Light theme
Dark theme
Automatic (use operating system setting)
Shared: 291 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
12-29 AM
Copy links to clipboard
Copy
Open
Home
Speed and Urgency in Silicon Valley | USAASC
Computational modeling of brain pathologies: the case of multiple sclerosis
Presentation to USASOC Futures Forum - GDELT Blog
Best Of 2016: Rise Of The Robots « Breaking Defense - Defense industry news, analysis and commentary
CORDIS Archive : European Commission : CORDIS : Archives : European Commission : CORDIS : Archives : FP7
European Commission : CORDIS : Search : Results page
Syria in 2016 (October onwards) - Page 128 - Small Wars Council
UChicago CPOST
The Computing Community Consortium - CCC
Presentations - CCC
Workshop Reports - CCC
Today's Best Deals: 4K Samsung, Kindle Ebooks, $20 Sonicare, and More
The Islamic State statehood and the concept of state in the Middle East
eScholarship: Search Results
The Futures Forum_Leading Global Futurist Speakers & Strategists
http://go.newsfusion.com/security/item/803253
greta's gouge
Publicaties | Hans Vermaak (english)
Vision and Modeling Technical Reports
First Steps in Resolving the Prevention Paradox: Adding Command Responsibility to the Uniform Code of Military Justice to Make Never Again a Reality 5 Homeland & National Security Law Review 2016
The Islamic State, an Unidentified Terrorist Object 25 Polish Quarterly of International Affairs 2016
Police Discretion in the 21st Century Surveillance State Policing the Police 2016 University of Chicago Legal Forum 2016
Human Trafficking Waivers 101 Women Lawyers Journal 2016
Multi image integration and Encryption Algorithm for security applications - IEEE Xplore Document
Isenberg Institute of Strategic Satire
Frontiers | Right inferior frontal gyrus activation as a neural marker of successful lying | Frontiers in Human Neuroscience
Terrorism, Radicalisation, Extremism, Authoritarianism and Fundamentalism: A Systematic Review of the Quality and Psychometric Properties of Assessments
Terrorism, Radicalisation, Extremism, Authoritarianism and Fundamentalism: A Systematic Review of the Quality and Psychometric Properties of Assessments
Measuring Emotion in Parliamentary Debates with Automated Textual Analysis
PLOS ONE: Search Results
2016 - Joint Special Operations University Press Publications - Library at Joint Special Operations University
Journal of Terrorism Research
202.174.84.89
Use the Middle Name Field to Track Websites That Sell Your Info
Foreign Policy - Morning Brief
New paradigms of cognitive management extending computational intelligence approaches | SpringerLink
Building the Multi-Modal Storytelling of Urban Emergency Events Based on Crowdsensing of Social Media Analytics | SpringerLink
The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps | SpringerLink
Semantic event fusion of computer vision and ambient sensor data for activity recognition to support dementia care | SpringerLink
Concepts and Methodologies for Modeling and Simulation - Springer
Disaster Forensics - Springer
Advances in Complex Societal, Environmental and Engineered Systems - Springer
System Dynamics - Springer
US Assistance, Development, and Hierarchy in the Middle East - Springer
Evaluating Automatic Learning of Structure for Event Extraction - Springer
Scenario-Based Practical Exercises to Train and Assess General Cross-Cultural Competence for Special Operations Forces - Springer
Counter-Terrorism and Design Thinking: Supporting Strategic Insights and Influencing Operations - Springer
Impressive Archive of Free DIY Musical Instrument Plans | Make:
Metrocosm - Data Visualization, Maps, and Statistical Analysis
Military Wiki | Fandom powered by Wikia
War Books: Lt. Gen. (Ret) Daniel Bolger's Top 5 Books on War and Strategy - Modern War Institute
Insurgency and Deterrence on NATO’s Northeastern Flank - Modern War Institute
Russia's Old Tricks Against New Targets
The Quest for Significance Model of Radicalization: Implications for the Management of Terrorist Detainees - Dugas - 2014 - Behavioral Sciences & the Law - Wiley Online Library
Scaling CAMEO: Psychophysical Magnitude Scaling of Conflict and Cooperation - Thomas - 2013 - Foreign Policy Analysis - Wiley Online Library
List of research units - DTU Orbit
D-VASim: A Software Tool to Simulate and Analyze Genetic Logic Circuits - DTU Orbit
Electrochemical sensing of biomarker for diagnostics of bacteria-specific infections - DTU Orbit
The Human Use of Human Beings: A Brief History of Suicide Bombing | Origins: Current Events in Historical Perspective
Physics Notebook — Physics Notes
Down the Security Rabbithole Podast
Defence Research Reports
INFORMS Journal on Computing: INFORMS
"Resource Management in Complex and Dynamic Environments" by Mohammad Salimullah Raunak
Sci-Hub: removing barriers in the way of science
sci-hub.cc/donate
Small Wars Journal
A Tale of Two Design Efforts (and why they both failed in Afghanistan) | Small Wars Journal
Calculated Communications in a Concave World | Small Wars Journal
Does Design Help or Hurt Military Planning: How NTM-A Designed a Plausible Afghan Security Force in an Uncertain Future - Part II | Small Wars Journal
Does Design Help or Hurt Military Planning: How NTM-A Designed a Plausible Afghan Security Force in an Uncertain Future, Part I | Small Wars Journal
Notes on Tactical Use of Qualitative Interviewing | Small Wars Journal
What’s Wrong With ARSOF? | Small Wars Journal
The Spatial Diffusion of Counterterrorist Legislation, 1970-2011 | Social Problems
Critical evaluation of reverse engineering tool Imagix 4D! | SpringerPlus | Full Text
2016 Terrorist Attacks
News You Can Use | Arthur D. Simons Center
The Stocks 2 - Best royalty free stock photos, videos, mockups, icons and fonts
LAST CHANCE: Subscribe Now, Free Upgrade to Next Highest Level of IntelCenter Database (ICD)
Online Homeland security: Facility Level Information on GHGs Tool (FLIGHT)
Influence Modeling of System Interactions
War News Updates: A Look At Russian, U.S., And Islamic State/Al Qaeda Styles Of Urban Warfare
Joe Dunford’s Holiday Shopping List: 2016 Edition
EBSCOhost | 116597641 | Quantifying Salient Concepts Discussed in Social Media Content: An Analysis of Tweets Posted by ISIS Fangirls.
www.361interactive.com/focus.php
behavioral influences analysis and assessment research and theory
Islamic State group: The full story - BBC News
BehaviorMatrix - Emotion Moves The World
How to Choose the Right Background Check Service
The Stroz Friedberg Cyber Brief — Center on National Security
Centre of Excellence Defence Against Terrorism
Get the hard drive equivalent of health insurance
Trump tweet bombs defense industry; Wants a nuclear arms race?; Berlin attacker killed; Airline hijacking; Aleppo; Turkey; CNO stopping by; And just a bit more... - Defense One
DOAB: Directory of Open Access Books
Defence Research and Development Canada | Publications
DoD Investment Budget Search (R-2s and P-40s)
Why President-Elect Donald Trump Stopped Taking CIA Security Briefings
Danish National Research Database-Den Danske Forskningsdatabase
Evolvable Smartphone-Based Point-of-Care Systems For In-Vitro Diagnostics - Danish National Research Database-Den Danske Forskningsdatabase
Just a SmidgION: Oxford Nanopore announce iPhone-powered sequencing | Front Line Genomics
Access to Public Information - The Hacker Factor Blog
Analysis | Hoover Institution
The Story of the Tunisian Revolution | Hoover Institution
EtreCheck Runs 50 Diagnostics at Once to Determine What’s Wrong with Your Mac
The Humanitarian Forecast for 2016: Dynamic, Complex and Increasingly Dangerous | The Huffington Post
Amazon Announces Its Best Selling Products of the 2016 Holiday Shopping Season - iClarified
Terrorist attacks and related incidents in the United States
Review on JSTOR
Kalev Hannes Leetaru: Reimagining Our World Through Data
systems of government and types of government - synonyms and related words | Macmillan Dictionary
Intelligence Works! More on the Indonesian... - Matthew Aid
Update on the Latest Developments in Syria - Matthew Aid
Sensors | Free Full-Text | Indoor-Outdoor Detection Using a Smart Phone Sensor
Sensors | Special Issue : New Generation Sensors Enabling and Fostering IoT
Healthcare Startup Society Conference and Awards Ceremony in London | Medgadget
Medgadget's Best Medical Technologies of 2016 | Medgadget
Portable Antibiotic Resistance Detector Developed | Medgadget
A Guide to Donald Trump's Huge Debts—and the Conflicts They Present | Mother Jones
Nature’s 10 : Nature News & Comment
NPEC - The Nonproliferation Policy Education Center
Biosecurity | NTI
Weakened Militarily, ISIS Still Has Power to Sow Deadly Mayhem - The New York Times
Every Brilliant Thing Broadcast on HBO December 26 | Playbill
Trump: 'No way' he would have lost to Obama - POLITICO
PubFacts.com - Scientific Publication Information Covering 20 million+ Publications and Authors | PubFacts
IS's Looming Death Could Be Hiding Bad News
Group Profiling Automation for Crime and Terrorism (GPACT)
NIST Cybersecurity Framework - Mindmap
SOF Primer Page
Science and Technology Division
USASOC Talks - Main
USASOC Talks - Counter-Unconventional Warfare
USASOC Talks - Perceiving Gray Zone Indications
USASOC Talks - Read
USASOC Talks - USASOC Updates
Inside the SFQC | Special Forces Association
SpringerOpen
New Trends in Social Media | StratCom
SUBCOP
SUBCOP
Minimizing the Effects of Temporal Aggregation on Event Data Analysis: International Interactions: Vol 40, No 5
Islamist narratives in ISIS recruitment propaganda: The Journal of International Communication: Vol 0, No 0
Dealing with uncertainty: the illusion of knowledge in the study of counterterrorism effectiveness: Critical Studies on Terrorism: Vol 8, No 2
Critical Studies on Terrorism: Vol 9, No 3
The Future of Jihadism in Europe: A Pessimistic View | Hegghammer | Perspectives on Terrorism
Top U.S. General: Two More Years to Beat ISIS - The Daily Beast
Vol 5, No 3 (2016)
Jupiter's throwing a firework party for Juno – and Hubble's peeking in • The Register
List of Islamic Terror Attacks
Welcome to the United Nations
Fears Growing Islamic State Successfully Weaponizing Refugees
A letter to historians of the future — the 2016 election really was dominated by a controversy over emails - Vox
ISIS arrests in Northern Virginia reveal jihadi threat near seat of U.S. government - Washington Times
Horizon 2020, FP7: Seventh Framework Programme
Filmmaker Installed Security Software On a Decoy Phone To Spy On Smartphone Thieves - Slashdot
Aptonic - Dropzone 3 Actions
Photo Forensics - Hany Farid - Google Books
Extremism, Counter-terrorism and Policing - Brian Blakemore - Google Books
Advances in Complex Societal, Environmental and Engineered Systems - Google Books
Data Science for Suicide Bombings: Can You Predict the Next Attack? - Sana Rasheed - Google Books
US Assistance, Development, and Hierarchy in the Middle East: Aid for Allies - Anne Mariel Zimmermann - Google Books
17 | August | 2016 | The Cold War Daily
Home page - FP7 - Research - Europa
Documents - FP7 - Research - Europa
Cooperation: Security - FP7 - Research - Europa
Sitemap - FP7 - Research - Europa
Further Information - JTI - European Commission
List of terrorist incidents, 2016 - Wikipedia
ERC: European Research Council
Section 2 - INTELLIGENCE COLLECTION ACTIVITIES AND DISCIPLINES - Operations Security - INTELLIGENCE THREAT HANDBOOK
ListOfGithubLists/README.md at master · asciimoo/ListOfGithubLists
bayandin/awesome-awesomeness: A curated list of awesome awesomeness
Sana-Rasheed · GitHub
Health Emergency Readiness, Biodefense S&T, CDC Quarantine - Biodefense Headlines
Google Person Finder
Fake News Report prompts confrontation between Pakistan and Israel. Who hides behind AWD News? | GOSINT
Now Available - Eurasian Disunion: Russia's Vulnerable Flanks - Jamestown
Russia’s New Information Security Doctrine: Fencing Russia from the “Outside World”? - Jamestown
Watch: Carbon Fiber Ventilator Pen | The Loadout Room
Improvised Weapons – The UST Spork Multi-Tool | The Loadout Room
Your Sets | Quizlet
| RUSI
Jennifer Lautenschlager - Google Scholar
Sana Rasheed - Google Scholar
Michael J. McCloskey - Google Scholar
Peter Kwantes - Google Scholar
McClosky: Assessing the development of cross-cultural... - Google Scholar
Santifort-Jordan: An empirical study of suicide terrorism... - Google Scholar
Davis: Primer for building factor trees to represent... - Google Scholar
Davis: Causal Models and Exploratory Analysis in... - Google Scholar
Davis: Social science for counterterrorism: Putting... - Google Scholar
Bart Schuurman - Google Scholar Citations
Science Huβ Publishing – Leading the Information Highway
Improvised weapons – The UST Spork Multi-Tool | SOFREP
The ‘app of choice’ for jihadists: ISIS seizes on Internet tool to promote terror | SOFREP
Send large files up to 5GB for free
Jonathan Nichols (@FutureofID2015) | Twitter
Sci Hub (@Sci_Hub) | Twitter
JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
(6) Jon Nichols ☕ (@wvualphasoldier) | Twitter
Sci-Hub | Open access to scientific information | VK
Doing Threat Intel the Hard Way - Part 3: Processing Threat Intelligence | Anomali
What’s new and what’s not in the U.N. resolution on Israeli settlements | Brookings Institution
CEEOL - Browse by Subjects
Best Background Check Company Reviews for 2016 - ConsumerAffairs
Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units
Início
Terrorism | Crime areas | Europol
Crime Areas | Europol
Europol joins forces with counter-terrorism experts to undermine online terrorist propaganda | Europol
Islamic State changing terror tactics to maintain threat in Europe | Europol
Publications & Documents | Europol
Changes in Modus Operandi of Islamic State (IS) revisited | Europol
FEMA Announces Notice of Funding Opportunity on Program to Prepare Communities for Complex Coordinated Terrorist Attacks | FEMA.gov
Global research funders launch World Report tool to aid funding analysis - Fogarty International Center @ NIH
Patent US20140279731 - System and Method for Automated Text Coverage of a Live Event Using ... - Google Patents
ahfe 2017 - Google Search
"primer for building factor trees to represent social- science knowledge - Google Search
Arms vendor's arrest in Slovenia demonstrates law enforcement’s ability to monitor the dark web - Google Search
CBRN TRAINING CURRICULUM pdf - Google Search
Contemporary Defense Applications of Social Science - Google Search
Counter-Terrorism and Design Thinking: Supporting Strategic Insights and Influencing Operations - Google Search
Data Science for Suicide Bombings: - Google Search
Dr. Bruce Forrester - Google Search
european union’s seventh framework programme for research, technological development and demonstration - Google Search
Evaluating Automatic Learning of Structure for Event Extraction - Google Search
Foreign Relations: Tools and Analyses - Google Search
image of publication citation only bookmark and share more information about this publication syria: with isis on back foot, turkey moves against the kurds - Google Search
Jianbo Gao - Google Search
Joel Lawton - Google Search
Joint Intelligence Collection and Analysis Capability - Google Search
Jonathan Nichols infosec - Google Search
national visualization and analytics center - Google Search
Peter Kwantes - Google Search
ProtestLab: A Computational Laboratory for Studying Street Protests - Google Search
Romanian Intelligence Studies Review - Google Search
Scenario-Based Practical Exercises to Train and Assess General Cross-Cultural Competence for Special Operations Forces - Google Search
sci-hub - Google Search
seeing it coming: detecting the unseen through complexity, uncertainty, and forecasting of disasters and humanitarian crises. - Google Search
Sharik DRDC - Google Search
terror events - Google Search
The Islamic State statehood and the concept of state in the Middle East - Google Search
TRADOC Mad Scientist Telecon - Google Search
Train and Assess General Cross-Cultural Competence for Special Operations Forces - Google Search
USASOC Futures Forum - Google Search
USASOC Futures Forum Presentation kalev - Google Search
Using “Big Data” To Understand the World Around Us: Towards Realtime Modeling, Monitoring, and Forecasting Global Society - Google Search
what do i need to control a country - Google Search
Prof. Alain Bauer – ICT16
ICT's Publications
Reflections on the Arab-Israeli Conflict - Lawfare
Joel Lawton | LinkedIn
John Hoven | LinkedIn
Jonathan Nichols | LinkedIn
Art Event Coordinator Job at Jordan Schnitzer Family Foundation in Portland, Oregon Area | LinkedIn
Search | LinkedIn
Mendeley Feed
CoMSES Computational Model Library | Open Agent Based Modeling Consortium
OSA | Colorimetric analysis of saliva–alcohol test strips by smartphone-based instruments using machine-learning algorithms
Peerlyst - a community of security professionals. Share knowledge. Build your reputation
Overview of the DNC Hack attribution spectacle: Was it Russian Hackers or Guccifer 2.0 by NewsWatcher - company, breach, website on Peerlyst
Andreas Herrmann
Claudio Cioffi
Huan Liu
Janusz Wojtusiak - Publications
Jeffrey K Bassett - Publications
John Hoven
Kashif Zia - Publications
Kenneth De Jong - Publications
Mark Coletti - Publications
Sean Everton - Publications
William George Kennedy
William George Kennedy - Publications
agent-based modeling of complex crises by Claudio Cioffi - Research Project on ResearchGate
Individual and social response to a nuclear WMD event by William George Kennedy - Research Project on ResearchGate
ResearchGate
Jianbo Gao - ResearchGate
Russian Military Using Smartphones to Track Troop Movements - Schneier on Security
Smartphone Spying as Art - Schneier on Security
Megacities Compendium | Military Intelligence | Intelligence
United Nations Economic and Social Commission for Western Asia
Arab Least Developed Countries (LDCs)
Conflict Mitigation and Resilience
Governance and Conflict Issues
External Trade Bulletin of the Arab Region, No. 24
Publications | United Nations Economic and Social Commission for Western Asia
Survey of Economic and Social Developments in the Arab Region 2015-2016
Cybersecurity firm finds evidence that Russian military unit was behind DNC hack - The Washington Post
The ‘app of choice’ for jihadists: ISIS seizes on Internet tool to promote terror - The Washington Post
Evernote, OneNote, and Beyond: The 12 Best Note-Taking Apps
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.