Store
Graphic - vector illustration and design on the App Store
Screenshot++ on the App Store
Phlo - Quick web search browser on the App Store
Money Pro - Bills, Budgets and Accounts w/ Sync on the App Store
AirParrot Remote on the App Store
SKRWT on the App Store
Comic Life 3 on the App Store
Commander One PRO - FTPclient, RAR, 7zip extractor on the Mac App Store
Pocket: My List
Pocket: Pocket Premium
!12-05
Copy links to clipboard
Copy
Open
Commercial Drones Services | Unmanned Aerial Systems
How to Use Multiple Dropbox Accounts Together — odrive Blog
Paulo Costa
Con Collector
Buy More, Save More On Apparel, Shoes and More from Target
Take 20% Off Sitewide at Adidas And Get The Perfect Gifts For Your Active Friends
2016 Annual Meeting – of the Decision Sciences Institute
greta's gouge: Friday's Miscellany 12-02-2016
University-Led Research (Minerva Initiative)
Resources & Events (Minerva Initiative)
National Defense University Press > Media > News
Metamaterial Radar Is Exactly What Delivery Drones Need - IEEE Spectrum
Identifying Explosives at a Distance - IEEE Spectrum
explosives - Tag Search - IEEE Spectrum
Instead of Dropping Bombs, Can Drones Locate Unexploded Ones? - IEEE Spectrum
SUPER-FP7 | Social sensors for security assessments and proactive emergencies management
The Syria Institute | An independent non-profit research institution that addresses Syria’s complex challenges through informed policy analysis and data-driven information.
News You Can Use: 12/05/16 | Arthur D. Simons Center
LIMITED TIME: Subscribe Now, Get Free Upgrade to Next Highest Level of IntelCenter Database (ICD)
MacStories Weekly: Issue 59
War News Updates
AAAI Digital Library — International Conference on Web and Social Media
C-IED
Creativity, Thinking Skills, Critical Thinking, Problem solving, Decision making, innovation
BWW TV Exclusive: Watch Darren Criss Get Served Too Much Tuna at OH, HELLO!
Iran News Round Up - December 5, 2016 | Critical Threats
The IS network: Terror in Europe | Documentary & Report: Watch DW-videos online for free | DW.COM | 14.11.2016
Weapons business booming despite decline in sales: SIPRI report | World | DW.COM | 05.12.2016
EPC - European Policy Centre - Independent think tank
Presentations - The Extremist Crime Research Consortium
i-intelligence
OSINT Tools and Resources Handbook – i-intelligence
Procedures, Personnel and Technologies for Conflict Prevention and Peacebuilding | IAI Istituto Affari Internazionali
Research Scientist job - Providence Health & Services - Portland, OR | Indeed.com
(8540) Inoreader - Global Investigative Journalism Network
Investorideas.com - #Defense Stock News: CACI (NYSE: $CACI) Awarded $1.77 Billion Task Order to Support Joint Improvised-Threat Defeat Organization
JCBRN Defence COE
Michael C Horowitz | Ongoing Research
Understanding the Importance of Narrative
NCRM Working Papers
Sciences Addressing Asymmetric Explosive Threats - Office of Naval Research
Human Social Cultural Behavioral Sciences - Office of Naval Research
Information Operations | RAND
Futures - ScienceDirect.com
Procedia Computer Science - ScienceDirect.com
START.umd.edu
Demystifying Gray Zone Conflict: A Typology of Conflict Dyads and Instruments of Power in Libya, 2014-Present | START.umd.edu
Introducing the United States Extremist Crime Database (ECDB) | START.umd.edu
Strategic Communication and U.S. National Security Affairs: Critical-Cultural and Rhetorical Perspectives | START.umd.edu
Publications | START.umd.edu
Improving Intelligence Studies as an Academic Discipline: Intelligence and National Security: Vol 31, No 2
International Journal of Intelligence and CounterIntelligence: Vol 30, No 1
lamps & lighting, home decor : Target
DisplayBio.aspx
Partnering to Help Curb the Spread of Terrorist Content Online
Michael C. Horowitz Dataverse
jivoi/awesome-infosec: A curated list of awesome infosec resources.
jivoi (EK_) / Starred
ICWATCH
Insight Maker | Free Simulation and Modeling in your Browser
OSSU - Open Source Society University
Open Source Intelligence News (OSIN)
US Air Force Looking Into Increase of Suicides at Japanese Base
ToolLinkRipper < Dmi < digitalmethods.net
| ACAPS
CIAO
Changes in Modus Operandi of Islamic State (IS) revisited | Europol
Upgrade to Premium sync experience | odrive
Michael C. Horowitz - Publications
Home | SIPRI
An Open Letter to the CIA Director Nominee | The Cipher Brief
Threat Crowd | Threatcrowd.org Open Source Threat Intelligence
Paulo Costa - Google Scholar Citations
Google Scholar Citations
Goemans: Introducing Archigos: A dataset of political... - Google Scholar
Goemans: Introducing Archigos: A dataset of political... - Google Scholar
Powell: Global instances of coups from 1950 to 2010... - Google Scholar
Gilmour: Real-Time Course of Action Analysis - Google Scholar
Goemans: Introducing Archigos: A dataset of political... - Google Scholar
Introducing the United States Extremis Crime Database ( - Google Search
performance computing high performance computing for for command & control command & control real-time decision support real-time decision support real-time course of action analysis real-time course of action analysis - Google Search
12-06 WOOT WOOT
Copy links to clipboard
Copy
Open
iMazing Guides
Project - AccessScience from McGraw-Hill Education
McGraw-Hill Higher Education :: Your Title Here
Librarians: Ambassadors to New Technology
Check Your Mac's Drive and Reclaim 5 GB of Wasted Space! - Stephen Foskett, Pack Rat
Service and Support Coverage - Apple Support
Precision cancer medicine
Scientific Data
Information Fusion Under Consideration of Conflicting Input Signals - Springer
BlogSearch: Semantic Services for Aggregating and Searching Blog Articles | International Journal of Semantic Computing , Vol 10, No 03 | World Scientific
Social-spam profile detection based on content classification and user behavior - IEEE Xplore Document
Unmanned vehicles for anti-submarine warfare - IEEE Xplore Document
Malicious accounts: Dark of the social networks
Towards Scalable Governance: Sensemaking and Cooperation in the Age of Social Media | SpringerLink
CONTENT MINING FRAMEWORK IN SOCIAL MEDIA: A FIFA WORLD CUP 2014 CASE ANALYSIS
Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence (OSINT) - Springer
AI 2016: Advances in Artificial Intelligence - Springer
Defence Research Reports
Defence Research Reports
Computational Event Data System
GeoNames
UCDP Download Center
Free GIS Datasets - Categorised List
Event Registry
Regex Hub - Useful Regex Patterns
CyberChef
Counter-Da'esh Influence Operations - Google Search
Bernier: Agility of C2 Approaches and Requisite Maturity... - Google Scholar
Marco Manso - Google Scholar Citations
Semantic Scholar
-| CVSL - Publications |-
Philippe J. Giabbanelli - Publications
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
The ATOM: 4. The Overlooked Economics of Technology
CiteSeerX — IMAGE-SCENARIZATION: A COMPUTER-AIDED APPROACH FOR AGENT-BASED ANALYSIS AND DESIGN
Representing qualitative social science in computational models to aid reasoning under uncertainty: National security examples
PLOS ONE: Search Results
Ethics and Policies for Cyber Operations - Springer
Palgrave Handbook of Inter-Organizational Relations in World Politics - Springer
Making Sense of Large Datasets in the Context of Complex Situation Understanding - Springer
Terrorist Trials: Forensic Science and the Trial Process - Springer
Global Futures Studies & Research by The Millennium Project
Global Futures Intelligence System
Self-referenced smartphone-based nanoplasmonic imaging platform for colorimetric biochemical sensing - Analytical Chemistry (ACS Publications)
Alexandra Ulsh
The Future of Anti-Terrorism Technologies
H2020 Information Page - Marco Manso
About me - Marco Manso
Global Futures Studies & Research by The Millennium Project
2015-16 SOF
Global Futures Intelligence System
NATO ARW Predetection
NATO - Topic: Countering terrorism
Rinicom LTD - Secure Communications - Rinicom Ltd
Jeffrey T. Hansberger - Google Scholar Citations
Denis Laurendeau - Google Scholar Citations
GFIS
Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence - Google Search
Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence (OSINT) - Google Search
DRDC-RDDC-2016 - Google Search
Dark Networks: The Terror–Crime Nexus - Google Search
Egypt’s Integrated Synergetic Intelligence System - Google Search
Emerging Technologies and New Counter- Terror Strategies - Google Search
Global Futures Intelligence System - Google Search
Identification of Potential Terrorists and Adversary Planning; - Google Search
Identification of Potential Terrorists and Adversary Planning — Emerging Technologies and New Counter-Terror Strategies - Google Search
Making Sense of Large Datasets in the Context of Complex Situation Understanding - Google Search
Pompeu Casanovas - Google Search
State of the Future Index - Google Search
Denis Laurendeau - Publications
Marielle Mokhtari - Publications
François Bernier - ResearchGate
12-08 Oh My!
Copy links to clipboard
Copy
Open
Google Advanced Search
2016 Ben Benavides OSINT 2ool Kit On The Go Bag (Bag O’Tradecraft) « Public Intelligence Blog
Findo Alternatives and Similar Software - AlternativeTo.net
Stephen Foskett, Pack Rat - Understanding the accumulation of data
Scientific and technical research - Themes - EU Bookshop
Documents relating to the Sixth Framework Programme - FP6 - Research - European Commission
Western Foreign Fighters in Syria / ICSR
Fake News and Data Mining: Mapping Today’s Media for Intel Analysis - In Public Safety
IntuView - Downloads
Obama, SOF, and the rules of war; Why the US struggles with influence warfare; Report: $125b in Pentagon waste; Mike Flynn, conspiracy theorist; and just a bit more... - Defense One
The Flaw in Tech Giants’ Plan to Fight Extremist Content - Defense One
Deliverables: Future of IDentity in the Information Society
The ISIS Emni: The Inner Workings and Origins of ISIS’s Intelligence Apparatus – ICSVE
IntuView - Home Page
Finding Data - NSD - Norwegian Centre for Research data | NSD - Norwegian center for research data
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
20100130.gif (504×533)
Special Edition: New data on foreign fighters | START.umd.edu
Newsletters | START.umd.edu
CONFLICT DATASETS: A PRIMER FOR ACADEMICS, POLICYMAKERS, AND PRACTITIONERS: Defence and Peace Economics: Vol 22, No 1
The Iranian Empire Is Almost Complete - The Tower
Andrew Halterman – Political science, text data, conflict forecasting, Python, and R
The Good Judgement Project and Bayes’ Calculator – Andrew Halterman
Event Data – Andrew Halterman
[1612.01284] Modeling Structure and Resilience of the Dark Network
[1612.02377] A Method for Group Extraction and Analysis in Multilayer Social Networks
Children synthesize $2 version of Martin Shkreli's $750 malaria drug / Boing Boing
Eck: A beginner’s guide to conflict data: finding... - Google Scholar
military intervention data stream - Google Scholar
Text Expansion Tool - Auto Text Expander | TextExpander
Text Expansion Tips - Typing Shortcuts | TextExpander
Amazon
Books or articles that are must reads to understand the Islamic State annotative bibliography - Google Search
Attorney's Information Forensics Handbook" - Google Search
Visual Analysis Open Source Intelligence Toolkit - Google Search
Foreign terrorist fighters / Terrorism / Crime areas / Internet / Home - INTERPOL
Key Websites - A Linkpack by Sara Citrenbaum
LibGuides - A Linkpack by Sara Citrenbaum
OSINT - A Linkpack by Sara Citrenbaum
Online Tools & Resources Rock - A Linkpack by Sara Citrenbaum
Anything We Can Do They Have Done Better - A Linkpack by Sara Citrenbaum
Try Me - A Linkpack by Sara Citrenbaum
Data Bases-Sources-Sets - A Linkpack by Sara Citrenbaum
Post-Election College Paper Grading Rubric - McSweeney’s Internet Tendency
Google Social Search
Troy Hunt: Here's 1.4 billion records from Have I been pwned for you to analyse
Statistics
Thesis & Dissertation Repositories
Joint Forces - AL
Operations Odyssey Dawn and Unified Protector - SM
Intelligence - AL
Caucasus - AL
Homeland Security Digital Library – Securing the homeland through the power of information
Not Just the Caliphate: Exploring the Jihadist Scene in America – Homeland Security Digital Library
On the Homefront – the HSDL Blog – Homeland Security Digital Library
2017 Emerging Cyber Threats, Trends and Technologies Report
Books & Journals – Homeland Security Digital Library
Center for the Study of the Drone – at Bard College
About Research @NPS - Naval Postgraduate School
Dictionaries, Glossaries & Lexicons
Turning Point | Center for Strategic and International Studies
59 Search Results - ALL(Hybrid Multi-Agent Strategy Discovering Algorithm for Human Behavior) - ScienceDirect
competitive governance model - Google Search
center for study of terrorism and response - Google Search
schmuel barr israel - Google Search
intovision gdelt - Google Search
Hedonometer
The development of a concept inventory for engineering graphics - IEEE Xplore Document
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications - IEEE Xplore Document
IEEE Xplore Full-Text PDF:
micROS: a morphable, intelligent and collective robot operating system | Robotics and Biomimetics | Full Text
Efficiently detecting switches against non-stationary opponents | SpringerLink
The Politics of Militant Group Survival in the Middle East - Springer
Macro- and Micro-approaches to Crime Prevention and Intervention Programs - Springer
Unfolding the Core Structure of the Reciprocal Graph of a Massive Online Social Network - Springer
Influential Actors Detection Using Attractiveness Model in Social Media Networks - Springer
The Principal–Agent Model and Inter-Organizational Relations - Springer
Phoenix Data Project
Low-cost, robust and field portable smartphone platform photometric sensor for fluoride level detection in drinking water - Analytical Chemistry (ACS Publications)
Tools | REVEAL
DARPA Hierarchical Identify Verify Exploit (HIVE) BAA | Contract Research and Development
Microsystems Technology Office
Next Generation Social Science (NGS2) Proposers Day
TRAnsformation DESign (TRADES) Proposers Day
GRAPHS
Dr. Reza Ghanadan
re3data.org | Registry of Research Data Repositories
Relational affordances of information processing on Facebook
Content sharing in Internet of Vehicles: Two matching-based user-association approaches
A language-based approach to modelling and analysis of Twitter interactions
Digital Citizenship and Political Engagement: The Challenge from Online ... - Ariadne Vromen - Google Books
Experience from the DARPA Urban Challenge - Google Books
Critical Issues in Cross Cultural Management - Google Books
Chrome Web Store - Extensions
Hierarchical Identify Verify Exploit - Google Search
darpa invert graph based hardware - Google Search
darpa hive program - Google Search
Militant Imagery Project | Combating Terrorism Center at West Point
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Google Scholar
Get All The Activewear and Sneakers You Could Need with 30% Off Sitewide at Adidas
adidas Official Website | adidas
adidas X Tango 16.2 Turf Shoes - Black | adidas US
how to identify bots - Google Search
Tailored Online Interventions: The Islamic State’s Recruitment Strategy | Combating Terrorism Center at West Point
How terrorists recruit online (and how to stop it) | Brookings Institution
The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter | Brookings Institution
The Kingdom and the Caliphate: Duel of the Islamic States - Carnegie Endowment for International Peace
Government creating a mind of its own
Capturing Planned Protests from Open Source Indicators | LINQS Statistical Relational Learning Group @ UMD
This Technology to Beat Fingerprint Scanners Fits Just Like a Glove
Men's Sale | adidas US
ISIS and the Lonely Young American - The New York Times
Step-by-Step Online CVE - VOX - Pol
Computation and Language authors/titles recent submissions
Urban Black Women and the Politics of Resistance - Z. Isoke - Google Books
Eye to Eye: Women Practising Development Across Cultures - Susan Perry, Celeste Marguerite Schenck - Google Books
Still Lifting, Still Climbing: Contemporary African American Women's Activism - Google Books
Stetson Kennedy - Wikipedia
Computation and Language
quantify intuition - Google Scholar
Isoke: Urban black women and the politics of resistance - Google Scholar
Radford-Hill: Further to fly: Black women and the... - Google Scholar
Evidence-Based Programs and Practices - What Works in Criminal Justice - CrimeSolutions.gov
African American women's activism - Google Search
Capturing Planned Protests from Open Source Indicators - Google Search
DoD Science and Technology Strategic Communication_Social Media Programs - Google Search
Foreign Fighter Data - Google Search
Further to Fly: Black Women and the Politics of Empowerment - Google Search
HIVE program darpa - Google Search
OEPT-Dataset - Google Search
Open Source Indicators - Google Search
empower black women to be politically active - Google Search
identify islamic state bot - Google Search
islamic state bots - Google Search
physics today - Google Search
superman ku klux klan - Google Search
How to spot home-grown ISIS recruits online before they leave | New Scientist
‘ISIS is not Islam’ – Russian university releases anti-extremist textbook — RT Russian politics
Saved Session - Session Buddy
SocialSensor · GitHub
CEUR-WS.org - CEUR Workshop Proceedings
Phoenix Data Project
The Open Event Data Alliance Software Page
Datasets - Conflict, War and Terrorism - UCF Research Guides at University of Central Florida Libraries
EVENT DATA AND EMPIRICAL CONFLICT ANALYSIS
Home - Conflict, War and Terrorism - UCF Research Guides at University of Central Florida Libraries
Inoreader - The content reader for power users who want to save time.
dblp: Norman D. Geddes
Intelligence – International Tactical Training Association
HSRC Year End Sale
Multimedia Knowledge and Social Media Analytics Laboratory
December News: Gray Zone conflicts explained; Global Terrorism Index released; CVE principles for local government
MacStories Weekly: Issue 58
VCDB VERIS Community Database
The VERIS Framework
Office Depot®
CRCnetBASE - Chapter 5 Biometrics in Social Media Applications
Jihadism in the Arab World after 2011: Explaining Its Expansion | Middle East Policy Council
Unscheduled Campus Closures | PCC
figshare - credit for all your research
A Validation Process for Predicting Stratagemical Behavior Patterns of Powerful Leaders in Conflict - Google Search
NATO CCD COE - Google Search
VERIS Community Database - Google Search
military intervention data stream - Google Search
steve jameson darpa - Google Search
OODA Loop - Best Security, Business, and Technology Books of 2016
Real-time local Twitter trends - Trendsmap
Biometrics in Social Media Applications - Google Search
sigacts - Google Search
CENTER FOR NATION RECONSTRUCTION AND CAPACITY DEVELOPMEN - Google Search
A New, Near-Real-Time Event Dataset and the Role of Versioning - Google Search
Event Data Presentations
Event Data Presentations
Andrew Halterman - Google Search
compare event data table - Google Search
Comparing GDELT and ICEWS Event Data | mdwardlab.com
how to compare event data |Tableau Community
Guide to Con ict Data - Google Search
CTC Report - Then and Now: Comparing the Flow of Foreign Fighters to AQI and the Islamic State - scitrenbaum@gmail.com - Gmail
Eck: A beginner’s guide to conflict data: finding... - Google Scholar
Eck: A beginner’s guide to conflict data: finding... - Google Scholar
Counting conflict | News & Analysis | Data Driven Journalism
Conflict & Ethnic Politics Data - Politics Resources Guide - LibGuides at Princeton University
intuview - Google Search
Saved Session - Session Buddy
IFGM - Distributed Information and Intelligence Analysis Group
Distributed Information and Intelligence Analysis Group
Past Projects - Distributed Information and Intelligence Analysis Group
Data Sources - Social Science Data - Research Guides at University of California Irvine
No 8 (2016)
opencatalog.darpa.mil
Home | U.S. Army Research Laboratory
Behavioral Influences Analysis Center, military intelligence human factors analysis, adversary intelligence
about us
behavioral influences analysis and assessment research and theory
Boeing shares fall after Trump tweets to cancel Air Force One order - Business Insider
The US Air Force has developed a way to counter ISIS drone-bombs - Business Insider
Social Media in Strategic Communication (SMISC)
State of the Future Index
RAND Army Research Division | RAND
Home | SmartResilience
INSCRdata
CSP - Major Episodes of Political Violence, 1946-2013
US Military Influence Operations
MAEC - Malware Attribute Enumeration and Characterization | MAEC Project Documentation
How to render garbage on your iPhone – Medium
Papaly | Start Page
DARPA Social Media in Strategic Communication - Google Scholar
Woodhead Publishing Series in Energy [Updated at 2016.12.07] (download torrent) - TPB
clouderone - TPB
JΞSTΞR ✪ ΔCTUAL³³º¹ on Twitter: "...to put it another way. Trump made $6M in airfares for his security detail to fly on his plane during campaign >> https://t.co/7kh0Eh0Wv6"
Personal - Dropbox
94/7 Alternative Portland & Widmer Brothers Brewing Present December to Remember w/ BASTILLE, Holiday Friends, All Ages at McMenamins Crystal Ballroom on Dec 12, 2016 8:00 PM
ANNEX A: HETEROGENEOUS C2: WHEN THE “C2 APPROACH” REQUIRES MANY C2 APPROACHES - Google Search
Adversary Behavioral Modeling - Google Search
Adversary Intent Inferencing - Google Search
COIN/CIMIC Model. - Google Search
Computational Intelligence for Security and Defence Applications - Google Search
Culturally Infused Social Network Analysis - Google Search
dr. michael hsieh - Google Search
David S. Alberts - Google Search
distributed information and intelligence analysis group - Google Search
inauthor:"Eric Victor Larson" - Google Search
How to manage iNode files in the “lost+found” directory | MacIssues
Revealed: Pentagon spent millions studying how to influence social media — RT America
Millennials: The Musical - YouTube
Saved Session - Session Buddy
OSINT OH MY
Copy links to clipboard
Copy
Open
OSINT Repertorium - RIS Open Source Intelligence
AAO Search Tools – coursegalore.com
Osint Links – coursegalore.com
The best tool for inserting text templates - Thousands of common phrases at your fingertips
101+ OSINT Resources for Investigators | i-Sight
OPEN SOURCE GOD: 480+ Open Source Applications
Home | michenriksen.com
Mario Profaca: Mario's Cyberspace Station: The Global Intelligence News Portal
OSINT Tools | Investigation Techniques & Links by Bob Brasich
DARPA - Open Catalog
2016 OLC Wrap-Up – Recipes For Success | OSINT
OSINT Framework
REVEAL | Social Media Verification
pucarasec's Pocket list - Sharedli.st
Vacuuming Image Metadata from The Wayback Machine | Automating OSINT Blog
Automating OSINT Blog
SpiderFoot - Open Source Intelligence Automation Tool (OSINT) - Darknet
Darknet Archives - Darknet
Opportunities
5 OSINT techniques that bring intelligence to the enterprise
Clint Watts - Foreign Policy Research Institute
Open source intelligence techniques and the Dark Web | ITProPortal
SpiderFoot v2.6.1 - Open Source Intelligence Automation
Marinus Analytics
Campaign Contributors Lookup
DARPA seeks to develop real-time intelligence processor to uncover patterns in vast data
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OSINT
Research Resources and Research Tools
Automating Open Source Intelligence - ScienceDirect
www.uk-osint.net
What Type Of Data Can You Get From Twitter? - BrightPlanet
Add data source – Findo
lockfale/OSINT-Framework: OSINT Framework
michenriksen (Michael Henriksen) / Starred
HackPad
Home - InformNapalm.org (English)
Hacked: classified data of Russian state defense procurement 2015-2016 - InformNapalm.org (English)
OSINT Training by Michael Bazzell
Beginners Guide to OSINT – Chapter 1 | The IT Geek Chronicles
OSINT Resources - The Grey Network
torrent-search free download - SourceForge
Raman Data Search and Storage download | SourceForge.net
Content Grabber Premium 1.14.35 + Patch MPT (download torrent) - TPB
Justin Seitz (@jms_dot_py) | Twitter
Visual Analysis
firefox | WebBreacher's Hacking and Hiking Blog
Terrorism and Counterterrorism: Comparing Theory and Practice - Universiteit Leiden | Coursera
learn:tools [CryptoParty.]
automating open source intelligence pdf - Google Search
osint tools 2016 - Google Search
open source intelligence techniques: resources for searching and analyzing online information - Google Search
osint tools - Google Search
Workshop: Open-Source Intelligence (OSINT) & Human Intelligence - Google Search
Welcome! | LinkedIn
Resource: OSINT tools and how you learn how to use them by Guurhart - process, business, resources on Peerlyst
OSINT TOOLS- Symbaloo Gallery
101E IRT - Toddington
Resources - Toddington
DATASETS OH MY!!!
Copy links to clipboard
Copy
Open
Conflict Tracking - Conflict, Peacekeeping & Reconstruction - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Conflict Tracking - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Conflict - Comparative Political Data - Gould Guides at Carleton College
Paul Hensel's Home Page
Internasjonale makrodata | NSD - Norsk senter for forskningsdata
Data
ahalterman (Andy Halterman)
Conflict & Ethnic Politics Data - Politics Resources Guide - LibGuides at Princeton University
VCDB VERIS Community Database
INSCRdata
International Military Intervention Data - 1946-2005
Paul Hensel's International Relations Data Site
All Guides | LibGuides
Polling the Nations
ICPSR
Political Media Sources - Politics Resources Guide - LibGuides at Princeton University
Home - Politics Resources Guide - LibGuides at Princeton University
Data Resources: Race, Ethnicity, Ethnic relations
DSS Data Subject Guides
Harvard Dataverse
Composition of Religious and Ethnic Groups: SID: Research: Cline Center for Democracy | Cline Center for Democracy | University of Illinois
GROWup - Geographical Research On War, Unified Platform
ETH - International Conflict Research - GeoEPR 2014
ETH - International Conflict Research - EPR 2014
ETH - International Conflict Research - Ethnic Power Relations (EPR) Dataset Family
ETH - International Conflict Research - Data
Paul Huth Dataverse
Data - Program on International Law and Armed Conflict - Research Guides at Harvard Library
INCORE: Conflict Data Service: Regional Internet Guides: Index
Data Services at Emory - Data Resources for Political Science - LibGuides at Emory University - Main Library (Woodruff)
Events Data - Data Resources for Political Science - LibGuides at Emory University - Main Library (Woodruff)
SPEED Project - Event Data and Examples | Cline Center for Democracy | University of Illinois
41 tabs
Copy links to clipboard
Copy
Open
Gizem Korkmaz - Google Scholar Citations
Papers: Forecasting
Schrodt: Automated production of high-volume, real-time... - Google Scholar
Philip A. Schrodt - Google Scholar Citations
Google Scholar - Alerts for scitrenbaum@gmail.com
eventdata.psu.edu
Computational Social Science - R. Michael Alvarez - Google Books
Beieler: Generating Political Event Data in Near Real Time - Google Scholar
The Israeli Conflict System: Analytic Approaches - Google Books
Schrodt: 2 Event type, sub-state actor, and temporal... - Google Scholar
Schrodt: Event data in forecasting models: Where... - Google Scholar
Brandt: Evaluating forecasts of political conflict dynamics - Google Scholar
An investigation of dependence in expert judgement studies with multiple experts
Beginner's Guide
Papers: General Political Behavior
Papers: KEDS-Based Research
Links
GDELT ICEWS competitor - Google Search
Useless Press: World Leader Tips
Center for Data Innovation
Center for Data Innovation » computational social science
Center for Data Innovation » social network analysis
GDELT Blog - The Official Blog of the Global Database of Events, Language, and Tone (GDELT) Project! www.gdeltproject.org
To Stay Relevant, Newsrooms Rethink Campaign Coverage - Nieman Reports
SBP-BRiMS 2016
Big data can’t bring objectivity to a subjective world | Techlear
Peace and Conflict 2016 - Google Books
Integrated Conflict Early Warning System | Wiki | 📖 Everipedia, the encyclopedia of everything
Improving Situational Awareness for Humanitarian Logistics Through Pr…
Detecting and forecasting domestic political crises: a graph-based approach - Google Search
Human vs. Automated Text Analysis
Google Scholar Citations
Ramakrishnan: 'Beating the news' with EMBERS: forecasting... - Google Scholar
CiteSeerX — Active Bibliography: Detecting and Forecasting Domestic Political Crises: A Graph-based Approach
nalyzing International Event Data: A Handbook of Computer-Based Techniques - Google Search
Predictive Analytics Machine Learning Lab Handout - Google Search
Main Page - visone user support
Multi-source models for civil unrest forecasting - Google Search
Treat abstract
Wilson: An Investigation of Dependence in Expert... - Google Scholar
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7&ved=0ahUKEwjZjM-rrOjQAhWnh1QKHZlsDm8QFgg8MAY&url=http%3A%2F%2Fcreate.usc.edu%2Fsites%2Fdefault%2Ffiles%2Fpublications%2Fexpertjudgmentinriskanalysis_0.pdf&usg=AFQjCNF43FtYnQbGxBXBB3e3fKs52d18mg&sig2=w-54yWYZ_3IlRgpZCEOAeg
1 tab
Copy links to clipboard
Copy
Open
OneTab shared tabs
81 tabs
Copy links to clipboard
Copy
Open
Fred Meyer - Digital Coupons
Fred Meyer - Digital Coupons
Global Homeland Security & Public Safety Markets - 2017-2022
Project Open Data - Project Open Data
Need Authorities for the Gray Zone > Center for Complex Operations > PRISM 6.3
Office Supplies, Furniture, Technology at Office Depot
Shop Women's Shoes by Rocket Dog + Free Ground Shipping! - Rocket Dog
Today's Best Deals: Fizzics, Camping Gear, Gift Ideas, and More
DARPA Causal Exploration of Complex Operational Environments Proposer’s Day | Contract Research and Development
Causal Exploration Proposers' Day
December News: Gray Zone conflicts explained; Global Terrorism Index released; CVE principles for local government
Online Store
Has anyone found a 'content search' app for Mac that works like Copernic Desktop in Windows? - Quora
HoudahSpot — Find Files by Name, Text, Date, Extension, etc.
dtSearch – Text Retrieval / Full Text Search Engine
dtSearch Product Line Features - dtSearch Desktop / Network
Data Feeds | FEMA.gov
Data.gov
DHS Apps | Homeland Security
Project Open Data Dashboard
JSON to CSV
Jeff McKaughan - issuu
Generational Dynamics - MIT's System Dynamics applied to historical generations
gdelt vs icews vs eventregistry - Google Search
Military Training International Oct/Nov 2016 by Jeff McKaughan - issuu
Special Operations International October 2016 by Jeff McKaughan - issuu
Metadata Resources for Schema v1.1 - Project Open Data
Department of Homeland Security - Project Open Data Dashboard
Slash Data Catalog Requirements - Project Open Data
dtSearch - Sales Questions / Download Requests
dtSearch Product Line Features - dtSearch Publish
MacStories Weekly: Issue 60
New Dropbox mobile offline folders let you work on the go | Dropbox Blog
Workflow Adds Bear Automation – MacStories
Newsletter Archive – Club MacStories
The Role of School Principals in Shaping Children’s Values
Home | openNASA
STATEWATCH - monitoring the state and civil liberties in Europe
Dig for the facts - Investigative Dashboard
Sign in to Investigative Dashboard - Investigative Dashboard
Home | CivicApps.org
del.icio.us tag search {trainque.com}
ICOW Territorial Claims Data
Mosul Offensive - uMap
(32) @stczzop/Alerts on Twitter
Copernic mac - Google Search
Apple equivalent of Copernic | Official Apple Support Communities
best desktop search | Official Apple Support Communities
Copernic Desktop Search Alternatives for Mac OS X - AlternativeTo.net
DHS Digital Government Public Data Catalog - Google Search
Data | Homeland Security
Immigration Data & Statistics | Homeland Security
Intellectual Property Rights (IPR) search - cbp.gov
Find Web Tools and Apps | Homeland Security
Immigration and Citizenship Data | USCIS
Department of Homeland Security - Project Open Data Dashboard
OpenFEMA | FEMA.gov
OpenFEMA (32) | FEMA.gov
Personal - Dropbox
Dropbox Terms of Service and Privacy Policy updates - Dropbox Help - Dropbox
Resistance Dynamics and Social Movement Theory Conditions, Mechanisms, and Effects | Doowan Lee - Academia.edu
Main Conference Day 2 | Special Operations Summit Coronado
Permanent anonymous email address | NotSharingMy.Info
4 Easy Ways To Find Out Who Is Looking For You Online
www.techradar.com/deals/compare?model_name=Apple MacBook Pro 15" (2015)&origin=news
macbook pro 2015 15 inch - Google Search
William & Mary - Theresa Whelan
Who Controls America?
Review: Bear notes app for Mac - SlashGear
Harsch Executive Team: Susanne Orton, VP, Mktg. & Communications
Philip A. Schrodt - Publications
Patrick Brandt - Publications
gdelt icews competitors - Google Search
Political Parties, the Eurozone Crisis, and ICEWS Data | Predictive Heuristics
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwj7wLaloujQAhVN7mMKHaFtAdYQFgg7MAQ&url=http%3A%2F%2Fdata.gdeltproject.org%2Fdocumentation%2FPredicting-Future-Levels-of-Violence-in-Afghanistan-Districts-using-GDELT.pdf&usg=AFQjCNEKWNmcIVIO58A5W2Qd1hJEXfiang&sig2=HfJINkjotTgjyaCqfIh3mA
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0ahUKEwj7wLaloujQAhVN7mMKHaFtAdYQFghEMAU&url=http%3A%2F%2Fwww.datascienceassn.org%2Fsites%2Fdefault%2Ffiles%2FGlobal%2520Database%2520of%2520Events%2C%2520Language%2C%2520and%2520Tone.pdf&usg=AFQjCNHUA6l9WepHXwzbBHe9VOBHjPIIcw&sig2=VvQOEL3-BD1jeQnx188low
An overview of forecasting for politics, conflict, and political violence - Less Wrong
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0ahUKEwj7wLaloujQAhVN7mMKHaFtAdYQFghRMAc&url=https%3A%2F%2Fwww.bbvaresearch.com%2Fwp-content%2Fuploads%2F2015%2F06%2FWorking-paper-15.20-An-Empirical-Assessment-of-Social-Unrest-Dynamics-and-State-Response.pdf&usg=AFQjCNFc4P9xEp93L734k_qztq1PC8yiDg&sig2=wWY1YkrAPd59p5WF9yctFA
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=9&ved=0ahUKEwj7wLaloujQAhVN7mMKHaFtAdYQFghZMAg&url=http%3A%2F%2Fssrc.indiana.edu%2Fseminars%2Fwimdocs%2F2012-10-26_schrodt_political-event-data_slides.pdf&usg=AFQjCNHn2jBZR1g3XyuWV-RDfHUa3qG0Mg&sig2=-T0-kW7faUNVHRkF1nbVXA
Polity | Dart-Throwing Chimp
Saved Session - Session Buddy
9 tabs
Copy links to clipboard
Copy
Open
GDELT and ICEWS, a short comparison | Predictive Heuristics
Predictive Heuristics | Blog by Ward Lab @ Duke U.
Caerus Associates
Open Event Data Alliance
Computational Event Data System
gdelt vs icews vs eventregistry - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwiGj6SdoejQAhUH9WMKHch6C1oQFgg9MAQ&url=https%3A%2F%2Fwww.aaai.org%2Focs%2Findex.php%2FICWSM%2FICWSM16%2Fpaper%2Fdownload%2F13014%2F12811&usg=AFQjCNFZWydYvAJup7RnNlafyMdCJfK2dw&sig2=uBovrYOAWF-Ri1NZHl6gzw
Study: Using Big Data to monitor societal events shows promise, but the coding tech needs work | NULab for texts, maps and networks | Northeastern University
Growing pains for global monitoring of societal events | Science
9 tabs
Copy links to clipboard
Copy
Open
Insight Maker | Free Simulation and Modeling in your Browser
strategic communication - Google Search
strategic communication women - Google Scholar
Framing Life and Death on YouTube: The Strategic Communication of Organ Donation Messages by Organ Procurement Organizations: Journal of Health Communication: Vol 20, No 2
Strategic communication and behavioral coupling in asymmetric joint action
Pitch, Tweet, or Engage on the Street: How to Practice Global Public ... - Kara Alaimo - Google Books
Interesting Social Media Datasets - Google Search
Multimedia Knowledge and Social Media Analytics Laboratory - Google Search
Mining and Analyzing Social Media - Google Search
8 tabs
Copy links to clipboard
Copy
Open
YouTube
Live at Feinstein's/54 Below - YouTube
Lauren Molina - YouTube
SiriusXM - YouTube
triple j - YouTube
Hairspray Live! - Big Blonde & Beautiful - YouTube
Hairspray Live! - Full Show - YouTube
Madonna Carpool Karaoke - YouTube
GITHUB
Copy links to clipboard
Copy
Open
alulsh/DC-Tech-Women-And-NB-Websites: Personal and portfolio websites of women and non-binary people in the DC Tech community.
carpedm20 (Taehoon Kim) / Repositories
engineerapart/TheRemoteFreelancer: Listing of community-curated resources to find topical remote freelance & contract work for software developers, web designers, and more!
GCHQ
hugo53/awesome-RemoteWork: Resources for remote workers: approaches, hiring page, remote life and more.
jivoi (EK_) / Starred
jivoi (EK_) / Following
jwasham/google-interview-university: A complete daily plan for studying to become a Google software engineer.
kimberli/interviews: CS interview study sheet
kostistsaprailis/non-tech-books-for-developers: A list of non-tech books crowdsourced by the Hacker News community.
navdeeshahuja/Facebook-Phishing-Page: A phishing site for facebook
open-guides/og-aws: 📙 Amazon Web Services — a practical guide
raganwald (Reg Braithwaite)
rmusser01 (Robert)
rmusser01 (Robert) / Repositories
sindresorhus (Sindre Sorhus) / Starred
techgaun/github-dorks: Collection of github dorks and helper tool to automate the process of checking dorks
trapexit (Antonio SJ Musumeci) / Repositories
PAPERS to DOWNLOAD Et. Al.
Copy links to clipboard
Copy
Open
Advanced Analytic Techniques
ICIS 2016 Proceedings | International Conference on Information Systems (ICIS) | Association for Information Systems
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Understanding Moderators of Peer Influence for Engineering Viral Marketing Seeding Simulations and Strategies
Human-Computer Interaction | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Empirical Evaluation of Automated Sentiment Analysis as a Decision Aid
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Predicting Medication Prescription Rankings with Medication Relation Network
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Self-determination theory as an explaining mechanism for the effects of patient’s social media use
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: UR SMART: Social Media Analysis Research Toolkit
Social Media and Digital Collaboration | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Momentum in Social Media and Offline Car Sales after Automobile Recalls
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: How Far We Can Go: A Model of Online Activism, Enabling Dynamics, and Social Change
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Analysis of Executive Reputation in Social Media Networks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Social Connectedness and Leadership in Online Communities
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Reputation, User Feedback, and Perceived Information Quality in Social Internet Media: An Empirical Study
International Conference on Information Systems (ICIS) | Association for Information Systems Research | AIS Electronic Library (AISeL)
Social Media and Their Affordances for Organizing: A Review and Agenda for Research | Academy of Management Annals
Today’s Apps Gone Free: Escape from the Pyramid, Translator Widget, Nighty Night and More
CiteSeerX — EVOLVABLE SIMULATIONS APPLIED TO AUTOMATED RED TEAMING: A PRELIMINARY STUDY
Exploring tensions in knowledge networks: Convergences and divergences from social capital, actor-network theory and sociologies of the south
dblp: Karl Granström
dblp: Hossam S. Hassanein
dblp: Sharief M. A. Oteafy
dblp: Fanchao Zeng
"The Non-Economic Functions of Insurgent Taxation: Evidence from the Is" by Mara Revkin
domingo mery :: Material
domingo mery :: Publications
Identifying Human Capital Externality: Evidence from China
Social media and prediction: crime sensing, Data integration and statistical modelling. Using the Collaborative Online Social Media Observatory (COSMOS) to link police incident, Census 2011 and Twitter data - NCRM EPrints Repository
Welcome to the NCRM EPrints Repository - NCRM EPrints Repository
ProQuest Document View - Homo informaticus intelligens: Building a theory of intelligence analysts as information foragers
DOD/IC Problems - Stanford H4D - Spring 2016
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
A computational intelligence decision-support environment for architectural and building design: CIDEA - IEEE Xplore Document
Social Media account linkage using user-generated geo-location data - IEEE Xplore Document
Multisensor data fusion for an autonomous ground vehicle - IEEE Xplore Document
Distributed secondary control for isolated microgrids under malicious attacks - IEEE Xplore Document
Games on Large Networks: Information and Complexity. - IEEE Xplore Document
Frame-based analysis of knee extension exercises using a smartphone accelerometer - IEEE Xplore Document
Smartphone-based transport mode detection for elderly care - IEEE Xplore Document
Smartphone based automatic abnormality detection of kidney in ultrasound images - IEEE Xplore Document
Email communications analysis: how to use computational intelligence methods and tools? - IEEE Xplore Document
Predicting the Future with Social Media - IEEE Xplore Document
Automated modeling and analysis of agent-based simulations using the CASE framework - IEEE Xplore Document
Visual investigation of similarities in Global Terrorism Database by means of synthetic social networks - IEEE Xplore Document
A tool-target based approach for simulating a terrorist attack - IEEE Xplore Document
On the Design of a System for Airport Protection against Terrorist Attacks Using MANPADs - IEEE Xplore Document
Susceptibility to URL-based Internet attacks: Facebook vs. email - IEEE Xplore Document
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications - IEEE Xplore Document
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis - IEEE Xplore Document
Tiered Data Integration for Mobile Health Systems - IEEE Xplore Document
Detectability prediction of hidden Markov models with cluttered observation sequences - IEEE Xplore Document
The economic costs of natural disasters, terrorist attacks, and other calamities: An analysis of economic models that quantify the losses caused by disruptions - IEEE Xplore Document
GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits - IEEE Xplore Document
Toward Predicting Susceptibility to Phishing Victimization on Facebook - IEEE Xplore Document
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
IEEE Xplore Full-Text PDF:
IEEE Xplore Full-Text PDF:
IEEE Xplore: IET Microwaves, Antennas & Propagation - (Current Issue)
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
Resources | 2017 Index of U.S. Military Strength
Download the 2017 Index | 2017 Index of U.S. Military Strength
iniwall.com
Publications - Institute for Security and Development Policy
An open letter to Mr. Secretary general of the united nations to propose setting up global standards for conquering growth limits of capitalism | Journal of Open Innovation: Technology, Market, and Complexity | Full Text
Smartphone-based arrhythmia monitoring. : Current Opinion in Cardiology
PLOS ONE: Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya
Library | kno.e.sis
Library | kno.e.sis
Knowledge Enabled Approach to Predict the Location of Twitter Users | kno.e.sis
Amit Sheth: Educator, Researcher, Entrepreneur
Amit Sheth: Educator, Researcher, Entrepreneur
Amit Sheth: Educator, Researcher, Entrepreneur
Library | kno.e.sis
Library | kno.e.sis
Library | kno.e.sis
A Hybrid Approach to Finding Relevant Social Media Content for Complex Domain Specific Information Needs | kno.e.sis
An Information Filtering and Management Model for Twitter Traffic to Assist Crises Response Coordination | kno.e.sis
Project Descriptions | kno.e.sis
Portland State University Library
The Best Cyber Monday Deals Available Right Now
Hierarchical abnormal event detection by real time and semi-real time multi-tasking video surveillance system | SpringerLink
A personal knowledge management metamodel based on semantic analysis and social information | SpringerLink
A survey of event detection techniques in online social networks | SpringerLink
Computational Red Teaming - Springer
Asymptotic Analysis for Functional Stochastic Differential Equations - Springer
Multi-agent and Complex Systems - Springer
Online Social Networks Event Detection: A Survey - Springer
Semantic Complex Event Processing for Decision Support - Springer
Which Centrality Metric for Which Terrorist Network Topology? - Springer
Deep Bi-directional Long Short-Term Memory Neural Networks for Sentiment Analysis of Social Data - Springer
An Evidential Method for Multi-relational Link Prediction in Uncertain Social Networks - Springer
Relative Neighborhood Graphs Uncover the Dynamics of Social Media Engagement - Springer
Instagram Use, Loneliness, and Social Comparison Orientation: Interact and Browse on Social Media, But Don't Compare | Abstract
Mapping the Impact of Social Media for Innovation: The Role of Social Media in Explaining Innovation Performance in the PDMA Comparative Performance Assessment Study - Roberts - 2016 - Journal of Product Innovation Management - Wiley Online Library
Application of the U - He chronometer to the analysis of nuclear forensic materials - Analytical Chemistry (ACS Publications)
A Qualitative Analysis on Facilitating... - 교보문고 스콜라
The Costs of War with Iran: An Intelligence Preparation of the Battlefield | Small Wars Journal
The Dilemma of Defense Innovation and Adaptation (Part II) | Small Wars Journal
Giving meaning to tweets in emergency situations: a semantic approach for filtering and visualizing social data | SpringerPlus | Full Text
Publications | Complexica
Army Systems Adaptive Red Team /Technical Support and Operational Analysis (ART/TSOA) RFI | Contract Research and Development
ONR Complex Event Recognition from Open Source Social Media Award | Contract Research and Development
CounterStrikeMedia - CounterStrikeTV Home
Perceptual Computing and the Human Experience - DATAVERSITY
List of Publications of T. Kirubarajan (Kiruba)
What Does Donald Trump's Victory Mean for Asia?
Watch Out for Terror's First Incubators - by Husain Haqqani
Proceedings of the International Conference on Interdisciplinary Studies (ICIS 2016) - Interdisciplinarity and Creativity in the Knowledge Society | InTechOpen
isayeret.com | The Israeli Special Forces Database
www.isvg.org
JMIR-Review of Extracting Information From the Social Web for Health Personalization | Fernandez-Luque | Journal of Medical Internet Research
Big Data and Data Science for Security and Fraud Detection
Sensors | Free Full-Text | Analysis of Android Device-Based Solutions for Fall Detection
Sensors | Free Full-Text | Multi-Target Tracking Based on Multi-Bernoulli Filter with Amplitude for Unknown Clutter Rate
Sensors | Free Full-Text | BlueDetect: An iBeacon-Enabled Scheme for Accurate and Energy-Efficient Indoor-Outdoor Detection and Seamless Location-Based Service
Sensors | Free Full-Text | myBlackBox: Blackbox Mobile Cloud Systems for Personalized Unusual Event Detection
Sensors | Free Full-Text | Full On-Device Stay Points Detection in Smartphones for Location-Based Mobile Applications
Axioms | Free Full-Text | Summary of Data Farming | HTML
Resources | Free Full-Text | System Dynamics Modeling for Agricultural and Natural Resource Management Issues: Review of Some Past Cases and Forecasting Future Roles | HTML
Physical Sensors - A section of Sensors
Sensor Networks - A section of Sensors
www.mdpi.com/journal/sensors/special_issues/algorithms_mobile_sensing
Sensors | Special Issue : Data in the IoT: from Sensing to Meaning
Big Data Helping to Pinpoint Terrorist Activities, Attacks (UPDATED)
Resources
Physica A: Statistical Mechanics and its Applications | Articles in Press | ScienceDirect.com
NFD: Non-Technical Loss Fraud Detection in Smart Grid
Explaining Donald Trump via communication style: Grandiosity, informality, and dynamism
How the government’s punishment and individual’s sensitivity affect the rumor spreading in online social networks
Agent based simulation on the process of human flesh search—From perspective of knowledge and emotion
A social media text analytics framework for double-loop learning for citizen-centric public services: A case study of a local government Facebook use
A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks
Game Theoretic Path Selection to Support Security in Device-to-Device Communications
Using Product Variables of Business- to-Business (B2B) Media to Assess the Impacts of Social Media
kurt godel - Wolfram|Alpha
BioMedical Engineering OnLine | Home page
Iranian and Hezbollah Hybrid Warfare Activities: A Small Wars Journal Anthology - Dave Dilegge, Rubert J. Bunker, Alma Keshavarz - Google Books
Perspectives on Culture and Agent-based Simulations: Integrating Cultures - Google Books
Datafloq - How Big Data is Aiding in the Fight Against Terrorism
DSpace@MIT: Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition
Defence Science and Technology Laboratory - Wikipedia
NOT-OD-17-015: NIH Request for Information (RFI) on Strategies for NIH Data Management, Sharing, and Citation
Counter-Terrorism Strategic Communications (CTSC) | ICCT
Lighting the Path: the Evolution of the Islamic State Media Enterprise (2003-2016) | ICCT
Publications | ICCT
Welcome - ICIS 2016
Knowledge Discovery Laboratory - UMass Amherst
"Google Scholar" (52) - scitrenbaum@gmail.com - Gmail
O'Reilly Discounts Every eBook By 50% - Slashdot
Alfresco » Document Library
SSRN Electronic Library
cognitive | Public Intelligence
smartcard | Public Intelligence
surrender | Public Intelligence
DHS Geospatial Concept of Operations (GeoCONOPS) Version 6 | Public Intelligence
How to Conduct Psychological Operations | Public Intelligence
Joint Chiefs of Staff Guide Offers Blunt Assessment of Afghan National Police | Public Intelligence
(U//FOUO) Joint Center for International Security Force Assistance Guide: Roles and Functions of Senior Advisors | Public Intelligence
Joint Operating Environment 2035: The Joint Force in a Contested and Disordered World | Public Intelligence
DHS NCCIC Report on the Art of Social Engineering | Public Intelligence
Joint Staff Strategic Multi-Layer Assessment on Bio-Psycho-Social Applications to Cognitive Engagement | Public Intelligence
Joint Staff Strategic Assessment: Counter-Da’esh Influence Operations Cognitive Space Narrative Simulation Insights | Public Intelligence
Cultural Intelligence | Public Intelligence
Joint Chiefs of Staff | Public Intelligence
U.K. Ministry of Defence Future Operating Environment 2035 | Public Intelligence
U.S. Army Special Operations Command Presentation: Concept for Cognitive Joint Force Entry | Public Intelligence
Amit Sheth - Google Scholar Citations
Mahinthan Chandramohan - Google Scholar Citations
Malcolm Yoke Hean Low - Google Scholar Citations
Alessandro Farinelli - Google Scholar Citations
Erik Blasch - Google Scholar Citations
Jesus Cerquides - Google Scholar Citations
Mervat Abu-Elkheir - Google Scholar Citations
Google Scholar Citations
Granström: Asymmetric Threat Modeling Using HMMs:... - Google Scholar
Karthika: A comparative study of social networking... - Google Scholar
Resnik: SCALABLE MULTIDIMENSIONAL RESPONSE MEASUREMENT... - Google Scholar
Granström: Asymmetric Threat Modeling Using HMMs:... - Google Scholar
Detectability prediction of hidden Markov models with cluttered observation sequences. - Google Scholar
Choudhary: A Survey on Social Network Analysis for... - Google Scholar
Campbell: Social network analysis with content and graphs - Google Scholar
Yang: Covert nodes mining in social networks based... - Google Scholar
Baldwin: Simulation Approaches for System of Systems:... - Google Scholar
Sirois: Potential and limits of numerical modelling... - Google Scholar
rakunde - TPB
Russian Influence Operations – Damn, They Suck – To Inform is to Influence
Fragile and Conflict-Affected Situations | Asian Development Bank
Open Source Software | The Ames Laboratory
CEEOL - Article Detail
Center for a New American Security
A--Award - - Federal Business Opportunities: Opportunities
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis - Google Search
Automated Detection of Threat Objects Using Adapted Implicit Shape Model - Google Search
Big Data for Remote Sensing: Challenges and Opportunities - Google Search
Civil Unrest Event Data - Google Search
Complex Event Recognition from Open Source Social Media - Google Search
complex event processing open source - Google Search
defense and technology laboratory - Google Search
Detectability prediction of hidden Markov models with cluttered observation sequences - Google Search
eva nozableeda - Google Search
evolving optimal and diversified military operational plans for computational red teaming - Google Search
Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition - Google Search
Multitasking intelligent surveillance and first response system - Google Search
Potential uses of Numerical Simulation for the Modelling of Civil Conflict - Google Search
Predicting Medication Prescription Rankings with Medication Relation Network - Google Search
Real time big data analytics for predicting terrorist incidents - Google Search
Red teaming with - Google Search
rox- imity, an open-source software environment developed by the Knowledge Discovery Laboratory - Google Search
Tracking Small UAVs Using a Bernoulli Filter - Google Search
Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks - Google Search
VACCINE ANNUAL REPORT Visual analytics - Google Search
Defence Science and Technology Laboratory - GOV.UK
Working for Dstl - Defence Science and Technology Laboratory - GOV.UK
IEEE - 2016 International Conference in Information Science (ICIS)
Review of extracting information from the Social Web for health personalization. - PubMed - NCBI
How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX. - PubMed - NCBI
Crowdsourcing, citizen sensing and sensor web technologies for public and environmental health surveillance and crisis management: trends, OGC stan... - PubMed - NCBI
A survey of online activity recognition using mobile phones. - PubMed - NCBI
Giving meaning to tweets in emergency situations: a semantic approach for filtering and visualizing social data. - PubMed - NCBI
OSA | Optical Fiber Spectrometer based on Smartphone Platform for Refractive Index Sensing Application
Amit Sheth
Amit Sheth - Publications
Aryya Gangopadhyay - Publications
Branko Ristic - Publications
Lyudmila Mihaylova - Publications
Mei-Po Kwan - Publications
Bernoulli Particle/Box-Particle Filters for Detection and Tracking in the Presence of Triple Measurement Uncertainty
State estimation and fault detection using box particle filtering with stochastic measurements
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis
Ismailcem Budak Arpinar - ResearchGate
Amadou Gning - ResearchGate
A co-evolutionary approach for military operational analysis - Semantic Scholar
A co-evolutionary approach for military operational analysis - Semantic Scholar
Automated modeling and analysis of agent-based simulations using the CASE framework - Semantic Scholar
ACE Framework - Semantic Scholar
Home | SRI International
38 tabs
Copy links to clipboard
Copy
Open
New Tab
Advanced Analytic Techniques
ICIS 2016 Proceedings | International Conference on Information Systems (ICIS) | Association for Information Systems
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Understanding Moderators of Peer Influence for Engineering Viral Marketing Seeding Simulations and Strategies
Human-Computer Interaction | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Empirical Evaluation of Automated Sentiment Analysis as a Decision Aid
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Predicting Medication Prescription Rankings with Medication Relation Network
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Self-determination theory as an explaining mechanism for the effects of patient’s social media use
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: UR SMART: Social Media Analysis Research Toolkit
Social Media and Digital Collaboration | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Momentum in Social Media and Offline Car Sales after Automobile Recalls
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: How Far We Can Go: A Model of Online Activism, Enabling Dynamics, and Social Change
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Analysis of Executive Reputation in Social Media Networks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Social Connectedness and Leadership in Online Communities
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Reputation, User Feedback, and Perceived Information Quality in Social Internet Media: An Empirical Study
International Conference on Information Systems (ICIS) | Association for Information Systems Research | AIS Electronic Library (AISeL)
Social Media and Their Affordances for Organizing: A Review and Agenda for Research | Academy of Management Annals
Today’s Apps Gone Free: Escape from the Pyramid, Translator Widget, Nighty Night and More
CiteSeerX — EVOLVABLE SIMULATIONS APPLIED TO AUTOMATED RED TEAMING: A PRELIMINARY STUDY
Exploring tensions in knowledge networks: Convergences and divergences from social capital, actor-network theory and sociologies of the south
dblp: Karl Granström
dblp: Hossam S. Hassanein
dblp: Sharief M. A. Oteafy
dblp: Fanchao Zeng
"The Non-Economic Functions of Insurgent Taxation: Evidence from the Is" by Mara Revkin
domingo mery :: Material
domingo mery :: Publications
Identifying Human Capital Externality: Evidence from China
管理科学学报(英文)
Social media and prediction: crime sensing, Data integration and statistical modelling. Using the Collaborative Online Social Media Observatory (COSMOS) to link police incident, Census 2011 and Twitter data - NCRM EPrints Repository
Welcome to the NCRM EPrints Repository - NCRM EPrints Repository
ProQuest Document View - Homo informaticus intelligens: Building a theory of intelligence analysts as information foragers
DOD/IC Problems - Stanford H4D - Spring 2016
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
A computational intelligence decision-support environment for architectural and building design: CIDEA - IEEE Xplore Document
Social Media account linkage using user-generated geo-location data - IEEE Xplore Document
Multisensor data fusion for an autonomous ground vehicle
12-05 Tiny OneTabs to Love & Cherish
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
21 tabs
Copy links to clipboard
Copy
Open
New Tab
Remove Duplicate Lines and sort
findo app cyber monday - Google Search
Why Is The FBI Reaching Out To Student Bioengineers? | Motherboard
factors that influence decision making war cognitive - Google Search
Combating Terrorism Center at West Point
Meet the machines that steal your phone’s data | Ars Technica
Here's a Picture of a Phone-Tracking Device That We've Never Seen in the Wild | Motherboard
Australian terrorist Neil Prakash may have been tracked by social media posts
Stingray Tracking Devices: Who's Got Them? | American Civil Liberties Union
Modeling Adversary Beliefs and Motivations - Google Search
How US Dollars Are Helping The Philippines' Bloody Drug War - BuzzFeed News
How US Dollars Are Helping The Philippines' Bloody Drug War - BuzzFeed News
Site Suspended - This site has stepped out for a bit
2015 ICWSM Workshop - Google Search
Tweets by Auburn OSINT (@auburnosint) – Twitter
Mission Plan Recognition: - Google Search
Predictive Analysis for Social Processes - Google Search
SCUBA: An agent-based ontology creation and alignment method for socio-cultural modeling - Google Search
ESSoS Doctoral Symposium - Google Search
Model Interoperation - Google Search
12-04
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Portland Weekly Deals In Stores Now : Target Weekly Ad
Elite U.S. Special Operators Build Center for Perpetual War on Terror - The Daily Beast
Sandia National Laboratories: National Security Missions: International Homeland and Nuclear Security: WMD Counterterrorism & Response
OSTI, US Dept of Energy Office of Scientific and Technical Information | Speeding access to science information from DOE and Beyond
On the Homefront – the HSDL Blog – Homeland Security Digital Library
Intelligence: news and discussion about Intelligence and espionage matters around the world
Eurachem Guides
Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
Personal - Dropbox
Detecting online investigations | michenriksen.com
Information Warfare - The RMA Debate
Nanobionic spinach plants can detect explosives | MIT News
Guide to Football/Soccer data and APIs - Joe Kampschmidt's Code
Tech Transfer | NASA
1000 Life hacks
Save 10% on Target Gift Cards, Today Only
Sunday's Best Deals: All-Clad, Winter Clothes, Despicable Me, and More
This $30 Drone Is a Great Christmas Gift For Those Who Want To Take to The Skies
World’s First Explosive Detection Drone Unveiled at Israel’s HLS & Cyber Event | Defense Update:
Can ‘Mad Dog’ Mattis Temper the Impulsive President-Elect? | Foreign Policy
New audio message from Jabhat Fataḥ al-Shām: “Unquestionably, The Help Of God Is Near” | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
mdwardlab.com
How 3D-Printed Dog Noses Can Improve Bomb Detectors | Motherboard
NIJ Publication Detail
NIJ Publication Detail
mediacenter | Countering Drones
Frank Kendall on the NDAA and the End of AT&L
Standard operating procedure | The Economist
Is Your iPhone 6s Eligible For A Free Battery Replacement? Here's How To Find Out
Breakthrough Prize program awards $25 million
GIS and Agent-Based Modeling: New Paper: Close, But Not Close Enough
GIS and Agent-Based Modeling: International Congress on Agent Computing
How Trump’s Government Could Change America’s Approach to Terrorism - Defense - GovExec.com
Growing Egypt-Syria Rapprochement Includes Al-Sisi Statement In Support Of Syrian Army, Reports On Egyptian Military Aid To Syria | MEMRI - The Middle East Media Research Institute
www.memri.org/rss.xml
Biomimetic Sniffing Improves the Detection Performance of a 3D Printed Nose of a Dog and a Commercial Trace Vapor Detector : Scientific Reports
U.S. building a network to hit militants - US news - Security | NBC News
DHS Wants New Facial Recognition Cameras in Airports - Nextgov.com
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
National Security | Georgia Tech Research
Sandia National Laboratories: Publications
Sandia National Laboratories: Irina (Kalashnikova) Tezaur: Technical Reports
Sculpting Evolution
Data and Tools | START.umd.edu
The Trench | Remembering where science, industry and military art converged; Challenging entrenched opinions
Publications | Center for Cyber & Homeland Security | The George Washington University
National Security Operations Center - Wikipedia
Underground Tradecraft : The Diaries Of a CIA Operative - The Washington...
How the Trump Campaign Built an Identity Database and Used Facebook Ads to Win the Election – Startup Grind – Medium
The NSA’s Spy Hub in New York, Hidden in Plain Sight
TinkerTool: Description
Center for Homeland Defense and Security – The Nation's Homeland Security Educator
Taquechel, Lewis extend work on quantifying deterrence, incorporate cognitive biases – Center for Homeland Defense and Security
Daily Open Source Infrastructure Report | Homeland Security
Personal - Dropbox
Terminology in Analytical Measurement
Bombs that can recognise their targets are back in fashion - Google Search
sandia reports - Google Search
Volume XII Archives - HOMELAND SECURITY AFFAIRS
HSDL Search Results
Artificial dog noses make explosives detectors more effective
Dare to share? | Research Information
U.S. Military Preps for Gene Drives Run Amok - Scientific American
Soft intelligence is important too: Silobreaker
Predicting the Future: Anticipating Security Events with Data Analytics | The Cipher Brief
12-04 9:13pm - Session Buddy
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
12-03
Copy links to clipboard
Copy
Open
terrorism | H-Net
TOC | H-Net
Welcome to Muir S. Fairchild Research Information Home Page
START Annual Meeting 2016: Quick-Fire Presentation - Counterterrorism, Countering Violent Extremism, Deradicalization | START.umd.edu
Comparing Failed, Foiled, Completed and Successful Terrorist Attacks | START.umd.edu
Micro and Nano Technologies [Updated at 2016.12.03] (download torrent) - TPB
Forensics & Criminal Justice from CRC Press - Page 1
Gamifying the Search for Strategic Surprise
Technology takes over flight of attacking drones -- Defense Systems
Crack Open A New Book--Any Book--With Amazon's $5 off $15 Sale
Air Force counters ISIS explosive-laden drone attacks -- Defense Systems
Designing Agile Human-Machine Teams
The Pentagon Wants Eye-Reading Software, X-Ray Tools, and A Virtual Facebook to Fight Terrorism - Defense One
The CTTSO | CTTSO
7090 - Combating Terrorism Technical Support Office (CTTSO) APBI
12-01
Copy links to clipboard
Copy
Open
Defence Research Reports
Paul K Davis - Google Scholar Citations
AAAI Sponsored Workshops—AAAI-17
Conflict and Security Issues | The National Academies Press
Computational Social Science Institute – UMass Amherst – Home
FUZZ-IEEE 2017, Naples, Italy
These Wearables Detect Health Issues Before They Happen
The Problem of Islamic Terrorism in Kenya in Terms of Regional Security in East Africa | START.umd.edu
Hitting a Moving Target: A Strategic Tool for Analyzing Terrorist Threats | START.umd.edu
Best Online Backup Providers of 2016
November News: Far-right terrorist recruitment & radicalization; Law enforcement homicides committed by extremists; FARC and the failed peace process
Home · FlowingMedia/TimeFlow Wiki · GitHub
Who is Winning the Syrian Digital War? - Harvard - Belfer Center for Science and International Affairs
Research data spring | Jisc
Social Media Lab | "Making sense of a networked world"
The Curious Wavefunction: Leroy Hood and the tool-driven revolution in biology
DHS and DNDO SBIR Pre-solicitation for FY17 Topics | Contract Research and Development
ARL NS-CTA Blog
Who is winning the Syrian digital war?
bellingcat - Inghimasi – The Secret ISIS Tactic Designed for the Digital Age - bellingcat
Davis: Simple Models to explore Deterrence and more... - Google Scholar
Goodman: Operations Odyssey Dawn and Unified Protector:... - Google Scholar
Elephants in Afghanistan: The Military’s Counterinsurgency Failure
Shtetl-Optimized » Blog Archive » Quantum computing news (98% Trump-free)
IDF Brig. Gen. Nechemya Sokal Speaks at MWI Event on Subterranean Warfare and Emerging Technologies - Modern War Institute
Syncthing
Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
Dark Web News | Ultimate Deep Web & Dark Net Resource
Online Coupons 2016, Discount Code | OnlineCouponIsland
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
TRADOC G-2 Mad Scientist - APAN Community
Which election forecast was the most accurate? Or rather: The least wrong? - The Washington Post
Public Support for Terrorism (PSOT) program - Google Search
Hitting a Moving Target: A Strategic Tool for Analyzing Terrorist Threats. - PubMed - NCBI
dblp: computer science bibliography
Thesis and Dissertation Collection
behavioral influences analysis and assessment modeling and simulation tools and research
Welcome to Jongeun's homepage.
RTO-MP-HFM-202
Search Results :
Peace Research Institute Oslo (PRIO)
LRA Crisis Tracker
Search Results : Human Modelling for Military Application
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East - IEEE Xplore Document
The analytical study of terrorism
Ptolemy Project Home Page
Publications - SA Technologies
Defence Research and Development Canada | Publications
Defence Research and Development Canada | Research Centres
Disposable electrochemical paper-based devices fully fabricated by screen-printing technique
Cyber Monday Deals : Cyber Monday 2016 : Target
An Overview of Geographical Perspectives and Approaches in Terrorism Research | Bahgat | Perspectives on Terrorism
Soft Targets and Crisis Management: - Google Scholar
Crime and Intelligence Analysis: An Integrated Real-Time Approach - CRC Press Book
Soft Targets and Crisis Management: What Emergency Planners and Security Professionals Need to Know - CRC Press Book
Fred Meyer
Data-driven system identification of the social network dynamics in online postings of an extremist group - Google Search
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East - Google Search
Intelligence Studies Products - Routledge
RTO-MP-HFM-202
11-29 PM
Copy links to clipboard
Copy
Open
AQAP: Publishing New Inspire Guides
DARPA Agile Teams (A-Teams) Proposers Day | Contract Research and Development
Associations for Citizen Science: Regional Knowledge, Global Collaboration
Code Words » Conflict | A Society of Professional Journalists Blog
[1611.09441] Sentiment Analysis for Twitter : Going Beyond Tweet Text
[1611.09387] There is Something Beyond the Twitter Network
[1611.09405] An End-to-End Architecture for Keyword Spotting and Voice Activity Detection
Obama Extends Global Reach of US Special Operations Death Squads | Global Research - Centre for Research on Globalization
Counter-External Operations Task Force - Google Search
Inspire Guides - Google Search
Director of Intelligence Proposed Research Topics - Google Search
Intelligence > Leaders > DIRINT > Research Topics
Inferring Adversary Intent & Estimating Behavior - Google Search
CAESAR III - Inferring Adversary Intent & Estimating Behavior
Santos Jr: A cognitive architecture for adversary... - Google Scholar
Santos Jr: A cognitive architecture for adversary... - Google Scholar
Group Decision and Negotiation 2014 GDN 2014: Proceedings of the Joint ... - Google Books
NikiPink - TPB
Tova (@stczzop) | Twitter
Kashana (@kashanacauley) | Twitter
@stczzop/Theater on Twitter
The 5 Best Moments From Lin-Manuel Miranda’s Drunk History Episode | Playbill
STAGE TUBE: Lin-Manuel Miranda and Dwayne Johnson Join Forces for MILLENIALS- Watch the Full Musical!
SOC Fundamentals for Your Threat Intelligence Program
Dimitri Bertsekas Homepage
Open Knowledge Maps - A visual interface to the world's scientific knowledge
Jürgen Pfeffer - Google Search
Under Secretary of Defense for Policy > OUSDP Offices > ASD for Special Operations/Low-Intensity Conflict
Amazon.com: Up to 60% Off Pajamas & More: Clothing, Shoes & Jewelry
Amazon.com: Seagate Expansion 8TB Desktop External Hard Drive USB 3.0 (STEB8000100): Computers & Accessories
Openlv by tvidas
Amazon.com: Deal of the Day: Up to 50% Off Men's and Women's Slippers: Clothing, Shoes & Jewelry
The 50 Free Apps We're Most Thankful For
Enhanced Interrogation: CIA Psychologist’s Book Defends The Program | GOSINT
List of Covert Affairs episodes - Wikipedia
Enhanced Interrogation: Inside the Minds and Motives of the Islamic Terrorists Trying To Destroy America: James E. Mitchell Ph.D., Bill Harlow: 9781101906842: Amazon.com: Books
The Robot Revolution Comes to Synthetic Biology - IEEE Spectrum
Open Knowledge Maps - A visual interface to the world's scientific knowledge
32% Off on Microsoft Surface 3 32GB Tablet | Groupon Goods
DGSI Lacks Big Data Mining Tools, Turns to PALANTIR For Help | GOSINT
Shop Women's Shoes by Rocket Dog + Free Ground Shipping! - Rocket Dog
Tools for Would-Be Biohackers: Here Come 3 Mini-Labs - IEEE Spectrum
Hiroven - TPB
Jane the Virgin Recap: The Nun Who Knew Too Much -- Vulture
DARPA group will promote best practices for using robots to make satellite repairs in space - GeekWire
Air Force launches Defense Technology Accelerator -- FCW
Publications
About the Department of Defense - DoD 101
36 tabs
Copy links to clipboard
Copy
Open
ICCCF 2016 Programme – APATAS
Welcome to Jongeun's homepage.
Birdwatcher: Data analysis and OSINT framework for Twitter | michenriksen.com
Design for Intelligence Analysis: Understanding Users, User Tasks, and Tool Usage
II Projects Page
Prosecutors in Portland Change Policy on Drug Convictions - ProPublica
iOS 10.1.1 Is Draining iPhone Batteries | News & Opinion | PCMag.com
One by One, ISIS Social Media Experts Are Killed as Result of F.B.I. Program - The New York Times
Author Page for test :: SSRN
Tablets, PCs and Office — Benedict Evans
The Biological Warfare Blog: Black Six: Scientific Flight from Syrian to Lebanon
Charles River Analytics-Led Team to Develop Automated Cyber Attack Prediction System for IARPA | ExecutiveBiz
Electrospaces.net: Data sharing systems used within the Five Eyes partnership
15 Books to Make You the Ultimate Spy – Johnny Lists
A Project Management Guide to Deploying Biometrics: The Basics
A Project Management Guide to Deploying Biometrics: Technical Aspects
this. | Car Wars
BAE Systems Wants To Defeat Jammers With Thinking Machines | Popular Science
The Mathematical Movie Database
Initial Reactions in Iran to the Election of Donald Trump as President of the United States Dr. Raz Zimmt
[1611.06737] OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
Algorithms for Sensor Systems: 7th International Symposium on Algorithms for ... - Google Books
DoD hacking effort extended to Army -- Defense Systems
Next-Generation Electronic Warfare Development Targets Fully Adaptive Threat Response Technology | Georgia Tech Research Institute
The Little-Known Arms Race Threatening to Blow Up the South Caucasus
About P5 - Totalförsvarets forskningsinstitut
Free Innovation by Eric A. von Hippel :: SSRN
US Government Wants You to Hack US Military and Pentagon for Good
CYBER MONDAY
Copy links to clipboard
Copy
Open
Shop Women's Shoes by Rocket Dog + Free Ground Shipping! - Rocket Dog
#MacStoriesDeals Black Friday & Cyber Monday 2016: The Best Deals for iOS and Mac Apps & Games – MacStories
Student Discount | Perks of Student Life | UNiDAYS
Amazon Prime Now: Samsung T3 Portable SSD - 500GB - USB 3.1 External SSD (MU-PT500B/AM): Computers & Accessories
Amazon Prime Now
Cyber Monday Deals : Cyber Monday 2016 : Target
Soccer T-shirts – Ultras
Product Hunt Cyber Monday - Product Hunt
Shopping Bag - Shopping Bag
Zappos.com Shopping Cart
Ultras 30% Off Sale Cyber Monday
EXPRESS
Womens Tanks & Camis
Deal Center at Office Depot
Deals - Kinja Deals
Amazon.com: 30% off Cyber Monday Deals Week: Clothing, Shoes & Jewelry
adidas Cyber Monday | adidas US
Cyber Monday 2016 | ThinkGeek
Cyber Monday Deals : Cyber Monday 2016 : Target
home deals : Target
Electronics Deals : Target
TVs : Target
Bedding : Target
Furniture Store : Target
Furniture Store : Target
Furniture Store : Target
home office furniture : Target
furniture collections : Target
lounge seating, furniture : Target
pets : Target
Amazon's Cyber Monday Acer Sale Includes a 1080p Chromebook and a $90 IPS Display
Amazon.com: Kindle Deal of the Day
Clearance | Nordstrom Rack
ALL the LITTLE OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Kill the newsletter!
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
START HERE
Copy links to clipboard
Copy
Open
SBIRS Satellite Provide ‘Unblinking Eyes’, Constantly Monitoring Hotspots Worldwide | Defense Update:
How to Support a Partner Struggling with Depression
Visualising Twitter Dynamics in Gephi, Part 1 | Mapping Online Publics
ISIS Social Media Analysis of twitter news outlets following @Th3j35t3r Tango-Downs ~ Matteo Flora
Newsroom Tools
The Drone Center Weekly Roundup: 11/7/16 | Robohub
FAA, Industry Partners Announce 'Pathfinder' Drone Research | Aerospace News: Aviation International News
U.S. Agencies Support Counter-Drone Technology Efforts | Aerospace News: Aviation International News
Unmanned Aerial Vehicles News | Aviation International News
The Kill List: ICWatch Uses LinkedIn Account Info to Out Officials Who Aided Assassination Program | Democracy Now!
IWS Link Directory
What We Know About ISIS's Scratch-built Drones | Popular Science
A Visual Introduction to Machine Learning
IS turns to tunnels in last stand for Iraqi town
Civil Society, Peace, and Power | START.umd.edu
Publications | START.umd.edu
Civilian Unmanned Airborne Systems - Threats an Opportunities - Think Defence
Counter-UAV System from Airbus Defence and Space protects large installations and events from illicit intrusion
Countering drones via radio frequency -- GCN
Pinboard: bookmarks for scitrenb tagged 'stem/steam'
Import your notes and files to the Notes app - Apple Support
Researchers Hack Philips Hue Smart Bulbs Using a Drone - Slashdot
(5) Kelsey D. Atherton (@AthertonKD) | Twitter
Joan Soley on Twitter: "Made by #Daesh, downed by #Iraq SpecF in eastern #Mosul #MosulOffensive @BBCWorld @CJTFOIR https://t.co/3wv2YVH4aA"
JΞSTΞR ✪ ΔCTUAL³³º¹ on Twitter: "This visualization shows the location of certain industrial control (SCADA/PLC) systems exposed on the Internet >> https://t.co/K42hoe610G"
All Source Intelligence
Visualizing @th3j35t3r - Google Search
cartoon girl curly hair - Google Search | journaling | Pinterest
How The Jester Uses Web Intelligence
2016 | New technology using radar can identify materials and objects in real time | University of St Andrews
Peter Thiel explains why his company’s defense contracts could lead to less war - The Washington Post
TOOLS
Copy links to clipboard
Copy
Open
Send Anonymous Emails, Free Anonymous Email, Send Anonymous Emails with attactment, Anonymous Email Attached Files, Email Anonymous - Home
OSINT Search Tool by Michael Bazzell | Open Source Intelligence Techniques
TII Online Research and Intelligence Newsletter - August 2016
GPS Visualizer: Quick Geocoder
Location-based Search | Echosec
Privacy Training by Michael Bazzell
site:flickr.com "serial" "YB0043334" - Google Search
Opt-out of Nuwber
The Operational-Security Newsletter by Justin Carroll
SocialSeeking - Social Search Engine
IRC Networks
NARA - AAD - Main Page
Privacy-Training Blog » Blog Archive » Episode 002-The Complete Privacy & Security Podcast
WiGLE: Wireless Network Mapping
The Wolfram Language Image Identification Project
Privacy-Training Blog » Blog Archive » The Complete Privacy & Security Podcast-Episode 003
TweetMap ALPHA
Open Source Intelligence Techniques by Michael Bazzell
Free State Criminal Background Check and Convicted Felon Tracking » Felon Search
Free Sex Offender Registry | Local Sex Predators | Family Watchdog
Hiding from the Internet by Michael Bazzell
OSINT Training by Michael Bazzell
The Complete Privacy & Security Desk Reference by Michael Bazzell
OSINT Training by Michael Bazzell
SHOPPING
Copy links to clipboard
Copy
Open
64% Off on Adjustable Desk Stands | Groupon Goods
Sit-and-Ride Inflatable Seat with Vibrating Dong | Groupon
Lindo Bookcase with Pull-Out Doors | Groupon
Baxton Studio Lindo Dark Brown Wood Bookcase with Two Pulled-out Doors Shelving Cabinet - Deals, Reviews & Prices - 17529014
Muk Luks Bianca and Santina Women's Zip-Up Boots | Groupon
Pet-Food Bins and Scoops (3-piece) | Groupon
Outdoor Tactical Waist Pack | Groupon
Lindo Wood Bookcase with Two Pulled-out Doors Shelving Cabinet - Dark Brown - Baxton Studio : Target
Baxton Studio Lindo Dark Brown Wood Bookcase with One Pulled-out Door Shelving Cabinet - Deals, Reviews & Prices - 17616319
Wholesale Interiors Baxton Studio with 2-Pulled Out Doors 38" Standard Bookcase | Wayfair
NO PITY ORIGINALS – No Pity Originals
AmazonSmile: Tile Slim - Phone Finder. Wallet Finder. Item Finder - 1-Pack: Cell Phones & Accessories
Howard Leight by Honeywell Impact Sport Sound Amplification Electronic Earmuff, Classic Green (R-01526) - Hunting Earmuffs - Amazon.com
Today's Best Deals: Amazon Echo, Sweaters, Electric Shavers, and More
9 tabs
Copy links to clipboard
Copy
Open
Anna Cattish - Masters of Anatomy
GitHub - caesar0301/awesome-public-datasets: An awesome list of high-quality open datasets in public domains (on-going).
Scio Pocket Molecular Scanner Is a Google-like Device for Physical Objects | TIME
How The NSA Uses Social Network Analysis To Map Terrorist Networks | Digital Tonto
GitHub - sindresorhus/awesome: Curated list of awesome lists
idea generating related to a MIT news article - Google Groups
IntelCenter: Subscriptions
My Conversation with Peter Thiel about Apartheid… And its Unfolding Aftermath – Thoughts And Ideas – Medium
Science on a shoestring: getting results despite budget cuts | Dean Burnett | Science | The Guardian
6 tabs
Copy links to clipboard
Copy
Open
BigMusicalFan - YouTube
Broadway Lover - YouTube
Newsies - YouTube
newsies variety show - YouTube
Newsies On Tour - Inside Rehearsal - YouTube
The Newsboys Variety Show 11/6/16 - YouTube
NATO
Copy links to clipboard
Copy
Open
OneTab shared tabs
RTO-MP-SAS-071
RTO-MP-SAS-071
STO-MP-HFM-249
RTO-MP-002-V1
STO-MP-AVT-241
STO-MP-IST-123 - All Documents
Search Results : Analytical Support to Tactical Development"
Search Results : Analytical Support to Tactical Development"
STO-TR-SET-189 - Google Search
SET-189 Battlefield Acoustic Sensing, Multi-modal Sensing and Networked Sensing for ISR Applications
STO Technical Reports - STO-TR-SET-189
10.14339/STO-TR-SET-189 - Google Search
Start Here
Copy links to clipboard
Copy
Open
cell biology 3d model printing - Google Search
Social Network Diffusion | CySIS
Home Page of Shanchieh Jay Yang
Publications - ErikBlasch
Erik Blasch - Publications
Sensors | Special Issue : Topology Control in Emerging Sensor Networks
NIMBioS: Diffusion in Social Networks | CySIS
Publications | CySIS
Presentations and Authors
TATP– unusual way of preparation, something to be aware of - Google Search
TATP: Countering the Mother of Satan | TFOT
3D PRINT
Copy links to clipboard
Copy
Open
TRIANGL3D's 3D Printing Hub | Raleigh | 27606 | 3D Hubs
Marco's 3D Printing Hub | Bielefeld | | 3D Hubs
BioHack Academy · GitHub
papaly
Attensa - Intelligent Information Management
Animal Cell 3D Model Download - 3D CAD Browser
3D models tagged cell - Sketchfab
Poliovirus by Crystal Proteins - 3D model - Sketchfab
AAV9 virus vector by microscape - 3D model - Sketchfab
Free Cell Science-medical 3D Models | Get free 3d Science-medical model, download MAX OBJ FBX C4D files | CGTrader.com
3D Models and Textures | TurboSquid.com
CrystalProtein.com
3ds max microbes micro organisms
3ds max organic e coli
microbiology virus 3d model
microscopic cells 3d model
3D Models, Download 3D Models at TurboSquid
About Us - Sketchfab
anatocell on Sketchfab - Sketchfab
1RVA complexed with DNA by Crystal Proteins - 3D model - Sketchfab
Weapons 3D models | Categories - Sketchfab
Search "virus" — Sketchfab
Plant cell 3D Models | Download 3D Plant cell files | CGTrader.com
Science / Medical 3D Models | Download 3D Science / Medical files | CGTrader.com
download 3d models of cells - Google Search
Miniature to Massive - YouTube
Things tagged with 'Cell' - Thingiverse
Topics - 3D-Printing In Education - Groups - Thingiverse
State of synbio publishing | PLOS Synthetic Biology Community
Virus Hunter: Monitoring Nipah Virus in Bat Populations | HHMI BioInteractive
3DPrintAProtein by tzarembinski - Shapeways Shops
Maker/DIY - Shapeways Tech
BioInteractive Search Results | HHMI BioInteractive
Virus Explorer | HHMI BioInteractive
Discover 3D Models | NIH 3D Print Exchange
BioInteractive Search Results | HHMI BioInteractive
NASA
3D Printed Ebola Virus — Target or Talisman? | 3DPrint.com
My Drive - Google Drive
Inbox (497) - scitrenbaum@gmail.com - Gmail
send t0 BRIGGS Virus Hunter: Monitoring Nipah Virus in Bat Populations | HHMI BioInteractive - scitrenbaum@gmail.com - Gmail
Infectious Disease | HHMI BioInteractive
Inbox (260) - sara.citrenbaum@pcc.edu - Portland Community College Mail
Home | MyPCC
Micro 3D Print Models | Download 3D Micro files - CGTrader.com
3ds file extension - Google Search
3DPrintAProtein - Google Search
Saved Session - Session Buddy
PLOS ONE: Virtual Reconstruction and Three-Dimensional Printing of Blood Cells as a Tool in Cell Biology Education
PLOS Collections: Article collections published by the Public Library of Science
Accessible bioprinting: adaptation of a low-cost 3D-printer for precise cell placement and stem cell differentiation - IOPscience
PLOS ONE: DNA Assembly in 3D Printed Fluidics
Make a Gel Electrophoresis Power Supply | Make:
PLOS ONE: LudusScope: Accessible Interactive Smartphone Microscopy for Life-Science Education
PLOS Collections: Article collections published by the Public Library of Science
PLOS ONE: Portable, Battery-Operated, Low-Cost, Bright Field and Fluorescence Microscope
3D Models | HHMI BioInteractive
"biology" 3D Models to Print - yeggi
Biology 3D Models | Download 3D Biology files | CGTrader.com
Share | NIH 3D Print Exchange
Three Dimensional Structure of the Epstein-Barr Virus Capsid. | NIH 3D Print Exchange
NIH 3D Print Exchange | A collection of biomedical 3D printable files and 3D printing resources supported by the National Institutes of Health (NIH)
Electron cryo-microscopy of T7 bacteriophage tail after DNA ejection | NIH 3D Print Exchange
Cryo-EM structure of Dengue virus serotype 1 complexed with Fab fragments of human antibody 1F4 | NIH 3D Print Exchange
Electron cryo-microscopy of nanobody AB6 in complex with poliovirus P1/Mahoney | NIH 3D Print Exchange
VHH complexes with poliovirus: cryo-electron microscopy studies at near-atomic resolution | NIH 3D Print Exchange
bacteriophage | NIH 3D Print Exchange
mature virion | NIH 3D Print Exchange
poliovirus | NIH 3D Print Exchange
Discover 3D Models | NIH 3D Print Exchange
Share Model - Bacteria, Cell, Tissue, Organism | NIH 3D Print Exchange
Share Model - Custom Labware | NIH 3D Print Exchange
Share Model - Proteins, Macromolecules, Viruses | NIH 3D Print Exchange
Bio3D Technologies - Printing & Shaping the Future
3D printing: Cell Biology and Beyond! - ASCB
Animal and Plant Cell Construction Kit by mfritz - Thingiverse
"animal cell" 3D Models to Print - yeggi
"plant cell" 3D Models to Print - yeggi
Miniature to Massive: 3D Printed Cells, Viruses and Parasites Demystify Microbiology | 3DPrint.com
Biologic Models
3d biology models to make - Google Search
3d printing models cells - Google Search
virus 3d model free - Google Search
10 tabs
Copy links to clipboard
Copy
Open
HoudahSpot — Find Files by Name, Text, Date, Extension, etc.
Hey-Siri.io
Links to biotechnology, pharmaceutical & medical device companies in the Northwest
hackathon-isid-org
Fast Company | Business + Innovation
AT&T Trade-in
Dropbox Tags - Cloudfind
Jihad Intel
iPhone 7 With Trade-in Offer - Wireless Support
How Email to 2Do Has Improved My Daily Email Workflow – MacStories
SCIENCE GEEK
Copy links to clipboard
Copy
Open
www.spacecamp.com
F.W.Bell Series 620 Gaussmeter | eBay
FW Bell 610 gaussmeter
FW Bell 620RZP gaussmeter (no probe) | eBay
FW Bell 610 gaussmeter | eBay
Boonton Electronics - MODEL 71A Capacitance/Inductance Meter | eBay
Boonton Electronics 71A | eBay
Boonton Electronics - MODEL 71A Capacitance/Inductance Meter | eBay
FW Bell 610 Gaussmeter
FW Bell Gaussmeter 610 | eBay
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 | eBay
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 • CAD 301.00 - PicClick CA
HP 8640B Signal Generator Agilent - Partially Working OPT 001,002,003 • CAD 535.11 - PicClick CA
Hp 8640B Singnal Generator • CAD 334.38 - PicClick CA
HP Agilent 8640B Signal Generator Options 001 003 • CAD 535.11 - PicClick CA
Choosing an RF Signal Generator
Hewlett-Packard 8640B Signal Generator
HP Signal Sources
Portland Resources for Dorks | DorkbotPDX
SCIENCE HOBBYIST: Top Page
Science Experiments, Amateur Science demonstrations, projects: SCIENCE HOBBYIST
ELECTRONICS HOBBYIST
Infrared Goggles for $10, inexpensive IR filters, SCIENCE HOBBYIST
ELECTRONICS HOBBYIST: NEWSGROUPS
SCIENCE HOBBYIST: Ideas, additions
Electronics surplus and science catalogs list, outlet stores and surplus supply websites
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics Surplus: services and non-surplus mail order catalogs
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
OPTICS, Surplus Electronics and list of science catalogs [SITE: SCIENCE HOBBYIST]
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.