Light theme
Dark theme
Automatic (use operating system setting)
Shared: 243 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
PAPERS to DOWNLOAD Et. Al.
Copy links to clipboard
Copy
Open
Advanced Analytic Techniques
ICIS 2016 Proceedings | International Conference on Information Systems (ICIS) | Association for Information Systems
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Understanding Moderators of Peer Influence for Engineering Viral Marketing Seeding Simulations and Strategies
Human-Computer Interaction | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Empirical Evaluation of Automated Sentiment Analysis as a Decision Aid
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Predicting Medication Prescription Rankings with Medication Relation Network
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Self-determination theory as an explaining mechanism for the effects of patient’s social media use
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: UR SMART: Social Media Analysis Research Toolkit
Social Media and Digital Collaboration | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Momentum in Social Media and Offline Car Sales after Automobile Recalls
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: How Far We Can Go: A Model of Online Activism, Enabling Dynamics, and Social Change
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Analysis of Executive Reputation in Social Media Networks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Social Connectedness and Leadership in Online Communities
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Reputation, User Feedback, and Perceived Information Quality in Social Internet Media: An Empirical Study
International Conference on Information Systems (ICIS) | Association for Information Systems Research | AIS Electronic Library (AISeL)
Social Media and Their Affordances for Organizing: A Review and Agenda for Research | Academy of Management Annals
Today’s Apps Gone Free: Escape from the Pyramid, Translator Widget, Nighty Night and More
CiteSeerX — EVOLVABLE SIMULATIONS APPLIED TO AUTOMATED RED TEAMING: A PRELIMINARY STUDY
Exploring tensions in knowledge networks: Convergences and divergences from social capital, actor-network theory and sociologies of the south
dblp: Karl Granström
dblp: Hossam S. Hassanein
dblp: Sharief M. A. Oteafy
dblp: Fanchao Zeng
"The Non-Economic Functions of Insurgent Taxation: Evidence from the Is" by Mara Revkin
domingo mery :: Material
domingo mery :: Publications
Identifying Human Capital Externality: Evidence from China
Social media and prediction: crime sensing, Data integration and statistical modelling. Using the Collaborative Online Social Media Observatory (COSMOS) to link police incident, Census 2011 and Twitter data - NCRM EPrints Repository
Welcome to the NCRM EPrints Repository - NCRM EPrints Repository
ProQuest Document View - Homo informaticus intelligens: Building a theory of intelligence analysts as information foragers
DOD/IC Problems - Stanford H4D - Spring 2016
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
A computational intelligence decision-support environment for architectural and building design: CIDEA - IEEE Xplore Document
Social Media account linkage using user-generated geo-location data - IEEE Xplore Document
Multisensor data fusion for an autonomous ground vehicle - IEEE Xplore Document
Distributed secondary control for isolated microgrids under malicious attacks - IEEE Xplore Document
Games on Large Networks: Information and Complexity. - IEEE Xplore Document
Frame-based analysis of knee extension exercises using a smartphone accelerometer - IEEE Xplore Document
Smartphone-based transport mode detection for elderly care - IEEE Xplore Document
Smartphone based automatic abnormality detection of kidney in ultrasound images - IEEE Xplore Document
Email communications analysis: how to use computational intelligence methods and tools? - IEEE Xplore Document
Predicting the Future with Social Media - IEEE Xplore Document
Automated modeling and analysis of agent-based simulations using the CASE framework - IEEE Xplore Document
Visual investigation of similarities in Global Terrorism Database by means of synthetic social networks - IEEE Xplore Document
A tool-target based approach for simulating a terrorist attack - IEEE Xplore Document
On the Design of a System for Airport Protection against Terrorist Attacks Using MANPADs - IEEE Xplore Document
Susceptibility to URL-based Internet attacks: Facebook vs. email - IEEE Xplore Document
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications - IEEE Xplore Document
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis - IEEE Xplore Document
Tiered Data Integration for Mobile Health Systems - IEEE Xplore Document
Detectability prediction of hidden Markov models with cluttered observation sequences - IEEE Xplore Document
The economic costs of natural disasters, terrorist attacks, and other calamities: An analysis of economic models that quantify the losses caused by disruptions - IEEE Xplore Document
GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits - IEEE Xplore Document
Toward Predicting Susceptibility to Phishing Victimization on Facebook - IEEE Xplore Document
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
IEEE Xplore Full-Text PDF:
IEEE Xplore Full-Text PDF:
IEEE Xplore: IET Microwaves, Antennas & Propagation - (Current Issue)
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
Resources | 2017 Index of U.S. Military Strength
Download the 2017 Index | 2017 Index of U.S. Military Strength
iniwall.com
Publications - Institute for Security and Development Policy
An open letter to Mr. Secretary general of the united nations to propose setting up global standards for conquering growth limits of capitalism | Journal of Open Innovation: Technology, Market, and Complexity | Full Text
Smartphone-based arrhythmia monitoring. : Current Opinion in Cardiology
PLOS ONE: Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya
Library | kno.e.sis
Library | kno.e.sis
Knowledge Enabled Approach to Predict the Location of Twitter Users | kno.e.sis
Amit Sheth: Educator, Researcher, Entrepreneur
Amit Sheth: Educator, Researcher, Entrepreneur
Amit Sheth: Educator, Researcher, Entrepreneur
Library | kno.e.sis
Library | kno.e.sis
Library | kno.e.sis
A Hybrid Approach to Finding Relevant Social Media Content for Complex Domain Specific Information Needs | kno.e.sis
An Information Filtering and Management Model for Twitter Traffic to Assist Crises Response Coordination | kno.e.sis
Project Descriptions | kno.e.sis
Portland State University Library
The Best Cyber Monday Deals Available Right Now
Hierarchical abnormal event detection by real time and semi-real time multi-tasking video surveillance system | SpringerLink
A personal knowledge management metamodel based on semantic analysis and social information | SpringerLink
A survey of event detection techniques in online social networks | SpringerLink
Computational Red Teaming - Springer
Asymptotic Analysis for Functional Stochastic Differential Equations - Springer
Multi-agent and Complex Systems - Springer
Online Social Networks Event Detection: A Survey - Springer
Semantic Complex Event Processing for Decision Support - Springer
Which Centrality Metric for Which Terrorist Network Topology? - Springer
Deep Bi-directional Long Short-Term Memory Neural Networks for Sentiment Analysis of Social Data - Springer
An Evidential Method for Multi-relational Link Prediction in Uncertain Social Networks - Springer
Relative Neighborhood Graphs Uncover the Dynamics of Social Media Engagement - Springer
Instagram Use, Loneliness, and Social Comparison Orientation: Interact and Browse on Social Media, But Don't Compare | Abstract
Mapping the Impact of Social Media for Innovation: The Role of Social Media in Explaining Innovation Performance in the PDMA Comparative Performance Assessment Study - Roberts - 2016 - Journal of Product Innovation Management - Wiley Online Library
Application of the U - He chronometer to the analysis of nuclear forensic materials - Analytical Chemistry (ACS Publications)
A Qualitative Analysis on Facilitating... - 교보문고 스콜라
The Costs of War with Iran: An Intelligence Preparation of the Battlefield | Small Wars Journal
The Dilemma of Defense Innovation and Adaptation (Part II) | Small Wars Journal
Giving meaning to tweets in emergency situations: a semantic approach for filtering and visualizing social data | SpringerPlus | Full Text
Publications | Complexica
Army Systems Adaptive Red Team /Technical Support and Operational Analysis (ART/TSOA) RFI | Contract Research and Development
ONR Complex Event Recognition from Open Source Social Media Award | Contract Research and Development
CounterStrikeMedia - CounterStrikeTV Home
Perceptual Computing and the Human Experience - DATAVERSITY
List of Publications of T. Kirubarajan (Kiruba)
What Does Donald Trump's Victory Mean for Asia?
Watch Out for Terror's First Incubators - by Husain Haqqani
Proceedings of the International Conference on Interdisciplinary Studies (ICIS 2016) - Interdisciplinarity and Creativity in the Knowledge Society | InTechOpen
isayeret.com | The Israeli Special Forces Database
www.isvg.org
JMIR-Review of Extracting Information From the Social Web for Health Personalization | Fernandez-Luque | Journal of Medical Internet Research
Big Data and Data Science for Security and Fraud Detection
Sensors | Free Full-Text | Analysis of Android Device-Based Solutions for Fall Detection
Sensors | Free Full-Text | Multi-Target Tracking Based on Multi-Bernoulli Filter with Amplitude for Unknown Clutter Rate
Sensors | Free Full-Text | BlueDetect: An iBeacon-Enabled Scheme for Accurate and Energy-Efficient Indoor-Outdoor Detection and Seamless Location-Based Service
Sensors | Free Full-Text | myBlackBox: Blackbox Mobile Cloud Systems for Personalized Unusual Event Detection
Sensors | Free Full-Text | Full On-Device Stay Points Detection in Smartphones for Location-Based Mobile Applications
Axioms | Free Full-Text | Summary of Data Farming | HTML
Resources | Free Full-Text | System Dynamics Modeling for Agricultural and Natural Resource Management Issues: Review of Some Past Cases and Forecasting Future Roles | HTML
Physical Sensors - A section of Sensors
Sensor Networks - A section of Sensors
www.mdpi.com/journal/sensors/special_issues/algorithms_mobile_sensing
Sensors | Special Issue : Data in the IoT: from Sensing to Meaning
Big Data Helping to Pinpoint Terrorist Activities, Attacks (UPDATED)
Resources
Physica A: Statistical Mechanics and its Applications | Articles in Press | ScienceDirect.com
NFD: Non-Technical Loss Fraud Detection in Smart Grid
Explaining Donald Trump via communication style: Grandiosity, informality, and dynamism
How the government’s punishment and individual’s sensitivity affect the rumor spreading in online social networks
Agent based simulation on the process of human flesh search—From perspective of knowledge and emotion
A social media text analytics framework for double-loop learning for citizen-centric public services: A case study of a local government Facebook use
A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks
Game Theoretic Path Selection to Support Security in Device-to-Device Communications
Using Product Variables of Business- to-Business (B2B) Media to Assess the Impacts of Social Media
kurt godel - Wolfram|Alpha
BioMedical Engineering OnLine | Home page
Iranian and Hezbollah Hybrid Warfare Activities: A Small Wars Journal Anthology - Dave Dilegge, Rubert J. Bunker, Alma Keshavarz - Google Books
Perspectives on Culture and Agent-based Simulations: Integrating Cultures - Google Books
Datafloq - How Big Data is Aiding in the Fight Against Terrorism
DSpace@MIT: Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition
Defence Science and Technology Laboratory - Wikipedia
NOT-OD-17-015: NIH Request for Information (RFI) on Strategies for NIH Data Management, Sharing, and Citation
Counter-Terrorism Strategic Communications (CTSC) | ICCT
Lighting the Path: the Evolution of the Islamic State Media Enterprise (2003-2016) | ICCT
Publications | ICCT
Welcome - ICIS 2016
Knowledge Discovery Laboratory - UMass Amherst
"Google Scholar" (52) - scitrenbaum@gmail.com - Gmail
O'Reilly Discounts Every eBook By 50% - Slashdot
Alfresco » Document Library
SSRN Electronic Library
cognitive | Public Intelligence
smartcard | Public Intelligence
surrender | Public Intelligence
DHS Geospatial Concept of Operations (GeoCONOPS) Version 6 | Public Intelligence
How to Conduct Psychological Operations | Public Intelligence
Joint Chiefs of Staff Guide Offers Blunt Assessment of Afghan National Police | Public Intelligence
(U//FOUO) Joint Center for International Security Force Assistance Guide: Roles and Functions of Senior Advisors | Public Intelligence
Joint Operating Environment 2035: The Joint Force in a Contested and Disordered World | Public Intelligence
DHS NCCIC Report on the Art of Social Engineering | Public Intelligence
Joint Staff Strategic Multi-Layer Assessment on Bio-Psycho-Social Applications to Cognitive Engagement | Public Intelligence
Joint Staff Strategic Assessment: Counter-Da’esh Influence Operations Cognitive Space Narrative Simulation Insights | Public Intelligence
Cultural Intelligence | Public Intelligence
Joint Chiefs of Staff | Public Intelligence
U.K. Ministry of Defence Future Operating Environment 2035 | Public Intelligence
U.S. Army Special Operations Command Presentation: Concept for Cognitive Joint Force Entry | Public Intelligence
Amit Sheth - Google Scholar Citations
Mahinthan Chandramohan - Google Scholar Citations
Malcolm Yoke Hean Low - Google Scholar Citations
Alessandro Farinelli - Google Scholar Citations
Erik Blasch - Google Scholar Citations
Jesus Cerquides - Google Scholar Citations
Mervat Abu-Elkheir - Google Scholar Citations
Google Scholar Citations
Granström: Asymmetric Threat Modeling Using HMMs:... - Google Scholar
Karthika: A comparative study of social networking... - Google Scholar
Resnik: SCALABLE MULTIDIMENSIONAL RESPONSE MEASUREMENT... - Google Scholar
Granström: Asymmetric Threat Modeling Using HMMs:... - Google Scholar
Detectability prediction of hidden Markov models with cluttered observation sequences. - Google Scholar
Choudhary: A Survey on Social Network Analysis for... - Google Scholar
Campbell: Social network analysis with content and graphs - Google Scholar
Yang: Covert nodes mining in social networks based... - Google Scholar
Baldwin: Simulation Approaches for System of Systems:... - Google Scholar
Sirois: Potential and limits of numerical modelling... - Google Scholar
rakunde - TPB
Russian Influence Operations – Damn, They Suck – To Inform is to Influence
Fragile and Conflict-Affected Situations | Asian Development Bank
Open Source Software | The Ames Laboratory
CEEOL - Article Detail
Center for a New American Security
A--Award - - Federal Business Opportunities: Opportunities
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis - Google Search
Automated Detection of Threat Objects Using Adapted Implicit Shape Model - Google Search
Big Data for Remote Sensing: Challenges and Opportunities - Google Search
Civil Unrest Event Data - Google Search
Complex Event Recognition from Open Source Social Media - Google Search
complex event processing open source - Google Search
defense and technology laboratory - Google Search
Detectability prediction of hidden Markov models with cluttered observation sequences - Google Search
eva nozableeda - Google Search
evolving optimal and diversified military operational plans for computational red teaming - Google Search
Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition - Google Search
Multitasking intelligent surveillance and first response system - Google Search
Potential uses of Numerical Simulation for the Modelling of Civil Conflict - Google Search
Predicting Medication Prescription Rankings with Medication Relation Network - Google Search
Real time big data analytics for predicting terrorist incidents - Google Search
Red teaming with - Google Search
rox- imity, an open-source software environment developed by the Knowledge Discovery Laboratory - Google Search
Tracking Small UAVs Using a Bernoulli Filter - Google Search
Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks - Google Search
VACCINE ANNUAL REPORT Visual analytics - Google Search
Defence Science and Technology Laboratory - GOV.UK
Working for Dstl - Defence Science and Technology Laboratory - GOV.UK
IEEE - 2016 International Conference in Information Science (ICIS)
Review of extracting information from the Social Web for health personalization. - PubMed - NCBI
How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX. - PubMed - NCBI
Crowdsourcing, citizen sensing and sensor web technologies for public and environmental health surveillance and crisis management: trends, OGC stan... - PubMed - NCBI
A survey of online activity recognition using mobile phones. - PubMed - NCBI
Giving meaning to tweets in emergency situations: a semantic approach for filtering and visualizing social data. - PubMed - NCBI
OSA | Optical Fiber Spectrometer based on Smartphone Platform for Refractive Index Sensing Application
Amit Sheth
Amit Sheth - Publications
Aryya Gangopadhyay - Publications
Branko Ristic - Publications
Lyudmila Mihaylova - Publications
Mei-Po Kwan - Publications
Bernoulli Particle/Box-Particle Filters for Detection and Tracking in the Presence of Triple Measurement Uncertainty
State estimation and fault detection using box particle filtering with stochastic measurements
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis
Ismailcem Budak Arpinar - ResearchGate
Amadou Gning - ResearchGate
A co-evolutionary approach for military operational analysis - Semantic Scholar
A co-evolutionary approach for military operational analysis - Semantic Scholar
Automated modeling and analysis of agent-based simulations using the CASE framework - Semantic Scholar
ACE Framework - Semantic Scholar
Home | SRI International
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.