Light theme
Dark theme
Automatic (use operating system setting)
Shared: 596 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
596 tabs
Copy links to clipboard
Copy
Open
Apple posts hilarious 'Behind the scenes with Cookie Monster' video
[1601.05140] The DARPA Twitter Bot Challenge
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
Digital Libraries authors/titles recent submissions
CAUSALITY, 2nd Edition, 2009
Cognitive Systems Laboratory
Beyond Connecting the Dots
Tutorial: Find Out Who’s Googling You | BrandYourself Blog
Advanced Mapping with the GDELT API + BigQuery — CartoDB Blog
USIP Open Situation Room - GDELT Blog
PeaceTech Lab's New Open Situation Room Exchange (OSRx) - GDELT Blog
Ascertaining validity in the abstract realm of PMESII simulation models an analysis of the Peace Support Operations Model (PSOM)
Center for Complex Operations > Publications > PRISM > PRISM Volume 5, no. 3
Strategic Partners Executive Meeting Press ReleaseActive Shooter | Domestic Terrorism Prevention
School of Advanced Military Studies Monographs
Combined Arms Research Library (CARL) Digital Library
IPA's weekly links - Chris Blattman
For the past several years, in often ungoverned... | THE GUN.
The Cyber & Jihad Lab | Presented by MEMRI
Skin Resurfacing Based on Science – Skincential Sciences
Coevolving Innovations| … in Business Organizations and Information Technologies
AOC 16" USB-Powered Portable LED Monitor - Computers.Woot
HICSS-49
Connections | Connections: The Quarterly Journal
Archive of Connections: The Quarterly Journal | Connections: The Quarterly Journal
DImE, PmESII and now MIDLIFE - Small Wars Council
UChicago CPOST
CrisisMappers - THE HUMANITARIAN TECHNOLOGY NETWORK
dblp: Intelligence and Security Informatics 2010
dblp: Alexander H. Levis
dblp: V. S. Subrahmanian
Seven Nights In Bangkok For Under $700, Including Air
Sunday's Best Deals: $2 Kindle Books, Camping Hammock, 3DS XL, and More
‘Love’ Is The Most Sexually Explicit Movie To Ever Appear On Netflix | Decider | Where To Stream Movies & Shows on Netflix, Hulu, Amazon Instant, HBO Go
Defense Statecraft: Dr. Robert Farley Course Information
Access Denied
Conference Publications - Distributed Information and Intelligence Analysis Group
Distributed Information and Intelligence Analysis Group
Short Biography
International Network of Crisis Mappers | DHN
The nexus cognitive agent-based model
DME for Peace | Design, Monitoring and Evaluation for Peacebuilding
The Peace Support Operations Model: Origins, Development, Philosophy and Use
Visual Analytics for cyber security and intelligence
Quantitative performance metrics for evaluation and comparison of middleware interoperability products
A principles-based model of ethical considerations in military decision making
A survey of computer game development
Contrasting emergence: In systems of systems and in social networks
DSTO Publications Online: Social modelling for defence and national security
Either DA-RT Works, or It Does Not | Duck of Minerva
Electrospaces.net: Abbreviations and Acronyms
Electrospaces.net: NSA Nicknames and Codewords
Eugene Santos Jr. | Thayer School of Engineering at Dartmouth
Event Registry
Event registry
Event registry
SHBI Workshop 2015
Obama Poised to Yank Top Military Intel Pick | Foreign Policy
The GDELT Project
The Board Game of the Alpha Nerds «
Investigating the Potential for Miscommunication Using Emoji | GroupLens
New Tools To Sift Through Data - i-HLS Israel Homeland Security
ICWSM-14 - Home - Welcome
ICWSM-15 - About - Previous Conferences
IEEE Xplore Abstract - APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine
IEEE Xplore Abstract - Holistic Approach to Passenger Terminal Risk Estimation
WSC 2010 Program
An - Ang
MI - Special Operations - Table of Contents
Rogelio Oliva -- Publications
Bending Evernote: An Interview with GTD Expert and TaskClone Developer, Troy Christmas
Noise in GDELT - John Beieler
Proceedings of the 59th Annual Meeting of the ISSS - 2015 Berlin, Germany
Introducing ACLED: An Armed Conflict Location and Event Dataset
CySIS | Cyber-Socio Intelligent Systems Laboratory
Social Network Diffusion | CySIS
ISIS Research | CySIS
CySIS Team | CySIS
Publications | CySIS
Learning Agents Center - George Mason University
What is Project Gryphon-X? And Why Is It So Cool (if it's true)? - Public Relations & Strategic Communication
Home - Deep Web - LibGuides at Montana State University-Billings
Deep Web Search Engines - Deep Web - LibGuides at Montana State University-Billings
Home - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - Defense Analysis - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - National Security Affairs - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - Operations Research - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Articles - Operations Research - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - Conflict, Peacekeeping & Reconstruction - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - Search Basics - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Dudley Knox Library - Naval Postgraduate School
NPS Theses - Naval Postgraduate School
1Password for Mac Makes Switching from Other Password Managers Easier
2016 To-Do App Showdown: Wunderlist vs. Any.do
Adobe Acrobat Reader Can Now Edit PDFs Directly From Your Dropbox On Android
Circuit Simulator Lets You Play Around with Electronics Components in Your Browser
File Syncing Showdown: Google Drive vs. Dropbox vs. OneDrive
Five Tips That Might Save Your Life In a Knife Attack
Grab a Free License for CloudBerry Backup Pro for Mac or Linux, Normally $30
Make a Tool Organizer for Your Garage with a Pallet and Pegboard
Monospace Writer Leaves Beta, Organizes and Locks Files With Hashtags
Most Popular Explainers of 2015
Nest Folders Inside of Folders in Apple Notes from the Mac App
Outlook for Android and iOS Adds Facebook, Wunderlist, and Evernote Calendars
Quotationr Saves Quotes or Other Text from Around the Web With a Few Clicks
Search Google Drive Documents by Collaborator to Find Shared Files
Simplenote's Syncing Plain Text Editor Is Now Available for Windows and Linux
Tab Organizer Groups Your Open Chrome Tabs by URL
Downloads News, Videos, Reviews and Gossip - Lifehacker
This Week's Most Popular Posts: April 1st to 8th
This Week's Top Downloads
Top 10 Cheat Sheets to Help You Master Microsoft Office
Top 10 DIY Miracles You Can Accomplish with Sugru
Top 10 Smart Ways to Organize and Upgrade Your Garage
Fusion Methodologies in Crisis Management - Springer
Nesting Folders in Apple Notes — MacSparky
University-Led Research (Minerva Initiative)
Modelian: Interactive Programming
OR Department Publications - Naval Postgraduate School
Home - MERLN - Research Guides at National Defense University
National Defense University Press
Defense Intelligence Analysis in the Age of Big Data > National Defense University Press > News Article View
Peace and Conflict Studies | Open Access Articles | Digital Commons Network™
Army spent $5B on failed technology created by vets | New York Post
One Thing Well
Special issue of the System Dynamics Review on: modeling and simulation of terrorism and insurgency movements: methods, data, and associated challenges - Anderson - 2011 - System Dynamics Review - Wiley Online Library
Documentation for model transparency - Martinez-Moyano - 2012 - System Dynamics Review - Wiley Online Library
DARPA - Open Catalog
Meeting in the White House Situation Room – Open Identity Exchange
Panama Papers: This is the leak
Key Findings | Peace and Security Funding Index
Resources - Default
Operations Research: INFORMS
Operations Research: INFORMS
QCRI - Social Innovation
Scott Fortmann-Roe
shakarian.net - Publications
The next big thing in interrogations: it isn’t torture, but will it be (and should it be) accepted? – Lawfire
Jen Ziemke |
Small Wars Journal
Integrating Tactical Deception Planning at the Brigade Level | Small Wars Journal
Sources And Methods: How To Get A Job In Intelligence (Introduction)
5 Ways Cyber Experts Think the FBI Might Have Hacked the San Bernardino iPhone - IEEE Spectrum
An integrated development environment for PMESII model authoring, integration, validation, and debugging | (2007) | Pioch | Publications | Spie
Oryx Blog: The Islamic State going DIY, 122mm D-30 howitzers used as anti-aircraft guns
STAR-TIDES | Sharing To Accelerate Research - Transformative Innovation for Development and Emergency Support
Dr. Patrick Meier speaks at NDU about crisis mapping and crowdsourcing | STAR-TIDES
System Architectures Lab: People: Prof. Alexander H. Levis
SystemsModelbook: The Role of Influence Operations in a Counterinsurgency Battle
Who Is Searching For You On Google | Tech Me Out
A Candy Bar With a Jewish Identity Crisis | Jewniverse
Autocorrect hates you - The Oatmeal
OpenSample — science for everyone
The U.S. Is Losing the Social Media War | TIME
99Deductions Simplifies All of Your Complicated Tax Deductions
MacStories Weekly: Issue 24
Bento Lab Kickstarter Launch - Tomorrow - March 22nd
Home - LibGuides at Naval War College
Selected Documents - Irregular Warfare - LibGuides at Naval War College
Here's How Cops Get Your Snapchat History
Case Studies
Digital Cartography [132] - Visualoop
Networks / Pajek
Complex Adaptive Systems
Hacking Defense: Changing How DoD Innovates - War on the Rocks
Ushahidi - MIT Technology Review
Complex Adaptive Systems and the Threshold Effect
Presentations and Authors
2012 AAAI Spring Symposium Series
Presentations and Authors
Complex Adaptive Systems and the Threshold Effect: Views from the Natural and Social Sciences
ACIPSS | Austrian Center for Intelligence, Propaganda & Security Studies
CoAX - Coalition Agents eXperiment
AllGov - Departments
Amazon.com: Gold Box Deal of the Day
Amazon.com: Combat Modeling (International Series in Operations Research & Management Science) (9781441907899): Alan R. Washburn, Moshe Kress: Books
Sugru Moldable Glue - Black & White (Pack of 8) - - Amazon.com
Analytics
Employee Spotlight: Carolyn Phillips | Argonne National Laboratory
Multimethod Simulation Software and Solutions
U.S. Army STAND-TO! | Operational Environment Training Support Center
Afghanistan: Current Issues 2010 KH
Asymmetric Warfare 2006
Welcome to MSFRIC Bibliographies Page
Welcome to MSFRIC Bibliographies Page
Irregular Warfare JTPhi
SSTR Operations 2012 - HL
MSFRIC Subject Resource Guides
Artificial intelligence decodes Islamic State strategy - BBC News
8_O-M15_pf_Longabaugh_Figure2.jpg (487×371)
U.S. Army | Infantry Magazine
Apple MacBook Air (Latest Model) - 13.3" Display - Intel Core i5 - 4GB Memory - 128GB Flash Storage Silver MJVE2LL/A - Best Buy
BLM Library: Resource Notes
Aerospace Engineering and Operations Technicians : Occupational Outlook Handbook: : U.S. Bureau of Labor Statistics
How It's Possible To Defeat An Insurgency - Business Insider
Underground tunnels ISIS built to evade air strikes - Business Insider
Main profile | Computation Institute
Compound Interest - This Week in Chemistry – Colour-Changing Camouflage, & DNA Data Storage
www.computer.org/csdl/proceedings/hicss/index.html
Information Warfare - The RMA Debate
Leadership Survival and Hired Guns | Acleddata - Crisis
How to Prepare a Quad Chart | CTTSO
Advancing the Design and Modeling of Complex Systems
50 Top Open Source Tools for Big Data - Datamation
www.davidmasad.com/Research.html
DoD Announces National Security Science and Engineering Faculty Fellows > U.S. DEPARTMENT OF DEFENSE > Article View
democracyarsenal.org
DMOZ - the Open Directory Project
How Do I Clear My Dropbox Cache? - The Unofficial Dropbox Wiki
Defense Technical Information Center
Defense Threat Reduction Agency > Research > Basic and Applied Science Department > Network Sciences > TA 2-1
Apple MacBook 12 inch Laptop with Retina Display 256GB Early 2015 Model | eBay
Acer Display 23" Full HD Monitor 1920 x 1080 16 9 60Hz H236HL Bid 886541901255 | eBay
ISSDCM - Dynamic Coalitions
9 Useful Open Source Big Data Tools - Enterprise Apps Today
Online Etymology Dictionary
America's PrepareAthon! Tabletop Exercise Materials | FEMA.gov
Science and Technology Research News Articles | Futurity
Craig Venter: Critical Tools and Technologies in Synthetic Genomics | GEN Magazine Articles | GEN
2014-05-14 FOIA DTRA - record index/bibliography - George Air Force Base, CA - George Air Force Base, CA
Image5.gif (481×489)
Millennium Challenge
SYSTEM OF SYSTEMS ANALYTICS, INC. - FAIRFAX, VA - $20,000 in Defense Contracts in 2014 - 3877 FAIRFAX RIDGE RD STE 201C
The Hawaii International Conference on System Sciences (HICSS) | Digital Library
The Hawaii International Conference on System Sciences (HICSS) | Resources
science tools nav bar
How to Sync iOS 9’s Notes with Your Gmail Account
Project and Award Quad Chart Guidelines
4 Things To Know About Dabiq, ISIS' Slick Propaganda Magazine
Links
ISIS Propaganda: Researchers Track, Neutralize Terrorists' Twitter Recruitment With Defense Department Backing
ICWSM-15 - Home - Welcome
ICWSM-16 - Datasets - Datasets
Get LinkedIn, Twitter, and GitHub Infos for any Email Address
Organize, Manage, Compress Files to Save Space: Disk Sorter
Bossie Awards 2015: The best open source big data tools | InfoWorld
(12205) Inoreader - Senior Advisor, Threat Intelligence, Analytics at BELL
(12362) Inoreader - This Week's Top Downloads
(10848) Inoreader - OR News
Stackable Pencil Trays - All
US arms shipment to Syrian rebels detailed | IHS Jane's 360
Winning with Allies: The Strategic Value of the Afghan Model on JSTOR
Gaming Political Science | Kansas State University
International Relations
Conflict, Terrorism, and War
KDD '15- Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
Lysistrata |
More Diverse Voices Make For Better Models | Scott Fortmann-Roe | ScienceLives
Threat Matrix | The Long War Journal
Delete Dropbox cache to recover drive space | Macworld
Security Matters - MakeUseOf
4 Things You Can Use Google Alerts To Monitor The Web For
4 Easy Ways To Find Out Who Is Looking For You Online
The Battlefield of the Future for U.S.... - Matthew Aid
Using Data Mining to Spot Potential Terrorists... - Matthew Aid
Portland Vocal Improv (Portland, OR) - Meetup
Jihad and Terrorism Threat Monitor (JTTM) Weekend Summary
'Apostates,' 'Crusaders,' 'Infidels,' And Western Political Institutions – ISIS's Enemies According To Its English-Language Magazine 'Dabiq'
MIT ORC - Spotlight Item
Military Operations Research Society
Political MoJo | Mother Jones
Open Situation Room - Mercator Program Center for International Affairs (MPC) GmbH
Welcome to METIS
Welcome to n~ask
From Flexible and Stretchable Meta-Atom to Metamaterial: A Wearable Microwave Meta-Skin with Tunable Frequency Selective and Cloaking Effects : Scientific Reports
The Predator War - The New Yorker
Getting Bin Laden - The New Yorker
Soldiers to Help Crowdsource Spy Maps - Nextgov.com
Affective Computing - Science Nation | NSF - National Science Foundation
Secret ‘Kill List’ Tests Obama’s Principles - The New York Times
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OpenStreetMap
Global Outlook - PeaceTech Lab
Have a Healthy, Happy April with These Local Wellness Events | Portland Monthly
Why You <i>Need</i> to Get a Pap Smear | Portland Monthly
Data — PeaceTech Lab
Blogs and Bullets — PeaceTech Lab
Media Assessment Template — PeaceTech Lab
PeaceTech Weekly News Roundup — PeaceTech Lab
Beautiful web-based People Plots and Family Trees
Powerpoint Classes: Army Pre-made Training | Listing by Subjects
Something Old, Something New: Army Leader Development in a Dynamic Environment | RAND
Modeling and Simulation | RAND
Conflict mapping 3.0
Institute for Regional Security - Security Challenges Journal
General Stanley McChrystal: The Runaway General by Michael Hastings | Rolling Stone
Algebraic structures for dynamic networks
Modeling behavioral considerations related to information security
Insight Maker: A general-purpose tool for web-based modeling & simulation
Simulation Modelling Practice and Theory - ScienceDirect.com
Shtetl-Optimized » Blog Archive » From Boston to Austin
Job Search Engine | Simply Hired
Space Tech Expo | Speaker spotlight: Erik J Eliasen, Vice President, National Security Space Programs, Universal Space Network
Optimal Control of Nonlinear Processes - With Applications in | Dieter Grass | Springer
Home | SRI - Strategic Resources, Inc.
Does Anyone Really Know What's Going On? Likely Not.
STRATEGII XXI - HOME
STRATEGII XXI - + THE CENTRE FOR DEFENCE AND SECURITY STRATEGIC STUDIES CONFERENCE
Portland Timbers vs. LA Galaxy Match Preview - Stumptown Footy
Systems Thinking World - SystemsWiki
Journal of Map & Geography Libraries: Advances in Geospatial Information, Collections & Archives - Volume 8, Issue 2
DARPA Project List (Defense Advanced Research Projects Agency)
Gizmo's Freeware
TEDx Portland
Analysing Terrorism from a Systems Thinking Perspective | Schoenenberger | Perspectives on Terrorism
Terrorism Bookshelf: Top 150 Books on Terrorism and Counter-Terrorism | Sinai | Perspectives on Terrorism
Predators on the Frontier - The American Interest
The Logo That Took Down DARPA's Information Awareness Office - The Atlantic
Matchday | Portland Timbers duel with LA Galaxy in southern California | Portland Timbers
UCS Satellite Database | Union of Concerned Scientists
Laboratory for Computational Cultural Dynamics
Center for Terrorism & Security Studies | UMass Lowell
Systems Analysis Interesting Web Sites List
Current Events in DSS
Noel Dickover | United States Institute of Peace
The PeaceTech Lab | United States Institute of Peace
How Big Data Is Being Used in the Fight Against Human Trafficking - US News
Crowdmapping Arab Spring - Next Social Media Breakthrough?
Army intelligence says it needs good cloud computing to save lives in Afghanistan - Washington Times
How Special Ops Copied al-Qaida to Kill It | WIRED
This Robot Could Make Creating New Life Forms As Easy As Coding An App | WIRED
Scientists Are Wrong All the Time, and That’s Fantastic | WIRED
Why the US Government Is Terrified of Hobbyist Drones | WIRED
This Wireless Explosives Detector Is the Size of a Postage Stamp | WIRED
Danger Room | WIRED
Workopolis - Senior Advisor, Threat Intelligence, Analytics
Box | Simple Online Collaboration: Online File Storage, FTP Replacement, Team Workspaces
Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism ... - Google Books
Online Reputation Management | BrandYourself.com
DARPA looks to build a foundation for systems-of-systems -- Defense Systems
Crisis Mapping Spring 2015 - Google Docs
Construction of New Interdisciplinary Field - Google Drive
Dabiq (magazine) - Wikipedia, the free encyclopedia
Planning poker - Wikipedia, the free encyclopedia
Ushahidi - Wikipedia, the free encyclopedia
How data can help counter violent extremism -- FCW
Search / gdelt
Alladin_X
GitHub - gregorleban/EventRegistry: python package for accessing data in Event Registry
Partner Spotlight: Fulcrum | Global SOF Foundation
ICWATCH
ICWATCH
ICWATCH
ICWATCH
Crowdsourcing and Crisis Mapping | idisaster 2.0
Insight Maker | Free Simulation and Modeling in your Browser
Open Source Intelligence Techniques by Michael Bazzell
The Complete Privacy & Security Desk Reference by Michael Bazzell
iRevolutions
Jen Ziemke
Download Non fiction Torrents - Kickass Torrents
Download Psychology EBook Collection V2 Torrent - Kickass Torrents
Download The Hidden Hand: A Brief History of the CIA (2014) by Richard H. Immerman [Dr.Soc].epub Torrent - Kickass Torrents
Insight Maker • Insight Maker • Kumu
Systems KeLE • Agent Based Modeling • Kumu
Metadata Investigation : Inside Hacking Team | Share Lab
[School-of-data] Fwd: [CrisisMappers] ICCM 2014 Conference Registration now open!
Little Devices @ MIT | Affordable Health | Medical Technology | DIY Innovation
Inbox (193) - scitrenbaum@gmail.com - Gmail
DOWNLOAD ME - scitrenbaum@gmail.com - Gmail
04-06 AM 1501 OneTab shared tabs - stczztop@gmail.com - Gmail
WIRED Awake: 10 must-read articles for 11 April - scitrenbaum@gmail.com - Gmail
Inbox (139) - stczztop@gmail.com - Gmail
Funding-Opportunities-L Info Page
[Funding-Opportunities-L] FY16 Defense University Research Instrumentation Program (DURIP)
Makerbase
Marketing Intelligence Tools by Robin Good | ZEEF
DARPA dissects Twitter, Facebook, Reddit to extract propaganda how-to’s – Naked Security
How a Pentagon Boondoggle is Putting Soldiers in Danger | New Republic
The Covert Roots of the Panama Papers | New Republic
(25) Glenn Hodges | Naval Postgraduate School - Academia.edu
https://ntrl.ntis.gov/NTRL/login.xhtml
Pulse: FBI CYWATCH A-000067-DM - AlienVault - Open Threat Exchange
Ascertaining Validity in the Abstract Realm of PMESII Simulation Models (and other thoughts) | PAXsims
JDMS on modelling political interaction in peace operations | PAXsims
JDMS on the The Peace Support Operations Model and stabilization strategy | PAXsims
Research Bibliography | PAXsims
Weekly Links | Political Violence @ a Glance
GDELT and ICEWS, a short comparison | Predictive Heuristics
Prediction and Good Judgment: Can ICEWS Inform Forecasts? | Predictive Heuristics
The Operational Environment (PMESII-PT) by Chris Rhoades on Prezi
Social Media and Tactical Considerations For Law Enforcement | Public Intelligence
Law Enforcement Guide to the Path of an Outlaw Motorcycle Gang Member | Public Intelligence
Snapchat Law Enforcement Guide | Public Intelligence
FM 3-24.2 Chapter 1
Lucia Falzon - Google Scholar Citations
Edward George Anderson Jr. - Google Scholar Citations
Scott Fortmann-Roe - Google Scholar Citations
V.S. Subrahmanian - Google Scholar Citations
International Conference on Weblogs and Social Media - Google Scholar Metrics
Rogelio Oliva - Google Scholar Citations
Krenson: On Strategy: Integration of DIME in the... - Google Scholar
Wakeland: Comparing discrete simulation and system... - Google Scholar
Silverman: Human behavior models for agents in simulators... - Google Scholar
Waltz: Situation analysis and collaborative planning... - Google Scholar
Waltz: Situation analysis and collaborative planning... - Google Scholar
Kress: Why defeating insurgencies is hard: The effect... - Google Scholar
Duong: The nexus cognitive agent-based model: coevolution... - Google Scholar
Kress: Analytic Modeling of Insurgencies - Google Scholar
Kress: Analytic Modeling of Insurgencies - Google Scholar
Ignacio J. Martinez-Moyano, Ph.D. - Google Scholar Citations
Ignacio J. Martinez-Moyano, Ph.D. - Google Scholar Citations
Google Scholar Citations
Martinez-Moyano: Exploring feedback and endogeneity... - Google Scholar
Martinez-Moyano: Modeling behavioral considerations... - Google Scholar
Search is Back!
Combined Arms Research Library Digital Library : Search Results
1. Decision Making Analysis (DIME Model) - NSC Decision Making and Operation Allied Force
CAS in the Natural and Social Sciences
The CIA just invested in a skincare line that is named after James Bond's technology designer and collects your DNA | SOFREP
How to move your data from LastPass to 1Password - 1Password Support
Rogelio Oliva | Texas A&M University - Academia.edu
Online Diagramming Application - Text to Diagram - textografo
CIA’s Venture Capital Arm Is Funding Skin Care Products That Collect DNA
CIA’s Venture Capital Arm Is Funding Skin Care Products That Collect DNA
FBI’s “Shared Responsibility Committees” to Identify “Radicalized” Muslims Raise Alarms
The Productivity Pack
~The~Most~Hated~ on Twitter: "@rcallimachi Twitter's weekend presence is predictable they usually start to suspend between 3-5pm est then go back to sleep til about 10pm"
(3) #OSRx hashtag on Twitter
PeaceTech Lab (@PeaceTechLab) | Twitter
(25) Ted Carmichael | University of North Carolina at Charlotte - Academia.edu
Afghan War Diary, 2004-2010 - WikiLeaks
"Comparing discrete simulation and system dynamics : modeling an anti-insurgency influence operation" by Wayne W. Wakeland
Proceedings of the Eighth International Conference on Weblogs and Social Media
AAAI Digital Library — International Conference on Web and Social Media
The Role of Influence Operations in a Counterinsurgency Battle | Elise Axelrad - Academia.edu
CTTSO BIDS - Reference Materials
Tutorial - Censys
Saving rhinos with predictive analytics
V.S. Subrahmanian
V.S. Subrahmanian
VEWS: A Wikipedia Vandal Early Warning System
Adam Klivans
TV Guide & TV Listings | DIRECTV Channel Schedule | DIRECTV
Home - Dropbox
VIDEOS - Dropbox
Edge Master Class 2015: A Short Course in Superforecasting, Class I | Edge.org
Home - Federal Business Opportunities: Home
Little Devices’s albums | Flickr - Photo Sharing!
Sacha Chua | Flickr - Photo Sharing!
Google Alerts - Monitor the Web for interesting new content
Afghan War Diaries (Wikileaks) - Enemies Detained.csv - Google Fusion Tables
army operational environment variables - Google Search
dime military model - Google Search
dime model of national power - Google Search
pmesii analysis - Google Search
nanotechnology site:www.au.af.mil/au/awc/awcgate/cst/ - Google Search
A dynamic model of counterinsurgency policy including the effects of intelligence, public security, popular support, and insurgent experience - Google Search
A Multi-Indicator Approach for Geolocalization of Tweets - Google Search
Adecco Medical & Science - Google Search
Adversary Behavioral Modeling -Available Tools and Applications for the Warfighter - Google Search
All-Source Analytics for ‘Big Data - Google Search
An Evening with Ramin Karimloo - Google Search
An integrated development environment for PMESII model authoring, integration, validation, and debugging - Google Search
Andy Ilachinski - Google Search
army operational environment variables - Google Search
Avvo - Google Search
Centre for Land Warfare Studies - Google Search
Cognitive Architecture - Google Search
Cognitive Architecture - Google Search
Comparing Discrete Simulation and System Dynamics: Modeling an Anti-insurgency Influence Operation - Google Search
complex adaptive systems an introduction to computational models of social life - Google Search
Computational Theory of Intelligence Analysis - Google Search
COnflict Modeling, Planning, and Outcomes EXperimentation - Google Search
Contrasting emergence: In systems of systems and in social networks - Google Search
Control variates techniques for Monte Carlo simulation - Google Search
Course of Action Optimization - Google Search
Crisis Mapping and Open Source Geospatial Information Systems - Google Search
Crisis Mapping for Conflict Analysis, - Google Search
Culture Awareness in Human Reasoning and Behavior and in Intelligent Systems - Google Search
D-Sigs - Google Search
DARPA Foundation “Task 6” Report Systematic Evaluation Framework - Google Search
DCGS-A ICITE Cloud - Google Search
Defence Science and Technology Organisation - Google Search
District Stability Framework - Google Search
Dr Peter J Phillips - Google Search
Dr. Stuart Madnick - Google Search
DTRA/ASCO - Google Search
Explaining the Army Design Methodology - Google Search
Horgan & Shortland, 2015 - Google Search
How Volumes of crowdsourced, realtime event data on conflict, analyzed and tasked via global volunteer networks, influence war’s ground game, and thus shape best practices, tactics and strategies for CT & COIN. - Google Search
Human Behavior Models for Agents in Simulators and Games - Google Search
ICWSM - Google Search
IDGA Intelligence Analysis and Processing Conference - Google Search
IGNACIO MARTINEZ-MOYANO - Google Search
what is insight Maker's - Google Search
Jen Ziemke - Google Search
MILITARY REVIEW - Google Search
MODELING ADVERSARIAL DYNAMICS - Google Search
Modeling Behavioral Activities Related to Deploying IEDs in Iraq. - Google Search
Modeling National Security Changes from Military Operations - Google Search
Models of Counterterrorism - Google Search
NSC Decision Making and Operation Allied Force - Google Search
spotlight ON NATIONAL OPERATIONAL ENVIRONMENT MODEL - Google Search
Open Situation Room Exchange - Google Search
Optimal Control of Nonlinear Processes - Google Search
paul newell - Google Search
Phillip Hwang - Google Search
Policy Options and Broader Implications - Google Search
PRIO-Grid - Google Search
Quantitative Methods in Defense and National Security - Google Search
Red Disk - Google Search
Ric Roca - Google Search
Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space - Google Search
Senior All-Source Intelligence Analyst - Google Search
SIS's Enemies According To Its English-Language Magazine 'Dabiq - Google Search
Skincential Sciences, - Google Search
Social Modelling in Support of Planning and Intelligence - Google Search
Social Media in Strategic Communication list - Google Search
System Dynamics Maps of the Insider Cyber-threat Problem - Google Search
System Dynamics Modelling for Information Security - Google Search
Terrorist “Roles” - Google Search
The Rafidah from Ibn Saba' to the Dajjal - Google Search
The Role of Influence Operations in a Counterinsurgency Battle - Google Search
The Role of Influence Operations in a Counterinsurgency Battle - Google Search
The Social Impact Model: A Tool for Irregular Warfare Adjudication, Analysis, and Validation.” - Google Search
U.S. ARMY WAR COLLEGE GUIDE TO NATIONAL SECURITY POLICY AND STRATEGY - Google Search
US arms shipment to Syrian rebels detailed - Google Search
Why Defeating Insurgencies is Hard: The Effect of Intelligence in Counterinsurgency Operations -- A Best-Case Scenari - Google Search
Why Defeating Insurgencies is Hard - Google Search
Workshop on Improving Cooperation Among Nations in Irregular Warfare Analysis - Google Search
Coalition Agents eXperiment - Google Search
developing a typology of terrorist involvement - Google Search
jema sigint - Google Search
peace tech - Google Search
PMESII model library - Google Search
spectral angle mapper - Google Search
Iraq: Women Suffer Under ISIS | Human Rights Watch
What is Operations Research? - INFORMS
2015 - INFORMS
Find Research & Publications - INFORMS
Recap of Recent Posts at Just Security (April 2-8) | Just Security
Counterterrorism | KEYW Corporation
Peter Newell | LinkedIn
Robert Crowson | LinkedIn
Scott Fortmann-Roe, PhD | LinkedIn
Hacking for Defense - Are we going to be friends? | Peter Newell | LinkedIn
Search | LinkedIn
Can an insurgency be stamped out solely by military means? | openDemocracy
Data Sources - PeaceTech Lab
Data Sources - PeaceTech Lab
Data Sources - PeaceTech Lab
Jennifer Ziemke - PRIO
Is serving in the IDF good for you? - Quora
Why don't the Arab States band together, economically and militarily, as a means to negotiate with Israel for better terms for Palestine? - Quora
Intelligence: news and discussion about Intelligence and espionage matters around the world
OSINT .CSV Data Sources : Intelligence
Panama Leaked Docs- Where can I find them/DL them? : Intelligence
What software/web apps do you use? : Intelligence
MLS: search results - stream timbers
Portland Timbers
Mac Power Users #312: Notes Shootout - Relay FM
Alexander H Levis - Publications
Elise T. Axelrad - Publications
Jonathan P. Caulkins
Madjid Tavana - Publications
Peter W Glynn - Publications
Wayne Wakeland - Publications
Control variates techniques for Monte Carlo simulation
Combining system dynamics and discrete event simulations - Overview of hybrid simulation models
The Role of Influence Operations in a Counterinsurgency Battle
Comparing Discrete Simulation and System Dynamics: Modeling an Anti-insurgency Influence Operation
Will the real security foresight expert please stand up?
Gustav Feichtinger - ResearchGate
Gernot Tragler - ResearchGate
Moshe Kress, Naval Postgraduate School, Department of Operations Research - ResearchGate
Roberto Szechtman, Naval Postgraduate School, Department of Operations Research - ResearchGate
ResearchGate
Mathematical Model Shows Why Defeating Insurgent Groups Like Taliban Is So Difficult -- ScienceDaily
Security and Defense | SRI International
The Best of the Physics arXiv (week ending April 9, 2016)
A dynamic model of counterinsurgency policy including the - Technische Informationsbibliothek (TIB)
Tom Sawyer Software
Data Relationship Visualization and Analysis | Live Tom Sawyer Perspectives Demonstration
Ushahidi
DoDTechipedia | The White House
mcctheater - YouTube
ArguingTheOE - YouTube
ArguingTheOE - YouTube
BehindtheMusical's channel - YouTube
Reason Broadcast - YouTube
Tinkerin' Thinkers - YouTube
Seth Rudetsky - YouTube
Next to Normal performance at 2009 Tony Awards - Aaron Tveit - YouTube
Seth Rudetsky's "Obsessed! Live" With Ana Gastyer, Megan Hilty and Ramin Karimloo - YouTube
Arguing the OE, Episode 7: Are PMESII-PT and Systems Thinking in Tension? - YouTube
Lin-Manuel Miranda, Jeanine Tesori, Danai Gurira, Oskar Eustis | Interview | TimesTalks - YouTube
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.