Light theme
Dark theme
Automatic (use operating system setting)
Shared: 2,337 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
THINGIVERSE
Copy links to clipboard
Copy
Open
www.munfred.com/proteins.html
3D Printing and Molecular Models | Barney Lab
About educator - Thingiverse
About chemteacher628 - Thingiverse
Eduardo’s Guide for 3D Printing Proteins with Chimera by Munfred - Thingiverse
popular - Thingiverse
About Munfred - Thingiverse
About MoleculeMaker - Thingiverse
About EvilOverlordX - Thingiverse
About Ocram - Thingiverse
Topics - DIY Bio Laboratory - Groups - Thingiverse
Things tagged with 'Science' - Thingiverse
DARPin in Complex with IL-4 (two models, snap together) PDB 4YDY by Ocram - Thingiverse
Hemoglobin molecule by se3dedu - Thingiverse
About aarono - Thingiverse
About aarono - Thingiverse
About alavanimation - Thingiverse
About alavanimation - Thingiverse
About BioInteractive - Thingiverse
About Carolina9999 - Thingiverse
Things to Make collection - Thingiverse
macromolecules collection - Thingiverse
About Charlie_at_Truman - Thingiverse
About destroyer2012 - Thingiverse
newest - Thingiverse
popular - Thingiverse
Topics - 3D-Printing In Education - Groups - Thingiverse
Topics - Classroom 3D - Groups - Thingiverse
Members - Classroom 3D - Groups - Thingiverse
Topics - Mathematica - Groups - Thingiverse
About hashampersand - Thingiverse
About HybridDK - Thingiverse
About ImmunoUPS - Thingiverse
About ImmunoUPS - Thingiverse
Things to Make collection - Thingiverse
Jaque - Biologia y Anatomia Humana collection - Thingiverse
About medakachou - Thingiverse
About mkuiper - Thingiverse
Things to Make collection - Thingiverse
About pmueller - Thingiverse
About se3dedu - Thingiverse
Proteins collection - Thingiverse
Things tagged with 'Amino acid' - Thingiverse
Things tagged with 'Cell' - Thingiverse
Things tagged with 'Crystallography' - Thingiverse
Things tagged with 'Enzyme' - Thingiverse
Things tagged with 'Enzyme' - Thingiverse
Things tagged with 'Molecular biology' - Thingiverse
Things tagged with 'Molecular model' - Thingiverse
Things tagged with 'Protein' - Thingiverse
Things tagged with 'Protein' - Thingiverse
Things tagged with 'RNA' - Thingiverse
Things tagged with 'Virus' - Thingiverse
Formin Homology Domain by destroyer2012 - Thingiverse
Histone by destroyer2012 - Thingiverse
Actin filament construction set by destroyer2012 - Thingiverse
Proteasome Assembly Kit by destroyer2012 - Thingiverse
DNA repair enzyme MutS from E. coli by destroyer2012 - Thingiverse
Glycolysis Series #10: Pyruvate Kinase by vosslab - Thingiverse
3D Print Any Protein! by yehsk8rz - Thingiverse
Biropette: customisable, high precision pipette. by BadenLab - Thingiverse
DPP-4 peptidase by HybridDK - Thingiverse
DPP-4 peptidase by HybridDK - Thingiverse
Influenza Virus Neuraminidase With Anti-flu Drug Relenza by aarono - Thingiverse
Cellulose Chain by MoleculeMaker - Thingiverse
E. coli Biotin Carboxylase in complex with ADP, bicarbonate and biotin by medakachou - Thingiverse
Class II tRNA enzyme by vosslab - Thingiverse
Conceptual representation of enzyme by HybridDK - Thingiverse
transfer RNA by aarono - Thingiverse
transfer RNA by aarono - Thingiverse
NU-100 by patrickfuller - Thingiverse
Lactic acid Molecule by raphnn - Thingiverse
Long chain acyl-CoA carboxylase by medakachou - Thingiverse
Aquaporin by se3dedu - Thingiverse
ATP Synthase by chemteacher628 - Thingiverse
Animal and Plant Cell Construction Kit by mfritz - Thingiverse
Molecule Construction Kit by mfritz - Thingiverse
DNA/RNA Building Set/Transcription and Translation Model by chemteacher628 - Thingiverse
TMV Subunit by milenovic - Thingiverse
animal cell / eukaryotic cell -model by alavanimation - Thingiverse
CRISPER / CAS9 Restriction enzyme set by Eagleknot - Thingiverse
RNA Strand by TK3DPrinting - Thingiverse
Biology Models collection - Thingiverse
Biology Models collection - Thingiverse
Molecules and Biology collection - Thingiverse
About vosslab - Thingiverse
Math and Science collection - Thingiverse
ME ME ME
Copy links to clipboard
Copy
Open
Smartphone-Based Mobile Testing Technique for Quick Bridge Cable–Force Measurement: Journal of Bridge Engineering: (ASCE)
Information diffusion and opinion change during the gezi park protests
Information worth spreading
Using low-cost electroencephalography (EEG) sensor to identify perceived relevance on web search
What social media data should i use in my research?
Architectural work for modeling and simulation combining the NATO Architecture Framework and C3 Taxonomy
Risk perception of complex technology innovations: Perspectives of experts and laymen - IEEE Xplore Document
Detecting anomalies in Twitter stream for public security issues - IEEE Xplore Document
Association between smartphone-based activity monitoring and traditional clinical assessment tools in community-dwelling older people - IEEE Xplore Document
Free context smartphone based application for motor activity levels recognition - IEEE Xplore Document
Leading causes of outages for transmission elements of the North American bulk power system - IEEE Xplore Document
Towards smarter cities: A self-healing resilient Microgrid Social Network - IEEE Xplore Document
The value of aggregation under minimax pricing scheme in the electricity retail market - IEEE Xplore Document
Online Analysis of Security Risks in Elastic Cloud Applications - IEEE Xplore Document
The Fog of War in Cyberspace - IEEE Xplore Document
Software Architecture Challenges and Emerging Research in Software-Intensive Systems-of-Systems - Springer
International Journal of Conflict and Violence (IJCV)
Intelligence Policy Center | RAND
3D Printing Proteins and Stuff - Google Photos
GoonerTPB - TPB
Cell Phone Chemical Sensor - Google Search
Trump Tracker
DIY Microsopy by TeZ @ Academie Minerva Groningen «
Yabe-LINE貼圖代購 | 台灣No.1,最便宜高效率的代購網
Show Music for Show People
PLOS ONE: Search Results
MIT Lincoln Laboratory: Cyber Security and Information Sciences: Publications: William M. Campbell
STO-MP-IST-123
Data mining of Twitter posts can help identify when people become sympathetic to groups like ISIS
OneTab shared tabs
TimesTalks - YouTube
OneTab shared tabs
THE SOURCE INTELLIGENCE CENTER – WORLDBEAT
Toby - Stop browser tab overload
DARPAtv - YouTube
Benjamin Rauhala - YouTube
Sign in to Your 3DVIA Account
Search Results : Analytical Support to Operations"
U.S. Passports & International Travel
Data mining of Twitter posts can help identify when people become sympathetic to groups like ISIS
15 New IFTTT Triggers to Make Life Easier
BROADWAY MUSICS TO DL
Copy links to clipboard
Copy
Open
Damien Slattery - YouTube
mmendoza0627 - YouTube
jaszon25 - YouTube
aurora spiderwoman - YouTube
Linda Wellington - YouTube
CANCER SUCKS
Copy links to clipboard
Copy
Open
Nivolumab Combined With Ipilimumab Versus Sunitinib in Previously Untreated Advanced or Metastatic Renal Cell Carcinoma (CheckMate 214) - Full Text View - ClinicalTrials.gov
PubPDF - Full Text Article: Nivolumab in the treatment of advanced renal cell carcinoma: clinical trial evidence and experience.
PubPDF - Find Full Text Journal Articles about Renal Cell Carcinoma
European Medicines Agency - Find medicine - Yervoy
Combined Nivolumab and Ipilimumab or Monotherapy in Untreated Melanoma — NEJM
What’s new in kidney cancer research and treatment?
Immunotherapy for Kidney Cancer - CRI
Renal Cell Carcinoma Treatment - NFCR
Emerging Role of Combination Immunotherapy Regimens in Metastatic Renal Cell Carcinoma - Google Search
Renal Cell Carcinoma Treatment & Research Updates - Google Search
Nivolumab + Ipilimumab Shows Promise in Metastatic Renal Cell Carcinoma pdf - Google Scholar
Immune Checkpoint Blockade: A Common Denominator Approach to Cancer Therapy: Cancer Cell
ipilimumab rcc - Google Scholar
Emerging monoclonal antibodies for the treatment of renal cell carcinoma (RCC): Expert Opinion on Emerging Drugs: Vol 21, No 3
MAC SUCSCRIPTIONS
Copy links to clipboard
Copy
Open
1Password
The Parallels Black Friday Mac App Bundle FAQ - Pocket Support
TextExpander
Parallels: Mac & Windows Virtualization, Remote Application Server, Mac Management Solutions
KB Parallels: How can I install and activate Kaspersky Security for Mac in Parallels Desktop 12?
KB Parallels: What bonus software comes with Parallels Desktop 12 for Mac?
KB Parallels: Getting started with Parallels Toolbox
KB Parallels: Getting Started with Parallels Access
Parallels Online Store
Parallels - 1Password
FLIC - The Wireless Smart Button
Commander One PRO 1.5.2 – Mac Torrents
Best Cyber Monday 2016 Deals on iPhone and iPad Apps
InFocus Pro - All-in-One Organizer on the App Store
Dispatch: Email meets GTD on the App Store
Deckset on the Mac App Store
Hype 3 on the Mac App Store
Notability on the Mac App Store
CodeRunner 2 on the Mac App Store
DEVONthink To Go on the App Store
Dropshare - Powerful File Sharing on the App Store
Linky — Share webpage links, images and text on the App Store
Prizmo - Scanning, OCR, and Speech on the App Store
LongScreen on the App Store
Screens VNC - Remote Access To Your Computer on the App Store
Cyber Monday 2016: The Best Deals for Tech
Apple Cyber Monday Roundup: Find the best deals & lowest prices on iPhone, MacBook, iPad, iMac and Apple Watch
JumpDesktop - Google Search
Your Screens License - scitrenbaum@gmail.com - Gmail
Screens - Control Your Computer Remotely - Edovia
Yoink - Improved Drag & Drop File Management on the Mac App Store
DEVONagent Express on the Mac App Store
Outline – note app with local storage & cloud sync on the Mac App Store
Outline - your digital notebook for iPad and Mac
Just Press Record on the Mac App Store
Outline – Notes with Beautiful UI "OneNote Ed." on the App Store
Graphic - illustration and design on the App Store
Graphic - vector illustration and design on the App Store
Screenshot++ on the App Store
Phlo - Quick web search browser on the App Store
Money Pro - Bills, Budgets and Accounts w/ Sync on the App Store
AirParrot Remote on the App Store
SKRWT on the App Store
Comic Life 3 on the App Store
Commander One PRO - FTPclient, RAR, 7zip extractor on the Mac App Store
Pocket: My List
Pocket: Pocket Premium
!12-05
Copy links to clipboard
Copy
Open
Commercial Drones Services | Unmanned Aerial Systems
How to Use Multiple Dropbox Accounts Together — odrive Blog
Paulo Costa
Con Collector
Buy More, Save More On Apparel, Shoes and More from Target
Take 20% Off Sitewide at Adidas And Get The Perfect Gifts For Your Active Friends
2016 Annual Meeting – of the Decision Sciences Institute
greta's gouge: Friday's Miscellany 12-02-2016
University-Led Research (Minerva Initiative)
Resources & Events (Minerva Initiative)
National Defense University Press > Media > News
Metamaterial Radar Is Exactly What Delivery Drones Need - IEEE Spectrum
Identifying Explosives at a Distance - IEEE Spectrum
explosives - Tag Search - IEEE Spectrum
Instead of Dropping Bombs, Can Drones Locate Unexploded Ones? - IEEE Spectrum
SUPER-FP7 | Social sensors for security assessments and proactive emergencies management
The Syria Institute | An independent non-profit research institution that addresses Syria’s complex challenges through informed policy analysis and data-driven information.
News You Can Use: 12/05/16 | Arthur D. Simons Center
LIMITED TIME: Subscribe Now, Get Free Upgrade to Next Highest Level of IntelCenter Database (ICD)
MacStories Weekly: Issue 59
War News Updates
AAAI Digital Library — International Conference on Web and Social Media
C-IED
Creativity, Thinking Skills, Critical Thinking, Problem solving, Decision making, innovation
BWW TV Exclusive: Watch Darren Criss Get Served Too Much Tuna at OH, HELLO!
Iran News Round Up - December 5, 2016 | Critical Threats
The IS network: Terror in Europe | Documentary & Report: Watch DW-videos online for free | DW.COM | 14.11.2016
Weapons business booming despite decline in sales: SIPRI report | World | DW.COM | 05.12.2016
EPC - European Policy Centre - Independent think tank
Presentations - The Extremist Crime Research Consortium
i-intelligence
OSINT Tools and Resources Handbook – i-intelligence
Procedures, Personnel and Technologies for Conflict Prevention and Peacebuilding | IAI Istituto Affari Internazionali
Research Scientist job - Providence Health & Services - Portland, OR | Indeed.com
(8540) Inoreader - Global Investigative Journalism Network
Investorideas.com - #Defense Stock News: CACI (NYSE: $CACI) Awarded $1.77 Billion Task Order to Support Joint Improvised-Threat Defeat Organization
JCBRN Defence COE
Michael C Horowitz | Ongoing Research
Understanding the Importance of Narrative
NCRM Working Papers
Sciences Addressing Asymmetric Explosive Threats - Office of Naval Research
Human Social Cultural Behavioral Sciences - Office of Naval Research
Information Operations | RAND
Futures - ScienceDirect.com
Procedia Computer Science - ScienceDirect.com
START.umd.edu
Demystifying Gray Zone Conflict: A Typology of Conflict Dyads and Instruments of Power in Libya, 2014-Present | START.umd.edu
Introducing the United States Extremist Crime Database (ECDB) | START.umd.edu
Strategic Communication and U.S. National Security Affairs: Critical-Cultural and Rhetorical Perspectives | START.umd.edu
Publications | START.umd.edu
Improving Intelligence Studies as an Academic Discipline: Intelligence and National Security: Vol 31, No 2
International Journal of Intelligence and CounterIntelligence: Vol 30, No 1
lamps & lighting, home decor : Target
DisplayBio.aspx
Partnering to Help Curb the Spread of Terrorist Content Online
Michael C. Horowitz Dataverse
jivoi/awesome-infosec: A curated list of awesome infosec resources.
jivoi (EK_) / Starred
ICWATCH
Insight Maker | Free Simulation and Modeling in your Browser
OSSU - Open Source Society University
Open Source Intelligence News (OSIN)
US Air Force Looking Into Increase of Suicides at Japanese Base
ToolLinkRipper < Dmi < digitalmethods.net
| ACAPS
CIAO
Changes in Modus Operandi of Islamic State (IS) revisited | Europol
Upgrade to Premium sync experience | odrive
Michael C. Horowitz - Publications
Home | SIPRI
An Open Letter to the CIA Director Nominee | The Cipher Brief
Threat Crowd | Threatcrowd.org Open Source Threat Intelligence
Paulo Costa - Google Scholar Citations
Google Scholar Citations
Goemans: Introducing Archigos: A dataset of political... - Google Scholar
Goemans: Introducing Archigos: A dataset of political... - Google Scholar
Powell: Global instances of coups from 1950 to 2010... - Google Scholar
Gilmour: Real-Time Course of Action Analysis - Google Scholar
Goemans: Introducing Archigos: A dataset of political... - Google Scholar
Introducing the United States Extremis Crime Database ( - Google Search
performance computing high performance computing for for command & control command & control real-time decision support real-time decision support real-time course of action analysis real-time course of action analysis - Google Search
12-06 WOOT WOOT
Copy links to clipboard
Copy
Open
iMazing Guides
Project - AccessScience from McGraw-Hill Education
McGraw-Hill Higher Education :: Your Title Here
Librarians: Ambassadors to New Technology
Check Your Mac's Drive and Reclaim 5 GB of Wasted Space! - Stephen Foskett, Pack Rat
Service and Support Coverage - Apple Support
Precision cancer medicine
Scientific Data
Information Fusion Under Consideration of Conflicting Input Signals - Springer
BlogSearch: Semantic Services for Aggregating and Searching Blog Articles | International Journal of Semantic Computing , Vol 10, No 03 | World Scientific
Social-spam profile detection based on content classification and user behavior - IEEE Xplore Document
Unmanned vehicles for anti-submarine warfare - IEEE Xplore Document
Malicious accounts: Dark of the social networks
Towards Scalable Governance: Sensemaking and Cooperation in the Age of Social Media | SpringerLink
CONTENT MINING FRAMEWORK IN SOCIAL MEDIA: A FIFA WORLD CUP 2014 CASE ANALYSIS
Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence (OSINT) - Springer
AI 2016: Advances in Artificial Intelligence - Springer
Defence Research Reports
Defence Research Reports
Computational Event Data System
GeoNames
UCDP Download Center
Free GIS Datasets - Categorised List
Event Registry
Regex Hub - Useful Regex Patterns
CyberChef
Counter-Da'esh Influence Operations - Google Search
Bernier: Agility of C2 Approaches and Requisite Maturity... - Google Scholar
Marco Manso - Google Scholar Citations
Semantic Scholar
-| CVSL - Publications |-
Philippe J. Giabbanelli - Publications
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
The ATOM: 4. The Overlooked Economics of Technology
CiteSeerX — IMAGE-SCENARIZATION: A COMPUTER-AIDED APPROACH FOR AGENT-BASED ANALYSIS AND DESIGN
Representing qualitative social science in computational models to aid reasoning under uncertainty: National security examples
PLOS ONE: Search Results
Ethics and Policies for Cyber Operations - Springer
Palgrave Handbook of Inter-Organizational Relations in World Politics - Springer
Making Sense of Large Datasets in the Context of Complex Situation Understanding - Springer
Terrorist Trials: Forensic Science and the Trial Process - Springer
Global Futures Studies & Research by The Millennium Project
Global Futures Intelligence System
Self-referenced smartphone-based nanoplasmonic imaging platform for colorimetric biochemical sensing - Analytical Chemistry (ACS Publications)
Alexandra Ulsh
The Future of Anti-Terrorism Technologies
H2020 Information Page - Marco Manso
About me - Marco Manso
Global Futures Studies & Research by The Millennium Project
2015-16 SOF
Global Futures Intelligence System
NATO ARW Predetection
NATO - Topic: Countering terrorism
Rinicom LTD - Secure Communications - Rinicom Ltd
Jeffrey T. Hansberger - Google Scholar Citations
Denis Laurendeau - Google Scholar Citations
GFIS
Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence - Google Search
Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence (OSINT) - Google Search
DRDC-RDDC-2016 - Google Search
Dark Networks: The Terror–Crime Nexus - Google Search
Egypt’s Integrated Synergetic Intelligence System - Google Search
Emerging Technologies and New Counter- Terror Strategies - Google Search
Global Futures Intelligence System - Google Search
Identification of Potential Terrorists and Adversary Planning; - Google Search
Identification of Potential Terrorists and Adversary Planning — Emerging Technologies and New Counter-Terror Strategies - Google Search
Making Sense of Large Datasets in the Context of Complex Situation Understanding - Google Search
Pompeu Casanovas - Google Search
State of the Future Index - Google Search
Denis Laurendeau - Publications
Marielle Mokhtari - Publications
François Bernier - ResearchGate
12-08 Oh My!
Copy links to clipboard
Copy
Open
Google Advanced Search
2016 Ben Benavides OSINT 2ool Kit On The Go Bag (Bag O’Tradecraft) « Public Intelligence Blog
Findo Alternatives and Similar Software - AlternativeTo.net
Stephen Foskett, Pack Rat - Understanding the accumulation of data
Scientific and technical research - Themes - EU Bookshop
Documents relating to the Sixth Framework Programme - FP6 - Research - European Commission
Western Foreign Fighters in Syria / ICSR
Fake News and Data Mining: Mapping Today’s Media for Intel Analysis - In Public Safety
IntuView - Downloads
Obama, SOF, and the rules of war; Why the US struggles with influence warfare; Report: $125b in Pentagon waste; Mike Flynn, conspiracy theorist; and just a bit more... - Defense One
The Flaw in Tech Giants’ Plan to Fight Extremist Content - Defense One
Deliverables: Future of IDentity in the Information Society
The ISIS Emni: The Inner Workings and Origins of ISIS’s Intelligence Apparatus – ICSVE
IntuView - Home Page
Finding Data - NSD - Norwegian Centre for Research data | NSD - Norwegian center for research data
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
20100130.gif (504×533)
Special Edition: New data on foreign fighters | START.umd.edu
Newsletters | START.umd.edu
CONFLICT DATASETS: A PRIMER FOR ACADEMICS, POLICYMAKERS, AND PRACTITIONERS: Defence and Peace Economics: Vol 22, No 1
The Iranian Empire Is Almost Complete - The Tower
Andrew Halterman – Political science, text data, conflict forecasting, Python, and R
The Good Judgement Project and Bayes’ Calculator – Andrew Halterman
Event Data – Andrew Halterman
[1612.01284] Modeling Structure and Resilience of the Dark Network
[1612.02377] A Method for Group Extraction and Analysis in Multilayer Social Networks
Children synthesize $2 version of Martin Shkreli's $750 malaria drug / Boing Boing
Eck: A beginner’s guide to conflict data: finding... - Google Scholar
military intervention data stream - Google Scholar
Text Expansion Tool - Auto Text Expander | TextExpander
Text Expansion Tips - Typing Shortcuts | TextExpander
Amazon
Books or articles that are must reads to understand the Islamic State annotative bibliography - Google Search
Attorney's Information Forensics Handbook" - Google Search
Visual Analysis Open Source Intelligence Toolkit - Google Search
Foreign terrorist fighters / Terrorism / Crime areas / Internet / Home - INTERPOL
Key Websites - A Linkpack by Sara Citrenbaum
LibGuides - A Linkpack by Sara Citrenbaum
OSINT - A Linkpack by Sara Citrenbaum
Online Tools & Resources Rock - A Linkpack by Sara Citrenbaum
Anything We Can Do They Have Done Better - A Linkpack by Sara Citrenbaum
Try Me - A Linkpack by Sara Citrenbaum
Data Bases-Sources-Sets - A Linkpack by Sara Citrenbaum
Post-Election College Paper Grading Rubric - McSweeney’s Internet Tendency
Google Social Search
Troy Hunt: Here's 1.4 billion records from Have I been pwned for you to analyse
Statistics
Thesis & Dissertation Repositories
Joint Forces - AL
Operations Odyssey Dawn and Unified Protector - SM
Intelligence - AL
Caucasus - AL
Homeland Security Digital Library – Securing the homeland through the power of information
Not Just the Caliphate: Exploring the Jihadist Scene in America – Homeland Security Digital Library
On the Homefront – the HSDL Blog – Homeland Security Digital Library
2017 Emerging Cyber Threats, Trends and Technologies Report
Books & Journals – Homeland Security Digital Library
Center for the Study of the Drone – at Bard College
About Research @NPS - Naval Postgraduate School
Dictionaries, Glossaries & Lexicons
Turning Point | Center for Strategic and International Studies
59 Search Results - ALL(Hybrid Multi-Agent Strategy Discovering Algorithm for Human Behavior) - ScienceDirect
competitive governance model - Google Search
center for study of terrorism and response - Google Search
schmuel barr israel - Google Search
intovision gdelt - Google Search
Hedonometer
The development of a concept inventory for engineering graphics - IEEE Xplore Document
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications - IEEE Xplore Document
IEEE Xplore Full-Text PDF:
micROS: a morphable, intelligent and collective robot operating system | Robotics and Biomimetics | Full Text
Efficiently detecting switches against non-stationary opponents | SpringerLink
The Politics of Militant Group Survival in the Middle East - Springer
Macro- and Micro-approaches to Crime Prevention and Intervention Programs - Springer
Unfolding the Core Structure of the Reciprocal Graph of a Massive Online Social Network - Springer
Influential Actors Detection Using Attractiveness Model in Social Media Networks - Springer
The Principal–Agent Model and Inter-Organizational Relations - Springer
Phoenix Data Project
Low-cost, robust and field portable smartphone platform photometric sensor for fluoride level detection in drinking water - Analytical Chemistry (ACS Publications)
Tools | REVEAL
DARPA Hierarchical Identify Verify Exploit (HIVE) BAA | Contract Research and Development
Microsystems Technology Office
Next Generation Social Science (NGS2) Proposers Day
TRAnsformation DESign (TRADES) Proposers Day
GRAPHS
Dr. Reza Ghanadan
re3data.org | Registry of Research Data Repositories
Relational affordances of information processing on Facebook
Content sharing in Internet of Vehicles: Two matching-based user-association approaches
A language-based approach to modelling and analysis of Twitter interactions
Digital Citizenship and Political Engagement: The Challenge from Online ... - Ariadne Vromen - Google Books
Experience from the DARPA Urban Challenge - Google Books
Critical Issues in Cross Cultural Management - Google Books
Chrome Web Store - Extensions
Hierarchical Identify Verify Exploit - Google Search
darpa invert graph based hardware - Google Search
darpa hive program - Google Search
Militant Imagery Project | Combating Terrorism Center at West Point
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Google Scholar
Get All The Activewear and Sneakers You Could Need with 30% Off Sitewide at Adidas
adidas Official Website | adidas
adidas X Tango 16.2 Turf Shoes - Black | adidas US
how to identify bots - Google Search
Tailored Online Interventions: The Islamic State’s Recruitment Strategy | Combating Terrorism Center at West Point
How terrorists recruit online (and how to stop it) | Brookings Institution
The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter | Brookings Institution
The Kingdom and the Caliphate: Duel of the Islamic States - Carnegie Endowment for International Peace
Government creating a mind of its own
Capturing Planned Protests from Open Source Indicators | LINQS Statistical Relational Learning Group @ UMD
This Technology to Beat Fingerprint Scanners Fits Just Like a Glove
Men's Sale | adidas US
ISIS and the Lonely Young American - The New York Times
Step-by-Step Online CVE - VOX - Pol
Computation and Language authors/titles recent submissions
Urban Black Women and the Politics of Resistance - Z. Isoke - Google Books
Eye to Eye: Women Practising Development Across Cultures - Susan Perry, Celeste Marguerite Schenck - Google Books
Still Lifting, Still Climbing: Contemporary African American Women's Activism - Google Books
Stetson Kennedy - Wikipedia
Computation and Language
quantify intuition - Google Scholar
Isoke: Urban black women and the politics of resistance - Google Scholar
Radford-Hill: Further to fly: Black women and the... - Google Scholar
Evidence-Based Programs and Practices - What Works in Criminal Justice - CrimeSolutions.gov
African American women's activism - Google Search
Capturing Planned Protests from Open Source Indicators - Google Search
DoD Science and Technology Strategic Communication_Social Media Programs - Google Search
Foreign Fighter Data - Google Search
Further to Fly: Black Women and the Politics of Empowerment - Google Search
HIVE program darpa - Google Search
OEPT-Dataset - Google Search
Open Source Indicators - Google Search
empower black women to be politically active - Google Search
identify islamic state bot - Google Search
islamic state bots - Google Search
physics today - Google Search
superman ku klux klan - Google Search
How to spot home-grown ISIS recruits online before they leave | New Scientist
‘ISIS is not Islam’ – Russian university releases anti-extremist textbook — RT Russian politics
Saved Session - Session Buddy
SocialSensor · GitHub
CEUR-WS.org - CEUR Workshop Proceedings
Phoenix Data Project
The Open Event Data Alliance Software Page
Datasets - Conflict, War and Terrorism - UCF Research Guides at University of Central Florida Libraries
EVENT DATA AND EMPIRICAL CONFLICT ANALYSIS
Home - Conflict, War and Terrorism - UCF Research Guides at University of Central Florida Libraries
Inoreader - The content reader for power users who want to save time.
dblp: Norman D. Geddes
Intelligence – International Tactical Training Association
HSRC Year End Sale
Multimedia Knowledge and Social Media Analytics Laboratory
December News: Gray Zone conflicts explained; Global Terrorism Index released; CVE principles for local government
MacStories Weekly: Issue 58
VCDB VERIS Community Database
The VERIS Framework
Office Depot®
CRCnetBASE - Chapter 5 Biometrics in Social Media Applications
Jihadism in the Arab World after 2011: Explaining Its Expansion | Middle East Policy Council
Unscheduled Campus Closures | PCC
figshare - credit for all your research
A Validation Process for Predicting Stratagemical Behavior Patterns of Powerful Leaders in Conflict - Google Search
NATO CCD COE - Google Search
VERIS Community Database - Google Search
military intervention data stream - Google Search
steve jameson darpa - Google Search
OODA Loop - Best Security, Business, and Technology Books of 2016
Real-time local Twitter trends - Trendsmap
Biometrics in Social Media Applications - Google Search
sigacts - Google Search
CENTER FOR NATION RECONSTRUCTION AND CAPACITY DEVELOPMEN - Google Search
A New, Near-Real-Time Event Dataset and the Role of Versioning - Google Search
Event Data Presentations
Event Data Presentations
Andrew Halterman - Google Search
compare event data table - Google Search
Comparing GDELT and ICEWS Event Data | mdwardlab.com
how to compare event data |Tableau Community
Guide to Con ict Data - Google Search
CTC Report - Then and Now: Comparing the Flow of Foreign Fighters to AQI and the Islamic State - scitrenbaum@gmail.com - Gmail
Eck: A beginner’s guide to conflict data: finding... - Google Scholar
Eck: A beginner’s guide to conflict data: finding... - Google Scholar
Counting conflict | News & Analysis | Data Driven Journalism
Conflict & Ethnic Politics Data - Politics Resources Guide - LibGuides at Princeton University
intuview - Google Search
Saved Session - Session Buddy
IFGM - Distributed Information and Intelligence Analysis Group
Distributed Information and Intelligence Analysis Group
Past Projects - Distributed Information and Intelligence Analysis Group
Data Sources - Social Science Data - Research Guides at University of California Irvine
No 8 (2016)
opencatalog.darpa.mil
Home | U.S. Army Research Laboratory
Behavioral Influences Analysis Center, military intelligence human factors analysis, adversary intelligence
about us
behavioral influences analysis and assessment research and theory
Boeing shares fall after Trump tweets to cancel Air Force One order - Business Insider
The US Air Force has developed a way to counter ISIS drone-bombs - Business Insider
Social Media in Strategic Communication (SMISC)
State of the Future Index
RAND Army Research Division | RAND
Home | SmartResilience
INSCRdata
CSP - Major Episodes of Political Violence, 1946-2013
US Military Influence Operations
MAEC - Malware Attribute Enumeration and Characterization | MAEC Project Documentation
How to render garbage on your iPhone – Medium
Papaly | Start Page
DARPA Social Media in Strategic Communication - Google Scholar
Woodhead Publishing Series in Energy [Updated at 2016.12.07] (download torrent) - TPB
clouderone - TPB
JΞSTΞR ✪ ΔCTUAL³³º¹ on Twitter: "...to put it another way. Trump made $6M in airfares for his security detail to fly on his plane during campaign >> https://t.co/7kh0Eh0Wv6"
Personal - Dropbox
94/7 Alternative Portland & Widmer Brothers Brewing Present December to Remember w/ BASTILLE, Holiday Friends, All Ages at McMenamins Crystal Ballroom on Dec 12, 2016 8:00 PM
ANNEX A: HETEROGENEOUS C2: WHEN THE “C2 APPROACH” REQUIRES MANY C2 APPROACHES - Google Search
Adversary Behavioral Modeling - Google Search
Adversary Intent Inferencing - Google Search
COIN/CIMIC Model. - Google Search
Computational Intelligence for Security and Defence Applications - Google Search
Culturally Infused Social Network Analysis - Google Search
dr. michael hsieh - Google Search
David S. Alberts - Google Search
distributed information and intelligence analysis group - Google Search
inauthor:"Eric Victor Larson" - Google Search
How to manage iNode files in the “lost+found” directory | MacIssues
Revealed: Pentagon spent millions studying how to influence social media — RT America
Millennials: The Musical - YouTube
Saved Session - Session Buddy
OSINT OH MY
Copy links to clipboard
Copy
Open
OSINT Repertorium - RIS Open Source Intelligence
AAO Search Tools – coursegalore.com
Osint Links – coursegalore.com
The best tool for inserting text templates - Thousands of common phrases at your fingertips
101+ OSINT Resources for Investigators | i-Sight
OPEN SOURCE GOD: 480+ Open Source Applications
Home | michenriksen.com
Mario Profaca: Mario's Cyberspace Station: The Global Intelligence News Portal
OSINT Tools | Investigation Techniques & Links by Bob Brasich
DARPA - Open Catalog
2016 OLC Wrap-Up – Recipes For Success | OSINT
OSINT Framework
REVEAL | Social Media Verification
pucarasec's Pocket list - Sharedli.st
Vacuuming Image Metadata from The Wayback Machine | Automating OSINT Blog
Automating OSINT Blog
SpiderFoot - Open Source Intelligence Automation Tool (OSINT) - Darknet
Darknet Archives - Darknet
Opportunities
5 OSINT techniques that bring intelligence to the enterprise
Clint Watts - Foreign Policy Research Institute
Open source intelligence techniques and the Dark Web | ITProPortal
SpiderFoot v2.6.1 - Open Source Intelligence Automation
Marinus Analytics
Campaign Contributors Lookup
DARPA seeks to develop real-time intelligence processor to uncover patterns in vast data
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OSINT
Research Resources and Research Tools
Automating Open Source Intelligence - ScienceDirect
www.uk-osint.net
What Type Of Data Can You Get From Twitter? - BrightPlanet
Add data source – Findo
lockfale/OSINT-Framework: OSINT Framework
michenriksen (Michael Henriksen) / Starred
HackPad
Home - InformNapalm.org (English)
Hacked: classified data of Russian state defense procurement 2015-2016 - InformNapalm.org (English)
OSINT Training by Michael Bazzell
Beginners Guide to OSINT – Chapter 1 | The IT Geek Chronicles
OSINT Resources - The Grey Network
torrent-search free download - SourceForge
Raman Data Search and Storage download | SourceForge.net
Content Grabber Premium 1.14.35 + Patch MPT (download torrent) - TPB
Justin Seitz (@jms_dot_py) | Twitter
Visual Analysis
firefox | WebBreacher's Hacking and Hiking Blog
Terrorism and Counterterrorism: Comparing Theory and Practice - Universiteit Leiden | Coursera
learn:tools [CryptoParty.]
automating open source intelligence pdf - Google Search
osint tools 2016 - Google Search
open source intelligence techniques: resources for searching and analyzing online information - Google Search
osint tools - Google Search
Workshop: Open-Source Intelligence (OSINT) & Human Intelligence - Google Search
Welcome! | LinkedIn
Resource: OSINT tools and how you learn how to use them by Guurhart - process, business, resources on Peerlyst
OSINT TOOLS- Symbaloo Gallery
101E IRT - Toddington
Resources - Toddington
DATASETS OH MY!!!
Copy links to clipboard
Copy
Open
Conflict Tracking - Conflict, Peacekeeping & Reconstruction - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Conflict Tracking - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Conflict - Comparative Political Data - Gould Guides at Carleton College
Paul Hensel's Home Page
Internasjonale makrodata | NSD - Norsk senter for forskningsdata
Data
ahalterman (Andy Halterman)
Conflict & Ethnic Politics Data - Politics Resources Guide - LibGuides at Princeton University
VCDB VERIS Community Database
INSCRdata
International Military Intervention Data - 1946-2005
Paul Hensel's International Relations Data Site
All Guides | LibGuides
Polling the Nations
ICPSR
Political Media Sources - Politics Resources Guide - LibGuides at Princeton University
Home - Politics Resources Guide - LibGuides at Princeton University
Data Resources: Race, Ethnicity, Ethnic relations
DSS Data Subject Guides
Harvard Dataverse
Composition of Religious and Ethnic Groups: SID: Research: Cline Center for Democracy | Cline Center for Democracy | University of Illinois
GROWup - Geographical Research On War, Unified Platform
ETH - International Conflict Research - GeoEPR 2014
ETH - International Conflict Research - EPR 2014
ETH - International Conflict Research - Ethnic Power Relations (EPR) Dataset Family
ETH - International Conflict Research - Data
Paul Huth Dataverse
Data - Program on International Law and Armed Conflict - Research Guides at Harvard Library
INCORE: Conflict Data Service: Regional Internet Guides: Index
Data Services at Emory - Data Resources for Political Science - LibGuides at Emory University - Main Library (Woodruff)
Events Data - Data Resources for Political Science - LibGuides at Emory University - Main Library (Woodruff)
SPEED Project - Event Data and Examples | Cline Center for Democracy | University of Illinois
12-12
Copy links to clipboard
Copy
Open
OpenBionics: Affordable Prosthetics | Wilson Center
The Drone Center’s Weekly Roundup: 12/12/16 | Robohub
The Jihadi Threat: ISIS, Al Qaeda and Beyond | United States Institute of Peace
Web Resources - *Intelligence Studies | Program Guide - LibGuides at American Public University System
All Guides Alphabetically | LibGuides
Citizen Health Innovators Project | Wilson Center
Purchase AppleCare Products
Web Resources - *Weapons of Mass Destruction Preparedness | Program Guide - LibGuides at American Public University System
Web Resources - *Terrorism Studies | Program Guide - LibGuides at American Public University System
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
About | Meta Search
Drafts (2) - scitrenbaum@gmail.com - Gmail
Aili Malm - Google Scholar Citations
Rebecca Nash - Google Scholar Citations
A review of social network centric anomaly detection techniques: International Journal of Communication Networks and Distributed Systems: Vol 17, No 4
Semantic Sentiment Analysis in Arabic Social Media
Multimodal Sensing and Intelligent Fusion for Remote Dementia Care and Support
Opinion Dynamics in Social Networks through Mean-Field Games | SIAM Journal on Control and Optimization | Vol. 54, NO. 6 | Society for Industrial and Applied Mathematics
OSINT Investigations - Cybrary
Deseat.me Finds and Helps You Delete Random Accounts You've Signed Up For
Learn a New Lingo While Doing Something Else - Scientific American
Leading Addiction Organizations Respond to Surgeon General’s Landmark Report on Alcohol, Drugs and Health - Treatment Research Institute
ComputerCrimeInfo Blog » Blog Archive » The Complete Privacy & Security Podcast-Episode 008
Here's how to remove your Facebook search history - ThatsNonsense.com
The Atlantic Daily: Public Investigations - The Atlantic
5 terrorist attacks in 5 cities; Syria war heats up; Grappling with Russian hacking; Trump on China, IC, F-35; and just a bit more... - Defense One
The US Is Losing at Influence Warfare. Here’s Why - Defense One
Social Media Surveillance Now a Booming Business : Stephen E. Arnold @ Beyond Search
research guides terrorism - Google Search
Research Websites - Terrorism & the Law Research Guide - LibGuides at University of California, Hastings College of the Law
A Research Guide to Cases and Materials on Terrorism - GlobaLex
Terrorism - Security Studies - Research Guides at Georgia Institute of Technology
Home - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
The Jihadi Threat 5: Drivers of Extremism | Wilson Center
Web Resources - *Forensics | Program Guide - LibGuides at American Public University System
Intelligence Careers | Jobs in the U.S. Intelligence Community
Web Resources - *National Security Studies | Program Guide - LibGuides at American Public University System
Web Resources - *Middle Eastern Studies | Program Guide - LibGuides at American Public University System
Teaching | Alex Braithwaite
Works in progress | Alex Braithwaite
American Intelligence | Ipsa Scientia Potestas Est
Web Resources - INTL454 Forecasting Terrorism | Course Guide - LibGuides at American Public University System
greta's gouge: Friday's December 12-09-2016
Goal-Driven Deception Tactics Design - IEEE Xplore Document
Terrorist Attack Pre-incident Indicators (TAPI) - Dustin K. MacDonald - Intelligence Analysis and Training
Predictive Crime Mapping: Arbitrary Grids or Street Networks? | SpringerLink
Locating foreign aid commitments in response to political violence | SpringerLink
Erratum to: Locating foreign aid commitments in response to political violence | SpringerLink
Computational Social Networks - Springer
Pinboard bookmarklet for instant tagging
TidBITS 2016 Gratitude and Holiday Hiatus
ExtraBITS for 12 December 2016
whs.sagepub.com/content/early/2016/12/09/2165079916667736.full
What makes intelligence agencies tick? In search of a causal ... | Self-Publishing at GRIN
500 Internal Server Error
OneTab shared tabs
OneTab shared tabs
Beyond Self-Disclosure: Disclosure of Information about Others in Social Network Sites
A Hybrid Collaborative Filtering Model for Social Influence Prediction in Event-based Social Networks
Journal of King Saud University - Computer and Information Sciences - ScienceDirect.com
Is crime analysis at the heart of policing practice? A case study: Policing and Society: Vol 0, No 0
The Psychology of Foreign Fighters: Studies in Conflict & Terrorism: Vol 0, No 0
Certificate / Advanced Certificate in Terrorism Studies - About the Course Content - Informa plc
Wiley: The Handbook of the Criminology of Terrorism - Gary LaFree, Joshua D. Freilich
The Handbook of the Criminology of Terrorism - Google Books
Managing Public Safety Technology: Deploying Systems in Police, Courts ... - Jeffrey A. Rose, Donald C. Lacher - Google Books
Research | CCJS l Criminology and Criminal Justice Department l University of Maryland
Projects related to Crime Control and Prevention | CCJS l Criminology and Criminal Justice Department l University of Maryland
Projects related to Crime and Justice Decision-Making | CCJS l Criminology and Criminal Justice Department l University of Maryland
Publications related to Crime Control and Prevention | CCJS l Criminology and Criminal Justice Department l University of Maryland
Publications related to Crime and Justice Decision-Making | CCJS l Criminology and Criminal Justice Department l University of Maryland
How to advance a DIYBio lab beyond the basics. - Google Groups
CRIM 103 TEXTBOOB TERMS Flashcards | Quizlet
Terrorism and Homeland Security Chapter 2 Flashcards | Quizlet
Shane D Johnson - Google Scholar Citations
Alex Braithwaite - Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar
Google Scholar
Dugan: Measuring Terrorism - Google Scholar
Johnson: Spatial and Temporal Analysis of Terrorism... - Google Scholar
Sawyer: What Makes Them Do It? Individual‐Level... - Google Scholar
Rose: Managing Public Safety Technology: Deploying... - Google Scholar
Boyd: Group‐level Predictors of Political and Religious... - Google Scholar
Strom: Terrorist Plots the United States: What We... - Google Scholar
The Handbook of the Criminology of Terrorism - Google Scholar
Alex Braithwaite | School of Government & Public Policy
How do crises unfold on Twitter? Learning from the tragic events of #AnkaraAttack | The Social Simulator
Alex Braithwaite - Google Search
HoudahSpot - Google Search
Information Fusion: Intelligence Centers and Intelligence Analysis - Google Search
Spatial and Temporal Analysis of Terrorism and Insurgency - Google Search
The Etiology of Radicalization - Google Search
The Handbook of the Criminology of Terrorism - Google Search
The Terrorists' Planning Cycle: Patterns of Pre‐incident Behavior - Google Search
The Terrorists' Planning Cycle: Patterns of Pre‐incident Behavior - Google Search
What makes intelligence agencies tick? In search of a causal mechanism in CIA administrative behavior - Google Search
Conflict Hot Spots: Emergence, Causes and Consequences (Hardback) - Routledge
Vaultedge
AAAI Publications
OneTab shared tabs
Data Downloads | University of Denver
Daesh Daily - An Update On Daesh Activities
Secrecy News
KWSnet Annotated Subject Directory for the Web
Google Hacking Database, GHDB, Google Dorks
All files and folders - Box
DSpace@MIT: MIT Theses
Data Collections – ICB Project
Scraawl - Actionable Insights from Analytics
Private Security Monitor | Sie | Korbel | University of Denver
Nonviolent Strategies in Violent Settings | University of Denver
The Jihadi Threat: ISIS, Al Qaeda and Beyond | United States Institute of Peace
Newsbud Exclusive Report- A Distillation DOD Spending Spree for November 2016
Military Portal, augmenting the U.S. Air Force Portal and DoD portal, Army, Navy, Marine, National Guard portals
Air War College Gateway to the Internet
CRCnetBASE
CRCnetBASE - Effective Surveillance for Homeland Security
Charting a Course: Strategic Choices for a New Administration > Institute for National Strategic Studies > News
Case Study: Two Arrested in Iranian Aircraft Parts Trafficking Scheme, | Institute for Science and International Security
Interrogating an Engaged Excellence Approach to Research - Institute of Development Studies
CACI to Support JIDO’s Joint Force Intell Integration Mission; Ken Asbury Comments | ExecutiveBiz
How to Turn a USB Stick into an Ultra Portable PC
Most Popular Windows Downloads and Posts of 2016
Save Emails to PDF With This Chrome Extension
Next Episode - Track the TV shows you watch!
Inside the Able Archer 83 Nuclear War Game
U.S. Defense Department Chief Engineer: We Want Your Help With 2030's Tech - IEEE Spectrum
Wanted: In-flight Drone Charging, Itty-Bitty Spy Cams, and More - IEEE Spectrum
News You Can Use: 12/12/16 | Arthur D. Simons Center
Conflict Trends Reports | ACLED
A new report on ISIS is warning Trump from "taking the bait" - Business Insider
Copycat terrorists could use drone to attack plane, intelligence report warns | CP24.com
U.S. Army Special Operations Command Study: Legal Implications of the Status of Persons in Resistance | Public Intelligence
The life of a social engineer: Hacking the human – To Inform is to Influence
Remote Control Project Briefing - We Need to Talk About Yemen | Oxford Research Group
Remote Control Project
Information Overload | Pew Research Center
Small Arms Survey - The Ammunition Tracing Kit
Small Arms Survey - The Weapons ID Database
Technology | Mapping Militant Organizations
2016-17 Key Strategic Issues List
SSI Publications - Most Popular
All SSI Publications by Year/Date
The Strategy Portal at SSI
Lone Wolves: The Identities of Non-Affiliated Terrorists - The Washington Institute for Near East Policy
Data catalog - NASA
GitHub
GitHub - jivoi/awesome-osint: A curated list of amazingly awesome OSINT
Web Data Extraction Using Artificial Intelligence - Diffbot
Find Articles - Military Studies - Library Guides at Penn State University
GovCon Wire | Your Direct Source for Government Contracting News
KWSnet Military: Research Program/Papers/Studies Index
KWSnet Military Resources Index
KWSnet Military: Schools/War Colleges/Training Index
THEATRE GOSSIP #240 - Bootlegs and Dancebelts Edition
Seth Rudetsky - YouTube
Global Terrorism Database | Kaggle
Kernels | Kaggle
European Soccer Database | Kaggle
Broadway Loves Britney - YouTube
ARoamingIranian - YouTube
BBC Radio 1 - YouTube
Alzheimer's MRI deep learning | Kaggle
Getting Real about Fake News | Kaggle
Effectiveness of Police Social Media Use | SpringerLink
Information Fusion: Intelligence Centers and Intelligence Analysis - Springer
The Handbook of the Criminology of Terrorism - Google Books
Human Resources Analytics | Kaggle
The Handbook of the Criminology of Terrorism - Google Books
Do Good Borders Make Good Rebels? Territorial Control and Civilian Casualties: The Journal of Politics: Vol 0, No 0
Information Sharing at United States Central Command - Springer
Information Sharing in Military Operations - Springer
Risk-Averse Stochastic Path Detection
Starbucks Theater - YouTube
Theater Talk: “Falsettos” and “This Day Forward" - YouTube
Handbook of the Criminology of Terrorism - Google Search
Gary LaFree (@glafree) | Twitter
Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers - Gill - 2016 - Journal of Forensic Sciences - Wiley Online Library
Information Sharing at United States Central Command - Google Search
Downloads
Sunny dog - Creator's stamp
12-13 YIP YIP
Copy links to clipboard
Copy
Open
Must-have apps for your Mac | Setapp
CBRNE-Terrorism Newsletter
4K Download | Free and useful applications for PC, Mac and Linux
Timeline of events - deployment of terrorists visual analysis - Google Search
Downloads : Visual Analysis
Intelliscape
Free alternative to i2 | Army Rumour Service
GTD Data Rivers
Pinboard: public bookmarks for ttscoff
NotePlan: Lean Markdown Calendar, Todos and Notes on the Mac App Store
Exporter on the Mac App Store
Keyboard Maestro 7.3.1: Work Faster with Macros for Mac OS X
Login in to your Social Explorer account - Social Explorer
Pinboard: Network Search For scitrenb
TaskPaper Tutorials [Link]
Hog Bay Software – Medium
Macdrifter - Productivity
Automating expense reports - All this
Pinboard: public bookmarks for tamberg
Explaining Thunderbolt 3, USB-C, and Everything In Between
Simplenote
The Awkward Dongle Years
WGI 2016 Interactive > Home
A Javascript journey with only six characters
The Human Cost of Tech Debt - DaedTech
The Best Gmail Search Tricks
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
ExifTool by Phil Harvey
Open Journalism
Showcases
Lessons Learned as a VR Developer – Axiom Zen Team – Medium
Resources | ACAPS
Hans Rosling: The best stats you've ever seen | TED Talk | TED.com
Academic Torrents
Modified PubMed Dataset used by WSU-IR team at TREC 2015 Clinical Decision Support Track - Academic Torrents
Ike Skelton Combined Arms Research Library (CARL) Digital Library
U.S. Air Force Center for Strategy and Technology - key links, research center
The Lifehacker App Directory: Mac OS X
Nukes of Hazard Blog - Reducing the threats of war and nuclear weapons
DIYbiosphere
Winter School - BioDesign for the Real-World
10 essential Finder tips every Mac user should know
Global Incident Map Displaying Terrorist Acts, Suspicious Activity, and General Terrorism News
How to back up large files and collections off site | Macworld
How to swap in a new Time Capsule on your network | Macworld
Buying Guides, Tips, and How to Advice on the Apple universe
Google Photos tips and tricks | Macworld
MLSec Project
Search for a Dataset - Data.gov
DIYbiosphere
JeNeSuisPasDave/MarkdownTools: Markdown processing tools, including mdmerge
danielcassman/mappingmilitants: Dynamic interactive timelines and network diagrams that depict relationships among militant organizations. Our website is available at http://mappingmilitants.stanford.edu.
drdrang (Dr. Drang)
drdrang/te-url-snippets: A set of TextExpander snippets for getting and transforming the URLs of current browser pages.
gregorleban/EventRegistry: python package for accessing data in Event Registry
EventRegistry/EventRegistry/examples at master · gregorleban/EventRegistry
Home · gregorleban/EventRegistry Wiki
mlsecproject/combine: Tool to gather Threat Intelligence indicators from publicly available sources
Open Event Data Alliance
openeventdata/hackathon: Repository for the GDELT hackathon at PSU on September 28, 2013
Your Stars
Name Mangler · Many Tricks
Clean up Mac with a Set of Cleaner Apps
Papaly | Inbox
CBRNE-Terrorism Newsletter
CBRNE-Terrorism Newsletter
BJ Fogg's Website
The Invisible, Manipulative Power of Persuasive Technology
TextExpander Tools updated - BrettTerpstra.com
A couple of new TextExpander snippets - BrettTerpstra.com
Mass creating TextExpander snippets - BrettTerpstra.com
MMD QuickLook 1.2 with TextBundle support - BrettTerpstra.com
TextExpander - BrettTerpstra.com
The TextExpander subscription snafu - BrettTerpstra.com
MultiMarkdown Composer and CriticMarkup - BrettTerpstra.com
TabLinks 3.0 - BrettTerpstra.com
Marked 2.5.8 - BrettTerpstra.com
Archives - BrettTerpstra.com
Brett's Projects - BrettTerpstra.com
Pinboard to OpenMeta - BrettTerpstra.com
Posts Tagged “textexpander” - BrettTerpstra.com
TextExpander Packs by ccharlton
Save Time with Expert-Level TextExpander Snippets
Bear - Notes for iPhone, iPad and Mac
Browser extensions - Bear - Faq and support
Migrate from Evernote - Bear - Faq and support
Battelle Fielding 100 Drone Zappers to Pentagon, Homeland Security - Defensetech
How to Sort Notes Alphabetically on an iPhone | iPhoneLife.com
Bear Is an iPhone and Mac Notes App Simple Enough for To-Dos but Powerful Enough for Longer Writing | Life Hacker India
Contracts & Grants - Office of Naval Research
Review: Bear – slick new writing app for notes and prose - TapSmart
White Papers Archives - Zementis
The First 30 Minutes: Social Media for the First Responder (M0565)
JoshuaJones/TextExpander-Snippets: Collection of my TextExpander snippets used for daily coding and what-not.
carlinyuen/ChromeAutoTextExpander: Google Chrome Extension : Auto Text Expander - listens for keypresses on pages that support it and will auto-replace text as you type. Keywords: javascript jquery chrome text expander replacement.
ccharlton/TextExpander-Packs: TextExpander snippet packs for Sass/CSS, Git/SVN, Apache, PHP, SQL, Drush (Drupal), MySQL, Linux, Mac OS X
manikrathee/text-expander: My text expander libraries
Search · text expander
ttscoff (Brett Terpstra)
Bear - beautiful writing app for notes and prose on the App Store
PDF Viewer - Read, Review, and Annotate on the App Store
Workflow: Powerful Automation Made Simple on the App Store
Hackathon Playbook Part 1: How to Sponsor
Alfresco » Document Library
My library - Google Scholar
Traveling Up the Snippet Collection Path
Text Expander - Productivity App | TextExpander
TextExpander Help: Creating Snippets
Public Groups | TextExpander
Bear App (@BearNotesApp) | Twitter
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information: Michael Bazzell: 9781530508907: Amazon.com: Books
CBRNE-Terrorism Newsletter
A National Strategy for CBRNE Standards - Google Search
CBRN TRAINING CURRICULUM pdf - Google Search
Decontamination of CBRN Terror & Hazmat Incidents: Industry, Technologies - Google Search
Search Guidebook on Open Source Intelligence - Google Search
drone defender - Google Search
open source intelligence techniques pdf - Google Search
sort notes in bear app - Google Search
textexpander snippets - Google Search
Text Expander Snippets: Date and Time — MacSparky
Easier Conference Call Planning with TextExpander — MacSparky
Taking Better Meeting Notes with TextExpander — MacSparky
Bear notes for iPhone, iPad and Mac
18 tabs
Copy links to clipboard
Copy
Open
Academic Torrents
Hieu Bui - Home
Home - AllSource Analysis
LINE Official Stickers - My Husband Only: Pop-Up
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
phraseup* - find the right words
Datapages - Search and Discovery
Strategic Level Small Craft Combating Terrorism Course - Special Operations International
Presentations and Authors
Presentations and Authors
Presentations and Authors
AAAI Conference on Human Computation and Crowdsourcing
Presentations and Authors
International AAAI Conference on Web and Social Media
Presentations and Authors
Attorney's Information Forensics Handbook" - Google Search
65 tabs
Copy links to clipboard
Copy
Open
Auryn.bio - Auryn
Politics, Power, and Preventive Action » Red Team Reading List
System Dynamics Conference
ROCKET DOG
GeoSocial Footprint
Bear / Discussion Area - Shiny Frog Support
JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service | A clearinghouse for jihādī primary source material, original analysis, and translation service
A-Z Databases
A-Z Databases: Books/eBooks & Audio/eAudiobooks
Free eBooks & Audiobooks - Free eBooks, Audiobooks, & Multimedia Sources - Library at Joint Special Operations University
- Think Tank & Research Institute Search - Library at Joint Special Operations University
UW Articles - Unconventional Warfare (UW) - Library at Joint Special Operations University
- Home - Library at Joint Special Operations University
Army Knowledge Online - DOD Service Portals - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
NKO licensed content - DOD Service Portals - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
AKO licensed content - DOD Service Portals - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
This Week's Top Downloads
Top 10 Ways to Speed Up Old Technology
Maker Ed's Resource Library
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
The one million tweet map #onemilliontweetmap
snitch.name :: The Social White Pages
News You Can Use | Arthur D. Simons Center
Featured Article: The State Department: No Longer the Gatekeeper | Arthur D. Simons Center
Little Snitch 3.7.1
December News: Gray Zone conflicts explained; Global Terrorism Index released; CVE principles for local government
It's Alive! Introducing OSF Preprints
Fred Meyer
A Wiki of Social Media Monitoring Solutions
SWEET CHARITY Stars Headed to BROADWAY SESSIONS This Week
Project Templates in 2Do with Workflow — CGP Grey
DARPA Gamifying the Search for Strategic Surprise (GS3) Call for Submissions | Contract Research and Development
Download • Notebooks
Getting Started with Notebooks for Mac • Notebooks
OneTab shared tabs
See Lin-Manuel Miranda Narrate 'Drunk History' Hamilton Clip - Rolling Stone
Co-taught course brings new potential for Grad students | START.umd.edu
START data informs 2016 Global Terrorism Index | START.umd.edu
U.S. Strategic Command
Radicalisation and higher education: Students’ understanding and experiences: Terrorism and Political Violence: Vol 0, No 0
10 Minute Mail - Temporary E-Mail
Darius Dan - Dribbble
IntelCenter Database (ICD) Login
https://jsou.idm.oclc.org/login?url=http://www.ciaonet.org
Other Lists of Interest - Reading Lists - Library at Joint Special Operations University
- Research and Information Guides - Library at Joint Special Operations University
Gmail - SAFARI BOOKMARKS
Gmail - Instapaper
Building Projects in 2Do – nahumck.me
openFDA › Food › Adverse events API
OSF Preprints
Amazon Prime Now
Search is Back!
Get Notebooks for Mac and Windows
Darius Dan (@idariusdan) | Twitter
Connect your Dropbox accounts - Business user guide - Dropbox
RSS and Twitter feed to your inbox. Free real-time email updates for favorite blogs, feeds, and news delivered to your inbox
workflow app 2do - Google Search
Wonder Workshop | Home of Dash and Dot, robots that you can code
Meta Search - Product Hunt
Show Music for Show People
Newsletters Archive - Toddington
Cheat Sheets - Toddington
U.S. Naval War College | Documents
Zotero | Home
70 tabs
Copy links to clipboard
Copy
Open
snitch.name :: The Social White Pages
TextExpander Snippets, Examples and Tips | Basics of TextExpander
LibGuides Community
NOSI – Naval Open Source Intelligence™ | A digital library of operational naval news curated from open source intelligence, intended to serve as a source of continuing naval education by Michael P. D'Alessandro M.D.
Instya MultiSearch
LibGuides Community
Spezify - Visual Search & Inspiration
Data360 Homepage
TII Online Research and Intelligence Newsletter - December 2016
The WWW Virtual Library
StartPage Search Engine
Free Public Records Searches | Black Book Online
TII Online Research and Intelligence Newsletter - December 2016
PhotoTracker Lite / one-click search by image in Google, Yandex, Bing and TinEye.
Orbis directory | Free information on companies across the globe | BvD
ExoneraTor
Alfons Schmid, Author at Notebooks
Create Your Own Document Style • Notebooks
www.notebooksapp.com/Download/css/Syntax Highlighting.css
www.notebooksapp.com/Download/css/Handbook.css
Import • Notebooks
Global Terrorism Database (Worldwide Incident Tracking System) | Empirical Studies of Conflict
Free Online TEXT Tools
Data Tools
Hashtagify.me - Search And Find The Best Twitter Hashtags - Free
Findo
(12134) Inoreader - This Week's Top Downloads
33 New links for WorkflowHQ I found this week (49) on Twitter @BestWorkflows | Automation for iOS
Andy Orin
Setapp Is a Subscription-Based Mac App Store Packed With a Bunch of Popular Apps
XOWA Makes It Easy to Download Wikipedia for Offline Reading
Unfollow Everyone on Twitter With Just One Click
Twitter says no to law enforcement protest policing tool
Engadget | Technology News, Advice and Features
2016 National Drug Threat Assessment Summary
Office of Inadequate Security: Your info, their screw-ups.
Stay informed everywhere with Offline Folders | The Inoreader blog
Leaked Snowden document shows how SIGINT nabbed a... - Matthew Aid
About Rapid 7
GEOINT Beyond the Beltway
VGKG 2.0 Now Includes Full Tag Specifier With Group Family - GDELT Blog
The Most Useful Firefox Extensions Ever Made
ET deals roundup: Save big on laptops, TVs, and more - ExtremeTech
notebookapp mac promo code - Google Search
Notebook Coupons: Use Promo Codes or a Coupon Code for Discounts on Notebook
Quiver: The Programmer's Notebook on the Mac App Store
Printable Coupons, Grocery & Coupon Codes | Coupons.com
Evernote, OneNote, and Beyond: The 12 Best Note-Taking Apps
Best note taking apps for Mac: Evernote, Simplenote, NoteSuite, and more! | iMore
ISIS: A Revolutionary Group, Fighting a Textbook Insurgency | Small Wars Journal
Canvas, Episode 25: Workflow – Web APIs – MacStories
Canvas #22: Workflow - The Basics - Relay FM
Canvas #24: Workflow - Third Party Applications - Relay FM
Selection to Bear
ADVANCED QUANTUM THERMO-DYNAMICS IS NOT A GREAT TITLE FOR CLICKBAIT, BUT IT IS A GREAT TITLE TO LOOK LIKE A SMARTASS IN PUBLIC | SCQ
Tim Ferriss on How He Survived Suicidal Depression and His Tools for Warding Off the Darkness – Brain Pickings
calibre - About
[Device Plugin] iOS reader applications - MobileRead Forums
Inbox (1,291) - stczztop@gmail.com - Gmail
Whoisology - Billions of archived domain name whois records
Social Media Intelligence | Media Sonar
TextExpander Snippets — MacSparky
Paperless — MacSparky
TextExpander Tools - BrettTerpstra.com
Markdown snippets for TextExpander touch - BrettTerpstra.com
Filesystem navigation with TextExpander - BrettTerpstra.com
textexpander snippets library - Google Search
A Peek Inside My TextExpander Snippets | Jamie Todd Rubin
My top five TextExpander snippets | Macworld
A Comprehensive Guide to TextExpander
66 tabs
Copy links to clipboard
Copy
Open
Political Event Data Analysis PHOENIX - Google Search
RAYNET - The Radio Amateurs' Emergency Network | Main Website - Home page
lora zombie - Google Search
www.davidmasad.com/Research.html
Bhavani M. Thuraisingham - Publications
The State of the Art in the Production of Political Event Data | Dart-Throwing Chimp
Downtown Express Portland Airport Shuttle Schedule
Armed Conflict Location and Event Data Project - Wikipedia
IntelCenter Database (ICD)
IntelCenter: Specialized Data
IntelCenter: About
IntelCenter: Referral & Affiliate Programs
IntelCenter: ICD: Thank You
IntelCenter Subscription Store
The Social, Political and Economic Event Database Project (SPEED): Research: Cline Center for Democracy | Cline Center for Democracy | University of Illinois
GitHub - ahalterman/phoxy: R tools to download, ingest, and analyze the Phoenix dataset from the Open Event Data Alliance
Research on Dynamic Production Scheduling System Based on Multi-agent Technology - IEEE Xplore Document
Transmission Availability Data System (TADS) reporting and data analysis - IEEE Xplore Document
Review on text summarization evaluation methods - IEEE Xplore Document
Survey on diverse facets and research issues in social media mining - IEEE Xplore Document
Requirements Engineering for Health Data Analytics: Challenges and Possible Directions - IEEE Xplore Document
Automated Target Detection for Geophysical Applications - IEEE Xplore Document
Interactive Conflict Resolution: A Social-Psychological Approach to Resolving Violent Ethnopolitical Conflict - Springer
The Rise of Experimentation in Political Science - Emerging Trends in the Social and Behavioral Sciences: An Interdisciplinary, Searchable, and Linkable Resource - Rogowski - Wiley Online Library
Paper-Based Microfluidic Devices: Emerging Themes and Applications - Analytical Chemistry (ACS Publications)
Advancement of Paper-based Microfluidics for Diagnostics – the Original Motivation and Current status - ACS Sensors (ACS Publications)
Refugees welcome? A dataset on anti-refugee violence in Germany | Research & Politics
Capturing and Analyzing Social Media Composite Content: The Instagram Selfie : Consumer Culture Theory
CRCnetBASE - Chapter 5 Mining Misinformation in Social Media
Hybrid of Anomaly-Based and Specification-Based IDS for Internet of Things Using Unsupervised OPF Based on MapReduce Approach
Evaluation of Corporate Social Responsibility and Social Media as Key Source of Strategic Communication
Anatase TiO2 Activated by Gold Nanoparticles for Selective Hydrodeoxygenation of Guaiacol to Phenolics - ACS Catalysis (ACS Publications)
Peer to party: Occupy the law | Dulong de Rosnay | First Monday
Losing Mosul, Regenerating in Diyala: How the Islamic State Could Exploit Iraq’s Sectarian Tinderbox | Combating Terrorism Center at West Point
The Politically Motivated Reasoning Paradigm, Part 1: What Politically Motivated Reasoning Is and How to Measure It - Emerging Trends in the Social and Behavioral Sciences: An Interdisciplinary, Searchable, and Linkable Resource - Kahan - Wiley Online Library
When States Strike Back: Failures of Mediatized Activism in Azerbaijan and Turkey | Mehrabov | tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society
The Effect of Personal Factors on Social Media Usage of Young Consumers
ua 5697 - Google Search
Track Flight UA5697 / SKW5697 | Flight Data | Plane Finder
(UA) United Airlines 5697 Flight Status
Why Winning Politics Is Now Tied to Big Data Analytics
Political Analytics Conference 2016 | CAPS
2016 Schedule — Political Analytics 2017
Acleddata – Crisis – Data and Analysis of Africa's Political Crisis
Global Database of Events, Language, and Tone - Wikipedia
Spark-Based Political Event Coding - IEEE Xplore Document
Conflict Trends (no. 33): Real-time analysis of African political violence, January 2015 - World | ReliefWeb
Kickoff to Conflict: A Sequence Analysis of Intra-State Conflict-Preceding Event Structures
Time-To-Event Data Analysis | Columbia University Mailman School of Public Health
Home Feed
Political Science Data - Political Science - Research Guides at University of Michigan Library
Sensor of Attention to Politics - Springer
EASM 2015: International Workshop on Event Analytics using Social Media Data
Near Real-time Atrocity Event Coding by Mohiuddin Solaimani - Research Project on ResearchGate
SPAWAR Systems Center Atlantic - Google Search
Spark-Based Political Event Coding - Google Search
M. Solaimani - Google Scholar Citations
Spark-Based Political Event Coding — UT Dallas
Spark-Based Political Event Coding
Event Analytics using Social Media Data - Google Search
Event Analytics using Social Media Data - Google Scholar
Project Jupyter | Resources
jupyter military - Google Search
Updates (1) - stcdefg@gmail.com - Gmail
Countering Terrorism through Information and Privacy Protection Technologies
Saved Session - Session Buddy
12-09 Oh YES!
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
ToolDatabase < Dmi < digitalmethods.net
The Researching Librarian: Databases
The Researching Librarian: Useful Tools
SUNY WGIL / Annotated Bibliography of Full-Text Web-Based Articles Relating to Library Instruction
1Writer - A beautiful and rich-featured Markdown editor for iPhone and iPad
Convertjson.com - Convert JSON to other Formats and Vice-Versa
JSON To HTML Table Converter
Foreign Military Studies Office
Russ Haynal - Internet Instructor and Speaker
Internet Training
Specialized Search Tools
Determining the Source of a Web Page
Terrorist Use of Google Earth Raises Security Fears
The state of the global spy game: Graphic | National Post
Using Drafts, Reminders, and Slackbot as a task management system. – Greetings from the Grid
Sources And Methods: Interactive Map Of All Of The World's Intelligence Headquarters (Google Maps)
MacStories Weekly: Issue 58
MacStories Weekly: Issue 60
MacStories Weekly: Issue 59
Department of Homeland Security Surveillance Truck
ICC - The Arcs Network
AFIO - Guide to the Study of Intelligence
White Pages | People Finder - AnyWho
Culture Studies, Cultural Awareness, Cross-Cultural Communication, Competencies, Understanding, Competence
Extract Emails
Extract Phone Numbers
Extract URLs
United States Department of Defense
IACP Center for Social Media > Home
Google Hacking Mini-Guide | Basic Search Techniques
JINSA Online | Securing America, Strengthening Israel
Mefancy Text and html tools
Military Factory - Military Weapons - Aircraft, Tanks, Vehicles, Artillery, Navy Warships and Guns throughout history
International statistics: Compare countries on just about anything! NationMaster.com
www.publicspace.net/ABetterFinderRename/
Megabytes, Gigabytes, Terabytes - What Are They?
Action Step: iCloud Drive – Agile Tortoise
Club MacStories
List of intelligence gathering disciplines - Wikipedia
Portal:Free and open-source software - Wikipedia
Reconnaissance satellite - Wikipedia
crazy-canux/awesome-monitoring: INFRASTRUCTURE and OPERATION SYSTEM monitoring tools.
sindresorhus (Sindre Sorhus)
Zapier to PDF in DevonThinkPro - Tutorial
Custom Templates | iA
PDF Expert Brings Touch Bar Support and File Size Reduction – PDF Expert
Fusion Centers Map, Locations, Contact Information | Public Intelligence
FastScripts
WordSift.org
JSON to Text Converter - Transform JSON to Plain Text - Online - Browserling Web Developer Tools
Caucasus Analytical Digest - Google Search
D O C U A L E R T - Google Search
Link Analysis Tools/Software - Google Search
Researching Librarian’s Database Library. - Google Search
Russian Analytical Digest - Google Search
ImportGenius | International Trade Databases for Import-Export Businesses
With Launcher 2.0, I’m Rethinking My Notification Center Widgets – MacStories
All Resources - Site Guide - NCBI
lockfale/OSINT-Framework: OSINT Framework
HoudahSpot — Find Files by Name, Text, Date, Extension, etc.
Workflow Adds Bear Automation – MacStories
Copernic Desktop Search Alternatives for Mac OS X - AlternativeTo.net
GDELT Blog - The Official Blog of the Global Database of Events, Language, and Tone (GDELT) Project! www.gdeltproject.org
Caerus Associates
Need Authorities for the Gray Zone > Center for Complex Operations > PRISM 6.3
CiteSeerX — Active Bibliography: Detecting and Forecasting Domestic Political Crises: A Graph-based Approach
Today's Best Deals: Fizzics, Camping Gear, Gift Ideas, and More
Human vs. Automated Text Analysis
Computational Event Data System
Beginner's Guide
Links
Papers: General Political Behavior
Papers: Forecasting
Papers: KEDS-Based Research
eventdata.psu.edu
An overview of forecasting for politics, conflict, and political violence - Less Wrong
Global Homeland Security & Public Safety Markets - 2017-2022
To Stay Relevant, Newsrooms Rethink Campaign Coverage - Nieman Reports
Permanent anonymous email address | NotSharingMy.Info
Open Event Data Alliance
The Role of School Principals in Shaping Children’s Values
SBP-BRiMS 2016
Growing pains for global monitoring of societal events | Science
del.icio.us tag search {trainque.com}
Mosul Offensive - uMap
December News: Gray Zone conflicts explained; Global Terrorism Index released; CVE principles for local government
MacStories Weekly: Issue 60
Useless Press: World Leader Tips
Main Page - visone user support
Home | CivicApps.org
DARPA Causal Exploration of Complex Operational Environments Proposer’s Day | Contract Research and Development
Generational Dynamics - MIT's System Dynamics applied to historical generations
Harsch Executive Team: Susanne Orton, VP, Mktg. & Communications
4 Easy Ways To Find Out Who Is Looking For You Online
Study: Using Big Data to monitor societal events shows promise, but the coding tech needs work | NULab for texts, maps and networks | Northeastern University
OneTab shared tabs
ICOW Territorial Claims Data
An investigation of dependence in expert judgement studies with multiple experts
Improving Situational Awareness for Humanitarian Logistics Through Pr…
STATEWATCH - monitoring the state and civil liberties in Europe
Framing Life and Death on YouTube: The Strategic Communication of Organ Donation Messages by Organ Procurement Organizations: Journal of Health Communication: Vol 20, No 2
Big data can’t bring objectivity to a subjective world | Techlear
www.techradar.com/deals/compare?model_name=Apple MacBook Pro 15" (2015)&origin=news
William & Mary - Theresa Whelan
Newsletter Archive – Club MacStories
Polity | Dart-Throwing Chimp
Apple equivalent of Copernic | Official Apple Support Communities
best desktop search | Official Apple Support Communities
Insight Maker | Free Simulation and Modeling in your Browser
Dig for the facts - Investigative Dashboard
Sign in to Investigative Dashboard - Investigative Dashboard
Intellectual Property Rights (IPR) search - cbp.gov
Jeff McKaughan - issuu
Military Training International Oct/Nov 2016 by Jeff McKaughan - issuu
Special Operations International October 2016 by Jeff McKaughan - issuu
JSON to CSV
Fred Meyer - Digital Coupons
Fred Meyer - Digital Coupons
Project Open Data Dashboard
Department of Homeland Security - Project Open Data Dashboard
Department of Homeland Security - Project Open Data Dashboard
Home | openNASA
GDELT and ICEWS, a short comparison | Predictive Heuristics
Political Parties, the Eurozone Crisis, and ICEWS Data | Predictive Heuristics
Predictive Heuristics | Blog by Ward Lab @ Duke U.
Project Open Data - Project Open Data
Slash Data Catalog Requirements - Project Open Data
Metadata Resources for Schema v1.1 - Project Open Data
Who Controls America?
(32) @stczzop/Alerts on Twitter
Resistance Dynamics and Social Movement Theory Conditions, Mechanisms, and Effects | Doowan Lee - Academia.edu
Online Store
Data.gov
Center for Data Innovation
Center for Data Innovation » computational social science
Center for Data Innovation » social network analysis
Immigration Data & Statistics | Homeland Security
DHS Apps | Homeland Security
Find Web Tools and Apps | Homeland Security
Data | Homeland Security
Dropbox Terms of Service and Privacy Policy updates - Dropbox Help - Dropbox
Personal - Dropbox
dtSearch – Text Retrieval / Full Text Search Engine
dtSearch - Sales Questions / Download Requests
dtSearch Product Line Features - dtSearch Desktop / Network
dtSearch Product Line Features - dtSearch Publish
Treat abstract
Integrated Conflict Early Warning System | Wiki | 📖 Everipedia, the encyclopedia of everything
Data Feeds | FEMA.gov
OpenFEMA (32) | FEMA.gov
OpenFEMA | FEMA.gov
Strategic communication and behavioral coupling in asymmetric joint action
Has anyone found a 'content search' app for Mac that works like Copernic Desktop in Windows? - Quora
Patrick Brandt - Publications
Philip A. Schrodt - Publications
Causal Exploration Proposers' Day
Review: Bear notes app for Mac - SlashGear
Main Conference Day 2 | Special Operations Summit Coronado
Immigration and Citizenship Data | USCIS
13 tabs
Copy links to clipboard
Copy
Open
The Open Event Data Alliance Software Page
Philip A. Schrodt - Google Scholar Citations
Gizem Korkmaz - Google Scholar Citations
Google Scholar Citations
Beieler: Generating Political Event Data in Near Real Time - Google Scholar
Brandt: Evaluating forecasts of political conflict dynamics - Google Scholar
Schrodt: Event data in forecasting models: Where... - Google Scholar
Schrodt: 2 Event type, sub-state actor, and temporal... - Google Scholar
Ramakrishnan: 'Beating the news' with EMBERS: forecasting... - Google Scholar
strategic communication women - Google Scholar
Wilson: An Investigation of Dependence in Expert... - Google Scholar
Schrodt: Automated production of high-volume, real-time... - Google Scholar
Google Scholar - Alerts for scitrenbaum@gmail.com
19 tabs
Copy links to clipboard
Copy
Open
Copernic mac - Google Search
Detecting and forecasting domestic political crises: a graph-based approach - Google Search
DHS Digital Government Public Data Catalog - Google Search
GDELT ICEWS competitor - Google Search
gdelt icews competitors - Google Search
gdelt vs icews vs eventregistry - Google Search
gdelt vs icews vs eventregistry - Google Search
Interesting Social Media Datasets - Google Search
macbook pro 2015 15 inch - Google Search
Mining and Analyzing Social Media - Google Search
Multi-source models for civil unrest forecasting - Google Search
Multimedia Knowledge and Social Media Analytics Laboratory - Google Search
nalyzing International Event Data: A Handbook of Computer-Based Techniques - Google Search
Predictive Analytics Machine Learning Lab Handout - Google Search
strategic communication - Google Search
The Israeli Conflict System: Analytic Approaches - Google Books
Computational Social Science - R. Michael Alvarez - Google Books
Pitch, Tweet, or Engage on the Street: How to Practice Global Public ... - Kara Alaimo - Google Books
Peace and Conflict 2016 - Google Books
8 tabs
Copy links to clipboard
Copy
Open
YouTube
Live at Feinstein's/54 Below - YouTube
Lauren Molina - YouTube
SiriusXM - YouTube
triple j - YouTube
Hairspray Live! - Big Blonde & Beautiful - YouTube
Hairspray Live! - Full Show - YouTube
Madonna Carpool Karaoke - YouTube
GITHUB
Copy links to clipboard
Copy
Open
alulsh/DC-Tech-Women-And-NB-Websites: Personal and portfolio websites of women and non-binary people in the DC Tech community.
carpedm20 (Taehoon Kim) / Repositories
engineerapart/TheRemoteFreelancer: Listing of community-curated resources to find topical remote freelance & contract work for software developers, web designers, and more!
GCHQ
hugo53/awesome-RemoteWork: Resources for remote workers: approaches, hiring page, remote life and more.
jivoi (EK_) / Starred
jivoi (EK_) / Following
jwasham/google-interview-university: A complete daily plan for studying to become a Google software engineer.
kimberli/interviews: CS interview study sheet
kostistsaprailis/non-tech-books-for-developers: A list of non-tech books crowdsourced by the Hacker News community.
navdeeshahuja/Facebook-Phishing-Page: A phishing site for facebook
open-guides/og-aws: 📙 Amazon Web Services — a practical guide
raganwald (Reg Braithwaite)
rmusser01 (Robert)
rmusser01 (Robert) / Repositories
sindresorhus (Sindre Sorhus) / Starred
techgaun/github-dorks: Collection of github dorks and helper tool to automate the process of checking dorks
trapexit (Antonio SJ Musumeci) / Repositories
PAPERS to DOWNLOAD Et. Al.
Copy links to clipboard
Copy
Open
Advanced Analytic Techniques
ICIS 2016 Proceedings | International Conference on Information Systems (ICIS) | Association for Information Systems
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Understanding Moderators of Peer Influence for Engineering Viral Marketing Seeding Simulations and Strategies
Human-Computer Interaction | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Empirical Evaluation of Automated Sentiment Analysis as a Decision Aid
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Predicting Medication Prescription Rankings with Medication Relation Network
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Self-determination theory as an explaining mechanism for the effects of patient’s social media use
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: UR SMART: Social Media Analysis Research Toolkit
Social Media and Digital Collaboration | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Momentum in Social Media and Offline Car Sales after Automobile Recalls
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: How Far We Can Go: A Model of Online Activism, Enabling Dynamics, and Social Change
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Analysis of Executive Reputation in Social Media Networks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Social Connectedness and Leadership in Online Communities
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Reputation, User Feedback, and Perceived Information Quality in Social Internet Media: An Empirical Study
International Conference on Information Systems (ICIS) | Association for Information Systems Research | AIS Electronic Library (AISeL)
Social Media and Their Affordances for Organizing: A Review and Agenda for Research | Academy of Management Annals
Today’s Apps Gone Free: Escape from the Pyramid, Translator Widget, Nighty Night and More
CiteSeerX — EVOLVABLE SIMULATIONS APPLIED TO AUTOMATED RED TEAMING: A PRELIMINARY STUDY
Exploring tensions in knowledge networks: Convergences and divergences from social capital, actor-network theory and sociologies of the south
dblp: Karl Granström
dblp: Hossam S. Hassanein
dblp: Sharief M. A. Oteafy
dblp: Fanchao Zeng
"The Non-Economic Functions of Insurgent Taxation: Evidence from the Is" by Mara Revkin
domingo mery :: Material
domingo mery :: Publications
Identifying Human Capital Externality: Evidence from China
Social media and prediction: crime sensing, Data integration and statistical modelling. Using the Collaborative Online Social Media Observatory (COSMOS) to link police incident, Census 2011 and Twitter data - NCRM EPrints Repository
Welcome to the NCRM EPrints Repository - NCRM EPrints Repository
ProQuest Document View - Homo informaticus intelligens: Building a theory of intelligence analysts as information foragers
DOD/IC Problems - Stanford H4D - Spring 2016
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
A computational intelligence decision-support environment for architectural and building design: CIDEA - IEEE Xplore Document
Social Media account linkage using user-generated geo-location data - IEEE Xplore Document
Multisensor data fusion for an autonomous ground vehicle - IEEE Xplore Document
Distributed secondary control for isolated microgrids under malicious attacks - IEEE Xplore Document
Games on Large Networks: Information and Complexity. - IEEE Xplore Document
Frame-based analysis of knee extension exercises using a smartphone accelerometer - IEEE Xplore Document
Smartphone-based transport mode detection for elderly care - IEEE Xplore Document
Smartphone based automatic abnormality detection of kidney in ultrasound images - IEEE Xplore Document
Email communications analysis: how to use computational intelligence methods and tools? - IEEE Xplore Document
Predicting the Future with Social Media - IEEE Xplore Document
Automated modeling and analysis of agent-based simulations using the CASE framework - IEEE Xplore Document
Visual investigation of similarities in Global Terrorism Database by means of synthetic social networks - IEEE Xplore Document
A tool-target based approach for simulating a terrorist attack - IEEE Xplore Document
On the Design of a System for Airport Protection against Terrorist Attacks Using MANPADs - IEEE Xplore Document
Susceptibility to URL-based Internet attacks: Facebook vs. email - IEEE Xplore Document
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications - IEEE Xplore Document
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis - IEEE Xplore Document
Tiered Data Integration for Mobile Health Systems - IEEE Xplore Document
Detectability prediction of hidden Markov models with cluttered observation sequences - IEEE Xplore Document
The economic costs of natural disasters, terrorist attacks, and other calamities: An analysis of economic models that quantify the losses caused by disruptions - IEEE Xplore Document
GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits - IEEE Xplore Document
Toward Predicting Susceptibility to Phishing Victimization on Facebook - IEEE Xplore Document
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
IEEE Xplore Full-Text PDF:
IEEE Xplore Full-Text PDF:
IEEE Xplore: IET Microwaves, Antennas & Propagation - (Current Issue)
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
Resources | 2017 Index of U.S. Military Strength
Download the 2017 Index | 2017 Index of U.S. Military Strength
iniwall.com
Publications - Institute for Security and Development Policy
An open letter to Mr. Secretary general of the united nations to propose setting up global standards for conquering growth limits of capitalism | Journal of Open Innovation: Technology, Market, and Complexity | Full Text
Smartphone-based arrhythmia monitoring. : Current Opinion in Cardiology
PLOS ONE: Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya
Library | kno.e.sis
Library | kno.e.sis
Knowledge Enabled Approach to Predict the Location of Twitter Users | kno.e.sis
Amit Sheth: Educator, Researcher, Entrepreneur
Amit Sheth: Educator, Researcher, Entrepreneur
Amit Sheth: Educator, Researcher, Entrepreneur
Library | kno.e.sis
Library | kno.e.sis
Library | kno.e.sis
A Hybrid Approach to Finding Relevant Social Media Content for Complex Domain Specific Information Needs | kno.e.sis
An Information Filtering and Management Model for Twitter Traffic to Assist Crises Response Coordination | kno.e.sis
Project Descriptions | kno.e.sis
Portland State University Library
The Best Cyber Monday Deals Available Right Now
Hierarchical abnormal event detection by real time and semi-real time multi-tasking video surveillance system | SpringerLink
A personal knowledge management metamodel based on semantic analysis and social information | SpringerLink
A survey of event detection techniques in online social networks | SpringerLink
Computational Red Teaming - Springer
Asymptotic Analysis for Functional Stochastic Differential Equations - Springer
Multi-agent and Complex Systems - Springer
Online Social Networks Event Detection: A Survey - Springer
Semantic Complex Event Processing for Decision Support - Springer
Which Centrality Metric for Which Terrorist Network Topology? - Springer
Deep Bi-directional Long Short-Term Memory Neural Networks for Sentiment Analysis of Social Data - Springer
An Evidential Method for Multi-relational Link Prediction in Uncertain Social Networks - Springer
Relative Neighborhood Graphs Uncover the Dynamics of Social Media Engagement - Springer
Instagram Use, Loneliness, and Social Comparison Orientation: Interact and Browse on Social Media, But Don't Compare | Abstract
Mapping the Impact of Social Media for Innovation: The Role of Social Media in Explaining Innovation Performance in the PDMA Comparative Performance Assessment Study - Roberts - 2016 - Journal of Product Innovation Management - Wiley Online Library
Application of the U - He chronometer to the analysis of nuclear forensic materials - Analytical Chemistry (ACS Publications)
A Qualitative Analysis on Facilitating... - 교보문고 스콜라
The Costs of War with Iran: An Intelligence Preparation of the Battlefield | Small Wars Journal
The Dilemma of Defense Innovation and Adaptation (Part II) | Small Wars Journal
Giving meaning to tweets in emergency situations: a semantic approach for filtering and visualizing social data | SpringerPlus | Full Text
Publications | Complexica
Army Systems Adaptive Red Team /Technical Support and Operational Analysis (ART/TSOA) RFI | Contract Research and Development
ONR Complex Event Recognition from Open Source Social Media Award | Contract Research and Development
CounterStrikeMedia - CounterStrikeTV Home
Perceptual Computing and the Human Experience - DATAVERSITY
List of Publications of T. Kirubarajan (Kiruba)
What Does Donald Trump's Victory Mean for Asia?
Watch Out for Terror's First Incubators - by Husain Haqqani
Proceedings of the International Conference on Interdisciplinary Studies (ICIS 2016) - Interdisciplinarity and Creativity in the Knowledge Society | InTechOpen
isayeret.com | The Israeli Special Forces Database
www.isvg.org
JMIR-Review of Extracting Information From the Social Web for Health Personalization | Fernandez-Luque | Journal of Medical Internet Research
Big Data and Data Science for Security and Fraud Detection
Sensors | Free Full-Text | Analysis of Android Device-Based Solutions for Fall Detection
Sensors | Free Full-Text | Multi-Target Tracking Based on Multi-Bernoulli Filter with Amplitude for Unknown Clutter Rate
Sensors | Free Full-Text | BlueDetect: An iBeacon-Enabled Scheme for Accurate and Energy-Efficient Indoor-Outdoor Detection and Seamless Location-Based Service
Sensors | Free Full-Text | myBlackBox: Blackbox Mobile Cloud Systems for Personalized Unusual Event Detection
Sensors | Free Full-Text | Full On-Device Stay Points Detection in Smartphones for Location-Based Mobile Applications
Axioms | Free Full-Text | Summary of Data Farming | HTML
Resources | Free Full-Text | System Dynamics Modeling for Agricultural and Natural Resource Management Issues: Review of Some Past Cases and Forecasting Future Roles | HTML
Physical Sensors - A section of Sensors
Sensor Networks - A section of Sensors
www.mdpi.com/journal/sensors/special_issues/algorithms_mobile_sensing
Sensors | Special Issue : Data in the IoT: from Sensing to Meaning
Big Data Helping to Pinpoint Terrorist Activities, Attacks (UPDATED)
Resources
Physica A: Statistical Mechanics and its Applications | Articles in Press | ScienceDirect.com
NFD: Non-Technical Loss Fraud Detection in Smart Grid
Explaining Donald Trump via communication style: Grandiosity, informality, and dynamism
How the government’s punishment and individual’s sensitivity affect the rumor spreading in online social networks
Agent based simulation on the process of human flesh search—From perspective of knowledge and emotion
A social media text analytics framework for double-loop learning for citizen-centric public services: A case study of a local government Facebook use
A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks
Game Theoretic Path Selection to Support Security in Device-to-Device Communications
Using Product Variables of Business- to-Business (B2B) Media to Assess the Impacts of Social Media
kurt godel - Wolfram|Alpha
BioMedical Engineering OnLine | Home page
Iranian and Hezbollah Hybrid Warfare Activities: A Small Wars Journal Anthology - Dave Dilegge, Rubert J. Bunker, Alma Keshavarz - Google Books
Perspectives on Culture and Agent-based Simulations: Integrating Cultures - Google Books
Datafloq - How Big Data is Aiding in the Fight Against Terrorism
DSpace@MIT: Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition
Defence Science and Technology Laboratory - Wikipedia
NOT-OD-17-015: NIH Request for Information (RFI) on Strategies for NIH Data Management, Sharing, and Citation
Counter-Terrorism Strategic Communications (CTSC) | ICCT
Lighting the Path: the Evolution of the Islamic State Media Enterprise (2003-2016) | ICCT
Publications | ICCT
Welcome - ICIS 2016
Knowledge Discovery Laboratory - UMass Amherst
"Google Scholar" (52) - scitrenbaum@gmail.com - Gmail
O'Reilly Discounts Every eBook By 50% - Slashdot
Alfresco » Document Library
SSRN Electronic Library
cognitive | Public Intelligence
smartcard | Public Intelligence
surrender | Public Intelligence
DHS Geospatial Concept of Operations (GeoCONOPS) Version 6 | Public Intelligence
How to Conduct Psychological Operations | Public Intelligence
Joint Chiefs of Staff Guide Offers Blunt Assessment of Afghan National Police | Public Intelligence
(U//FOUO) Joint Center for International Security Force Assistance Guide: Roles and Functions of Senior Advisors | Public Intelligence
Joint Operating Environment 2035: The Joint Force in a Contested and Disordered World | Public Intelligence
DHS NCCIC Report on the Art of Social Engineering | Public Intelligence
Joint Staff Strategic Multi-Layer Assessment on Bio-Psycho-Social Applications to Cognitive Engagement | Public Intelligence
Joint Staff Strategic Assessment: Counter-Da’esh Influence Operations Cognitive Space Narrative Simulation Insights | Public Intelligence
Cultural Intelligence | Public Intelligence
Joint Chiefs of Staff | Public Intelligence
U.K. Ministry of Defence Future Operating Environment 2035 | Public Intelligence
U.S. Army Special Operations Command Presentation: Concept for Cognitive Joint Force Entry | Public Intelligence
Amit Sheth - Google Scholar Citations
Mahinthan Chandramohan - Google Scholar Citations
Malcolm Yoke Hean Low - Google Scholar Citations
Alessandro Farinelli - Google Scholar Citations
Erik Blasch - Google Scholar Citations
Jesus Cerquides - Google Scholar Citations
Mervat Abu-Elkheir - Google Scholar Citations
Google Scholar Citations
Granström: Asymmetric Threat Modeling Using HMMs:... - Google Scholar
Karthika: A comparative study of social networking... - Google Scholar
Resnik: SCALABLE MULTIDIMENSIONAL RESPONSE MEASUREMENT... - Google Scholar
Granström: Asymmetric Threat Modeling Using HMMs:... - Google Scholar
Detectability prediction of hidden Markov models with cluttered observation sequences. - Google Scholar
Choudhary: A Survey on Social Network Analysis for... - Google Scholar
Campbell: Social network analysis with content and graphs - Google Scholar
Yang: Covert nodes mining in social networks based... - Google Scholar
Baldwin: Simulation Approaches for System of Systems:... - Google Scholar
Sirois: Potential and limits of numerical modelling... - Google Scholar
rakunde - TPB
Russian Influence Operations – Damn, They Suck – To Inform is to Influence
Fragile and Conflict-Affected Situations | Asian Development Bank
Open Source Software | The Ames Laboratory
CEEOL - Article Detail
Center for a New American Security
A--Award - - Federal Business Opportunities: Opportunities
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis - Google Search
Automated Detection of Threat Objects Using Adapted Implicit Shape Model - Google Search
Big Data for Remote Sensing: Challenges and Opportunities - Google Search
Civil Unrest Event Data - Google Search
Complex Event Recognition from Open Source Social Media - Google Search
complex event processing open source - Google Search
defense and technology laboratory - Google Search
Detectability prediction of hidden Markov models with cluttered observation sequences - Google Search
eva nozableeda - Google Search
evolving optimal and diversified military operational plans for computational red teaming - Google Search
Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition - Google Search
Multitasking intelligent surveillance and first response system - Google Search
Potential uses of Numerical Simulation for the Modelling of Civil Conflict - Google Search
Predicting Medication Prescription Rankings with Medication Relation Network - Google Search
Real time big data analytics for predicting terrorist incidents - Google Search
Red teaming with - Google Search
rox- imity, an open-source software environment developed by the Knowledge Discovery Laboratory - Google Search
Tracking Small UAVs Using a Bernoulli Filter - Google Search
Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks - Google Search
VACCINE ANNUAL REPORT Visual analytics - Google Search
Defence Science and Technology Laboratory - GOV.UK
Working for Dstl - Defence Science and Technology Laboratory - GOV.UK
IEEE - 2016 International Conference in Information Science (ICIS)
Review of extracting information from the Social Web for health personalization. - PubMed - NCBI
How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX. - PubMed - NCBI
Crowdsourcing, citizen sensing and sensor web technologies for public and environmental health surveillance and crisis management: trends, OGC stan... - PubMed - NCBI
A survey of online activity recognition using mobile phones. - PubMed - NCBI
Giving meaning to tweets in emergency situations: a semantic approach for filtering and visualizing social data. - PubMed - NCBI
OSA | Optical Fiber Spectrometer based on Smartphone Platform for Refractive Index Sensing Application
Amit Sheth
Amit Sheth - Publications
Aryya Gangopadhyay - Publications
Branko Ristic - Publications
Lyudmila Mihaylova - Publications
Mei-Po Kwan - Publications
Bernoulli Particle/Box-Particle Filters for Detection and Tracking in the Presence of Triple Measurement Uncertainty
State estimation and fault detection using box particle filtering with stochastic measurements
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis
Ismailcem Budak Arpinar - ResearchGate
Amadou Gning - ResearchGate
A co-evolutionary approach for military operational analysis - Semantic Scholar
A co-evolutionary approach for military operational analysis - Semantic Scholar
Automated modeling and analysis of agent-based simulations using the CASE framework - Semantic Scholar
ACE Framework - Semantic Scholar
Home | SRI International
38 tabs
Copy links to clipboard
Copy
Open
New Tab
Advanced Analytic Techniques
ICIS 2016 Proceedings | International Conference on Information Systems (ICIS) | Association for Information Systems
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Understanding Moderators of Peer Influence for Engineering Viral Marketing Seeding Simulations and Strategies
Human-Computer Interaction | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Empirical Evaluation of Automated Sentiment Analysis as a Decision Aid
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Predicting Medication Prescription Rankings with Medication Relation Network
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Self-determination theory as an explaining mechanism for the effects of patient’s social media use
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: UR SMART: Social Media Analysis Research Toolkit
Social Media and Digital Collaboration | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Momentum in Social Media and Offline Car Sales after Automobile Recalls
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: How Far We Can Go: A Model of Online Activism, Enabling Dynamics, and Social Change
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Analysis of Executive Reputation in Social Media Networks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Social Connectedness and Leadership in Online Communities
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Reputation, User Feedback, and Perceived Information Quality in Social Internet Media: An Empirical Study
International Conference on Information Systems (ICIS) | Association for Information Systems Research | AIS Electronic Library (AISeL)
Social Media and Their Affordances for Organizing: A Review and Agenda for Research | Academy of Management Annals
Today’s Apps Gone Free: Escape from the Pyramid, Translator Widget, Nighty Night and More
CiteSeerX — EVOLVABLE SIMULATIONS APPLIED TO AUTOMATED RED TEAMING: A PRELIMINARY STUDY
Exploring tensions in knowledge networks: Convergences and divergences from social capital, actor-network theory and sociologies of the south
dblp: Karl Granström
dblp: Hossam S. Hassanein
dblp: Sharief M. A. Oteafy
dblp: Fanchao Zeng
"The Non-Economic Functions of Insurgent Taxation: Evidence from the Is" by Mara Revkin
domingo mery :: Material
domingo mery :: Publications
Identifying Human Capital Externality: Evidence from China
管理科学学报(英文)
Social media and prediction: crime sensing, Data integration and statistical modelling. Using the Collaborative Online Social Media Observatory (COSMOS) to link police incident, Census 2011 and Twitter data - NCRM EPrints Repository
Welcome to the NCRM EPrints Repository - NCRM EPrints Repository
ProQuest Document View - Homo informaticus intelligens: Building a theory of intelligence analysts as information foragers
DOD/IC Problems - Stanford H4D - Spring 2016
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
A computational intelligence decision-support environment for architectural and building design: CIDEA - IEEE Xplore Document
Social Media account linkage using user-generated geo-location data - IEEE Xplore Document
Multisensor data fusion for an autonomous ground vehicle
12-05 Tiny OneTabs to Love & Cherish
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
21 tabs
Copy links to clipboard
Copy
Open
New Tab
Remove Duplicate Lines and sort
findo app cyber monday - Google Search
Why Is The FBI Reaching Out To Student Bioengineers? | Motherboard
factors that influence decision making war cognitive - Google Search
Combating Terrorism Center at West Point
Meet the machines that steal your phone’s data | Ars Technica
Here's a Picture of a Phone-Tracking Device That We've Never Seen in the Wild | Motherboard
Australian terrorist Neil Prakash may have been tracked by social media posts
Stingray Tracking Devices: Who's Got Them? | American Civil Liberties Union
Modeling Adversary Beliefs and Motivations - Google Search
How US Dollars Are Helping The Philippines' Bloody Drug War - BuzzFeed News
How US Dollars Are Helping The Philippines' Bloody Drug War - BuzzFeed News
Site Suspended - This site has stepped out for a bit
2015 ICWSM Workshop - Google Search
Tweets by Auburn OSINT (@auburnosint) – Twitter
Mission Plan Recognition: - Google Search
Predictive Analysis for Social Processes - Google Search
SCUBA: An agent-based ontology creation and alignment method for socio-cultural modeling - Google Search
ESSoS Doctoral Symposium - Google Search
Model Interoperation - Google Search
12-04
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Portland Weekly Deals In Stores Now : Target Weekly Ad
Elite U.S. Special Operators Build Center for Perpetual War on Terror - The Daily Beast
Sandia National Laboratories: National Security Missions: International Homeland and Nuclear Security: WMD Counterterrorism & Response
OSTI, US Dept of Energy Office of Scientific and Technical Information | Speeding access to science information from DOE and Beyond
On the Homefront – the HSDL Blog – Homeland Security Digital Library
Intelligence: news and discussion about Intelligence and espionage matters around the world
Eurachem Guides
Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
Personal - Dropbox
Detecting online investigations | michenriksen.com
Information Warfare - The RMA Debate
Nanobionic spinach plants can detect explosives | MIT News
Guide to Football/Soccer data and APIs - Joe Kampschmidt's Code
Tech Transfer | NASA
1000 Life hacks
Save 10% on Target Gift Cards, Today Only
Sunday's Best Deals: All-Clad, Winter Clothes, Despicable Me, and More
This $30 Drone Is a Great Christmas Gift For Those Who Want To Take to The Skies
World’s First Explosive Detection Drone Unveiled at Israel’s HLS & Cyber Event | Defense Update:
Can ‘Mad Dog’ Mattis Temper the Impulsive President-Elect? | Foreign Policy
New audio message from Jabhat Fataḥ al-Shām: “Unquestionably, The Help Of God Is Near” | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
mdwardlab.com
How 3D-Printed Dog Noses Can Improve Bomb Detectors | Motherboard
NIJ Publication Detail
NIJ Publication Detail
mediacenter | Countering Drones
Frank Kendall on the NDAA and the End of AT&L
Standard operating procedure | The Economist
Is Your iPhone 6s Eligible For A Free Battery Replacement? Here's How To Find Out
Breakthrough Prize program awards $25 million
GIS and Agent-Based Modeling: New Paper: Close, But Not Close Enough
GIS and Agent-Based Modeling: International Congress on Agent Computing
How Trump’s Government Could Change America’s Approach to Terrorism - Defense - GovExec.com
Growing Egypt-Syria Rapprochement Includes Al-Sisi Statement In Support Of Syrian Army, Reports On Egyptian Military Aid To Syria | MEMRI - The Middle East Media Research Institute
www.memri.org/rss.xml
Biomimetic Sniffing Improves the Detection Performance of a 3D Printed Nose of a Dog and a Commercial Trace Vapor Detector : Scientific Reports
U.S. building a network to hit militants - US news - Security | NBC News
DHS Wants New Facial Recognition Cameras in Airports - Nextgov.com
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
National Security | Georgia Tech Research
Sandia National Laboratories: Publications
Sandia National Laboratories: Irina (Kalashnikova) Tezaur: Technical Reports
Sculpting Evolution
Data and Tools | START.umd.edu
The Trench | Remembering where science, industry and military art converged; Challenging entrenched opinions
Publications | Center for Cyber & Homeland Security | The George Washington University
National Security Operations Center - Wikipedia
Underground Tradecraft : The Diaries Of a CIA Operative - The Washington...
How the Trump Campaign Built an Identity Database and Used Facebook Ads to Win the Election – Startup Grind – Medium
The NSA’s Spy Hub in New York, Hidden in Plain Sight
TinkerTool: Description
Center for Homeland Defense and Security – The Nation's Homeland Security Educator
Taquechel, Lewis extend work on quantifying deterrence, incorporate cognitive biases – Center for Homeland Defense and Security
Daily Open Source Infrastructure Report | Homeland Security
Personal - Dropbox
Terminology in Analytical Measurement
Bombs that can recognise their targets are back in fashion - Google Search
sandia reports - Google Search
Volume XII Archives - HOMELAND SECURITY AFFAIRS
HSDL Search Results
Artificial dog noses make explosives detectors more effective
Dare to share? | Research Information
U.S. Military Preps for Gene Drives Run Amok - Scientific American
Soft intelligence is important too: Silobreaker
Predicting the Future: Anticipating Security Events with Data Analytics | The Cipher Brief
12-04 9:13pm - Session Buddy
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
12-03
Copy links to clipboard
Copy
Open
terrorism | H-Net
TOC | H-Net
Welcome to Muir S. Fairchild Research Information Home Page
START Annual Meeting 2016: Quick-Fire Presentation - Counterterrorism, Countering Violent Extremism, Deradicalization | START.umd.edu
Comparing Failed, Foiled, Completed and Successful Terrorist Attacks | START.umd.edu
Micro and Nano Technologies [Updated at 2016.12.03] (download torrent) - TPB
Forensics & Criminal Justice from CRC Press - Page 1
Gamifying the Search for Strategic Surprise
Technology takes over flight of attacking drones -- Defense Systems
Crack Open A New Book--Any Book--With Amazon's $5 off $15 Sale
Air Force counters ISIS explosive-laden drone attacks -- Defense Systems
Designing Agile Human-Machine Teams
The Pentagon Wants Eye-Reading Software, X-Ray Tools, and A Virtual Facebook to Fight Terrorism - Defense One
The CTTSO | CTTSO
7090 - Combating Terrorism Technical Support Office (CTTSO) APBI
12-01
Copy links to clipboard
Copy
Open
Defence Research Reports
Paul K Davis - Google Scholar Citations
AAAI Sponsored Workshops—AAAI-17
Conflict and Security Issues | The National Academies Press
Computational Social Science Institute – UMass Amherst – Home
FUZZ-IEEE 2017, Naples, Italy
These Wearables Detect Health Issues Before They Happen
The Problem of Islamic Terrorism in Kenya in Terms of Regional Security in East Africa | START.umd.edu
Hitting a Moving Target: A Strategic Tool for Analyzing Terrorist Threats | START.umd.edu
Best Online Backup Providers of 2016
November News: Far-right terrorist recruitment & radicalization; Law enforcement homicides committed by extremists; FARC and the failed peace process
Home · FlowingMedia/TimeFlow Wiki · GitHub
Who is Winning the Syrian Digital War? - Harvard - Belfer Center for Science and International Affairs
Research data spring | Jisc
Social Media Lab | "Making sense of a networked world"
The Curious Wavefunction: Leroy Hood and the tool-driven revolution in biology
DHS and DNDO SBIR Pre-solicitation for FY17 Topics | Contract Research and Development
ARL NS-CTA Blog
Who is winning the Syrian digital war?
bellingcat - Inghimasi – The Secret ISIS Tactic Designed for the Digital Age - bellingcat
Davis: Simple Models to explore Deterrence and more... - Google Scholar
Goodman: Operations Odyssey Dawn and Unified Protector:... - Google Scholar
Elephants in Afghanistan: The Military’s Counterinsurgency Failure
Shtetl-Optimized » Blog Archive » Quantum computing news (98% Trump-free)
IDF Brig. Gen. Nechemya Sokal Speaks at MWI Event on Subterranean Warfare and Emerging Technologies - Modern War Institute
Syncthing
Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
Dark Web News | Ultimate Deep Web & Dark Net Resource
Online Coupons 2016, Discount Code | OnlineCouponIsland
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
TRADOC G-2 Mad Scientist - APAN Community
Which election forecast was the most accurate? Or rather: The least wrong? - The Washington Post
Public Support for Terrorism (PSOT) program - Google Search
Hitting a Moving Target: A Strategic Tool for Analyzing Terrorist Threats. - PubMed - NCBI
dblp: computer science bibliography
Thesis and Dissertation Collection
behavioral influences analysis and assessment modeling and simulation tools and research
Welcome to Jongeun's homepage.
RTO-MP-HFM-202
Search Results :
Peace Research Institute Oslo (PRIO)
LRA Crisis Tracker
Search Results : Human Modelling for Military Application
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East - IEEE Xplore Document
The analytical study of terrorism
Ptolemy Project Home Page
Publications - SA Technologies
Defence Research and Development Canada | Publications
Defence Research and Development Canada | Research Centres
Disposable electrochemical paper-based devices fully fabricated by screen-printing technique
Cyber Monday Deals : Cyber Monday 2016 : Target
An Overview of Geographical Perspectives and Approaches in Terrorism Research | Bahgat | Perspectives on Terrorism
Soft Targets and Crisis Management: - Google Scholar
Crime and Intelligence Analysis: An Integrated Real-Time Approach - CRC Press Book
Soft Targets and Crisis Management: What Emergency Planners and Security Professionals Need to Know - CRC Press Book
Fred Meyer
Data-driven system identification of the social network dynamics in online postings of an extremist group - Google Search
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East - Google Search
Intelligence Studies Products - Routledge
RTO-MP-HFM-202
11-29 PM
Copy links to clipboard
Copy
Open
AQAP: Publishing New Inspire Guides
DARPA Agile Teams (A-Teams) Proposers Day | Contract Research and Development
Associations for Citizen Science: Regional Knowledge, Global Collaboration
Code Words » Conflict | A Society of Professional Journalists Blog
[1611.09441] Sentiment Analysis for Twitter : Going Beyond Tweet Text
[1611.09387] There is Something Beyond the Twitter Network
[1611.09405] An End-to-End Architecture for Keyword Spotting and Voice Activity Detection
Obama Extends Global Reach of US Special Operations Death Squads | Global Research - Centre for Research on Globalization
Counter-External Operations Task Force - Google Search
Inspire Guides - Google Search
Director of Intelligence Proposed Research Topics - Google Search
Intelligence > Leaders > DIRINT > Research Topics
Inferring Adversary Intent & Estimating Behavior - Google Search
CAESAR III - Inferring Adversary Intent & Estimating Behavior
Santos Jr: A cognitive architecture for adversary... - Google Scholar
Santos Jr: A cognitive architecture for adversary... - Google Scholar
Group Decision and Negotiation 2014 GDN 2014: Proceedings of the Joint ... - Google Books
NikiPink - TPB
Tova (@stczzop) | Twitter
Kashana (@kashanacauley) | Twitter
@stczzop/Theater on Twitter
The 5 Best Moments From Lin-Manuel Miranda’s Drunk History Episode | Playbill
STAGE TUBE: Lin-Manuel Miranda and Dwayne Johnson Join Forces for MILLENIALS- Watch the Full Musical!
SOC Fundamentals for Your Threat Intelligence Program
Dimitri Bertsekas Homepage
Open Knowledge Maps - A visual interface to the world's scientific knowledge
Jürgen Pfeffer - Google Search
Under Secretary of Defense for Policy > OUSDP Offices > ASD for Special Operations/Low-Intensity Conflict
Amazon.com: Up to 60% Off Pajamas & More: Clothing, Shoes & Jewelry
Amazon.com: Seagate Expansion 8TB Desktop External Hard Drive USB 3.0 (STEB8000100): Computers & Accessories
Openlv by tvidas
Amazon.com: Deal of the Day: Up to 50% Off Men's and Women's Slippers: Clothing, Shoes & Jewelry
The 50 Free Apps We're Most Thankful For
Enhanced Interrogation: CIA Psychologist’s Book Defends The Program | GOSINT
List of Covert Affairs episodes - Wikipedia
Enhanced Interrogation: Inside the Minds and Motives of the Islamic Terrorists Trying To Destroy America: James E. Mitchell Ph.D., Bill Harlow: 9781101906842: Amazon.com: Books
The Robot Revolution Comes to Synthetic Biology - IEEE Spectrum
Open Knowledge Maps - A visual interface to the world's scientific knowledge
32% Off on Microsoft Surface 3 32GB Tablet | Groupon Goods
DGSI Lacks Big Data Mining Tools, Turns to PALANTIR For Help | GOSINT
Shop Women's Shoes by Rocket Dog + Free Ground Shipping! - Rocket Dog
Tools for Would-Be Biohackers: Here Come 3 Mini-Labs - IEEE Spectrum
Hiroven - TPB
Jane the Virgin Recap: The Nun Who Knew Too Much -- Vulture
DARPA group will promote best practices for using robots to make satellite repairs in space - GeekWire
Air Force launches Defense Technology Accelerator -- FCW
Publications
About the Department of Defense - DoD 101
36 tabs
Copy links to clipboard
Copy
Open
ICCCF 2016 Programme – APATAS
Welcome to Jongeun's homepage.
Birdwatcher: Data analysis and OSINT framework for Twitter | michenriksen.com
Design for Intelligence Analysis: Understanding Users, User Tasks, and Tool Usage
II Projects Page
Prosecutors in Portland Change Policy on Drug Convictions - ProPublica
iOS 10.1.1 Is Draining iPhone Batteries | News & Opinion | PCMag.com
One by One, ISIS Social Media Experts Are Killed as Result of F.B.I. Program - The New York Times
Author Page for test :: SSRN
Tablets, PCs and Office — Benedict Evans
The Biological Warfare Blog: Black Six: Scientific Flight from Syrian to Lebanon
Charles River Analytics-Led Team to Develop Automated Cyber Attack Prediction System for IARPA | ExecutiveBiz
Electrospaces.net: Data sharing systems used within the Five Eyes partnership
15 Books to Make You the Ultimate Spy – Johnny Lists
A Project Management Guide to Deploying Biometrics: The Basics
A Project Management Guide to Deploying Biometrics: Technical Aspects
this. | Car Wars
BAE Systems Wants To Defeat Jammers With Thinking Machines | Popular Science
The Mathematical Movie Database
Initial Reactions in Iran to the Election of Donald Trump as President of the United States Dr. Raz Zimmt
[1611.06737] OSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
Algorithms for Sensor Systems: 7th International Symposium on Algorithms for ... - Google Books
DoD hacking effort extended to Army -- Defense Systems
Next-Generation Electronic Warfare Development Targets Fully Adaptive Threat Response Technology | Georgia Tech Research Institute
The Little-Known Arms Race Threatening to Blow Up the South Caucasus
About P5 - Totalförsvarets forskningsinstitut
Free Innovation by Eric A. von Hippel :: SSRN
US Government Wants You to Hack US Military and Pentagon for Good
CYBER MONDAY
Copy links to clipboard
Copy
Open
Shop Women's Shoes by Rocket Dog + Free Ground Shipping! - Rocket Dog
#MacStoriesDeals Black Friday & Cyber Monday 2016: The Best Deals for iOS and Mac Apps & Games – MacStories
Student Discount | Perks of Student Life | UNiDAYS
Amazon Prime Now: Samsung T3 Portable SSD - 500GB - USB 3.1 External SSD (MU-PT500B/AM): Computers & Accessories
Amazon Prime Now
Cyber Monday Deals : Cyber Monday 2016 : Target
Soccer T-shirts – Ultras
Product Hunt Cyber Monday - Product Hunt
Shopping Bag - Shopping Bag
Zappos.com Shopping Cart
Ultras 30% Off Sale Cyber Monday
EXPRESS
Womens Tanks & Camis
Deal Center at Office Depot
Deals - Kinja Deals
Amazon.com: 30% off Cyber Monday Deals Week: Clothing, Shoes & Jewelry
adidas Cyber Monday | adidas US
Cyber Monday 2016 | ThinkGeek
Cyber Monday Deals : Cyber Monday 2016 : Target
home deals : Target
Electronics Deals : Target
TVs : Target
Bedding : Target
Furniture Store : Target
Furniture Store : Target
Furniture Store : Target
home office furniture : Target
furniture collections : Target
lounge seating, furniture : Target
pets : Target
Amazon's Cyber Monday Acer Sale Includes a 1080p Chromebook and a $90 IPS Display
Amazon.com: Kindle Deal of the Day
Clearance | Nordstrom Rack
ALL the LITTLE OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Kill the newsletter!
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
START HERE
Copy links to clipboard
Copy
Open
SBIRS Satellite Provide ‘Unblinking Eyes’, Constantly Monitoring Hotspots Worldwide | Defense Update:
How to Support a Partner Struggling with Depression
Visualising Twitter Dynamics in Gephi, Part 1 | Mapping Online Publics
ISIS Social Media Analysis of twitter news outlets following @Th3j35t3r Tango-Downs ~ Matteo Flora
Newsroom Tools
The Drone Center Weekly Roundup: 11/7/16 | Robohub
FAA, Industry Partners Announce 'Pathfinder' Drone Research | Aerospace News: Aviation International News
U.S. Agencies Support Counter-Drone Technology Efforts | Aerospace News: Aviation International News
Unmanned Aerial Vehicles News | Aviation International News
The Kill List: ICWatch Uses LinkedIn Account Info to Out Officials Who Aided Assassination Program | Democracy Now!
IWS Link Directory
What We Know About ISIS's Scratch-built Drones | Popular Science
A Visual Introduction to Machine Learning
IS turns to tunnels in last stand for Iraqi town
Civil Society, Peace, and Power | START.umd.edu
Publications | START.umd.edu
Civilian Unmanned Airborne Systems - Threats an Opportunities - Think Defence
Counter-UAV System from Airbus Defence and Space protects large installations and events from illicit intrusion
Countering drones via radio frequency -- GCN
Pinboard: bookmarks for scitrenb tagged 'stem/steam'
Import your notes and files to the Notes app - Apple Support
Researchers Hack Philips Hue Smart Bulbs Using a Drone - Slashdot
(5) Kelsey D. Atherton (@AthertonKD) | Twitter
Joan Soley on Twitter: "Made by #Daesh, downed by #Iraq SpecF in eastern #Mosul #MosulOffensive @BBCWorld @CJTFOIR https://t.co/3wv2YVH4aA"
JΞSTΞR ✪ ΔCTUAL³³º¹ on Twitter: "This visualization shows the location of certain industrial control (SCADA/PLC) systems exposed on the Internet >> https://t.co/K42hoe610G"
All Source Intelligence
Visualizing @th3j35t3r - Google Search
cartoon girl curly hair - Google Search | journaling | Pinterest
How The Jester Uses Web Intelligence
2016 | New technology using radar can identify materials and objects in real time | University of St Andrews
Peter Thiel explains why his company’s defense contracts could lead to less war - The Washington Post
TOOLS
Copy links to clipboard
Copy
Open
Send Anonymous Emails, Free Anonymous Email, Send Anonymous Emails with attactment, Anonymous Email Attached Files, Email Anonymous - Home
OSINT Search Tool by Michael Bazzell | Open Source Intelligence Techniques
TII Online Research and Intelligence Newsletter - August 2016
GPS Visualizer: Quick Geocoder
Location-based Search | Echosec
Privacy Training by Michael Bazzell
site:flickr.com "serial" "YB0043334" - Google Search
Opt-out of Nuwber
The Operational-Security Newsletter by Justin Carroll
SocialSeeking - Social Search Engine
IRC Networks
NARA - AAD - Main Page
Privacy-Training Blog » Blog Archive » Episode 002-The Complete Privacy & Security Podcast
WiGLE: Wireless Network Mapping
The Wolfram Language Image Identification Project
Privacy-Training Blog » Blog Archive » The Complete Privacy & Security Podcast-Episode 003
TweetMap ALPHA
Open Source Intelligence Techniques by Michael Bazzell
Free State Criminal Background Check and Convicted Felon Tracking » Felon Search
Free Sex Offender Registry | Local Sex Predators | Family Watchdog
Hiding from the Internet by Michael Bazzell
OSINT Training by Michael Bazzell
The Complete Privacy & Security Desk Reference by Michael Bazzell
OSINT Training by Michael Bazzell
SHOPPING
Copy links to clipboard
Copy
Open
64% Off on Adjustable Desk Stands | Groupon Goods
Sit-and-Ride Inflatable Seat with Vibrating Dong | Groupon
Lindo Bookcase with Pull-Out Doors | Groupon
Baxton Studio Lindo Dark Brown Wood Bookcase with Two Pulled-out Doors Shelving Cabinet - Deals, Reviews & Prices - 17529014
Muk Luks Bianca and Santina Women's Zip-Up Boots | Groupon
Pet-Food Bins and Scoops (3-piece) | Groupon
Outdoor Tactical Waist Pack | Groupon
Lindo Wood Bookcase with Two Pulled-out Doors Shelving Cabinet - Dark Brown - Baxton Studio : Target
Baxton Studio Lindo Dark Brown Wood Bookcase with One Pulled-out Door Shelving Cabinet - Deals, Reviews & Prices - 17616319
Wholesale Interiors Baxton Studio with 2-Pulled Out Doors 38" Standard Bookcase | Wayfair
NO PITY ORIGINALS – No Pity Originals
AmazonSmile: Tile Slim - Phone Finder. Wallet Finder. Item Finder - 1-Pack: Cell Phones & Accessories
Howard Leight by Honeywell Impact Sport Sound Amplification Electronic Earmuff, Classic Green (R-01526) - Hunting Earmuffs - Amazon.com
Today's Best Deals: Amazon Echo, Sweaters, Electric Shavers, and More
9 tabs
Copy links to clipboard
Copy
Open
Anna Cattish - Masters of Anatomy
GitHub - caesar0301/awesome-public-datasets: An awesome list of high-quality open datasets in public domains (on-going).
Scio Pocket Molecular Scanner Is a Google-like Device for Physical Objects | TIME
How The NSA Uses Social Network Analysis To Map Terrorist Networks | Digital Tonto
GitHub - sindresorhus/awesome: Curated list of awesome lists
idea generating related to a MIT news article - Google Groups
IntelCenter: Subscriptions
My Conversation with Peter Thiel about Apartheid… And its Unfolding Aftermath – Thoughts And Ideas – Medium
Science on a shoestring: getting results despite budget cuts | Dean Burnett | Science | The Guardian
6 tabs
Copy links to clipboard
Copy
Open
BigMusicalFan - YouTube
Broadway Lover - YouTube
Newsies - YouTube
newsies variety show - YouTube
Newsies On Tour - Inside Rehearsal - YouTube
The Newsboys Variety Show 11/6/16 - YouTube
NATO
Copy links to clipboard
Copy
Open
OneTab shared tabs
RTO-MP-SAS-071
RTO-MP-SAS-071
STO-MP-HFM-249
RTO-MP-002-V1
STO-MP-AVT-241
STO-MP-IST-123 - All Documents
Search Results : Analytical Support to Tactical Development"
Search Results : Analytical Support to Tactical Development"
STO-TR-SET-189 - Google Search
SET-189 Battlefield Acoustic Sensing, Multi-modal Sensing and Networked Sensing for ISR Applications
STO Technical Reports - STO-TR-SET-189
10.14339/STO-TR-SET-189 - Google Search
Start Here
Copy links to clipboard
Copy
Open
cell biology 3d model printing - Google Search
Social Network Diffusion | CySIS
Home Page of Shanchieh Jay Yang
Publications - ErikBlasch
Erik Blasch - Publications
Sensors | Special Issue : Topology Control in Emerging Sensor Networks
NIMBioS: Diffusion in Social Networks | CySIS
Publications | CySIS
Presentations and Authors
TATP– unusual way of preparation, something to be aware of - Google Search
TATP: Countering the Mother of Satan | TFOT
3D PRINT
Copy links to clipboard
Copy
Open
TRIANGL3D's 3D Printing Hub | Raleigh | 27606 | 3D Hubs
Marco's 3D Printing Hub | Bielefeld | | 3D Hubs
BioHack Academy · GitHub
papaly
Attensa - Intelligent Information Management
Animal Cell 3D Model Download - 3D CAD Browser
3D models tagged cell - Sketchfab
Poliovirus by Crystal Proteins - 3D model - Sketchfab
AAV9 virus vector by microscape - 3D model - Sketchfab
Free Cell Science-medical 3D Models | Get free 3d Science-medical model, download MAX OBJ FBX C4D files | CGTrader.com
3D Models and Textures | TurboSquid.com
CrystalProtein.com
3ds max microbes micro organisms
3ds max organic e coli
microbiology virus 3d model
microscopic cells 3d model
3D Models, Download 3D Models at TurboSquid
About Us - Sketchfab
anatocell on Sketchfab - Sketchfab
1RVA complexed with DNA by Crystal Proteins - 3D model - Sketchfab
Weapons 3D models | Categories - Sketchfab
Search "virus" — Sketchfab
Plant cell 3D Models | Download 3D Plant cell files | CGTrader.com
Science / Medical 3D Models | Download 3D Science / Medical files | CGTrader.com
download 3d models of cells - Google Search
Miniature to Massive - YouTube
Things tagged with 'Cell' - Thingiverse
Topics - 3D-Printing In Education - Groups - Thingiverse
State of synbio publishing | PLOS Synthetic Biology Community
Virus Hunter: Monitoring Nipah Virus in Bat Populations | HHMI BioInteractive
3DPrintAProtein by tzarembinski - Shapeways Shops
Maker/DIY - Shapeways Tech
BioInteractive Search Results | HHMI BioInteractive
Virus Explorer | HHMI BioInteractive
Discover 3D Models | NIH 3D Print Exchange
BioInteractive Search Results | HHMI BioInteractive
NASA
3D Printed Ebola Virus — Target or Talisman? | 3DPrint.com
My Drive - Google Drive
Inbox (497) - scitrenbaum@gmail.com - Gmail
send t0 BRIGGS Virus Hunter: Monitoring Nipah Virus in Bat Populations | HHMI BioInteractive - scitrenbaum@gmail.com - Gmail
Infectious Disease | HHMI BioInteractive
Inbox (260) - sara.citrenbaum@pcc.edu - Portland Community College Mail
Home | MyPCC
Micro 3D Print Models | Download 3D Micro files - CGTrader.com
3ds file extension - Google Search
3DPrintAProtein - Google Search
Saved Session - Session Buddy
PLOS ONE: Virtual Reconstruction and Three-Dimensional Printing of Blood Cells as a Tool in Cell Biology Education
PLOS Collections: Article collections published by the Public Library of Science
Accessible bioprinting: adaptation of a low-cost 3D-printer for precise cell placement and stem cell differentiation - IOPscience
PLOS ONE: DNA Assembly in 3D Printed Fluidics
Make a Gel Electrophoresis Power Supply | Make:
PLOS ONE: LudusScope: Accessible Interactive Smartphone Microscopy for Life-Science Education
PLOS Collections: Article collections published by the Public Library of Science
PLOS ONE: Portable, Battery-Operated, Low-Cost, Bright Field and Fluorescence Microscope
3D Models | HHMI BioInteractive
"biology" 3D Models to Print - yeggi
Biology 3D Models | Download 3D Biology files | CGTrader.com
Share | NIH 3D Print Exchange
Three Dimensional Structure of the Epstein-Barr Virus Capsid. | NIH 3D Print Exchange
NIH 3D Print Exchange | A collection of biomedical 3D printable files and 3D printing resources supported by the National Institutes of Health (NIH)
Electron cryo-microscopy of T7 bacteriophage tail after DNA ejection | NIH 3D Print Exchange
Cryo-EM structure of Dengue virus serotype 1 complexed with Fab fragments of human antibody 1F4 | NIH 3D Print Exchange
Electron cryo-microscopy of nanobody AB6 in complex with poliovirus P1/Mahoney | NIH 3D Print Exchange
VHH complexes with poliovirus: cryo-electron microscopy studies at near-atomic resolution | NIH 3D Print Exchange
bacteriophage | NIH 3D Print Exchange
mature virion | NIH 3D Print Exchange
poliovirus | NIH 3D Print Exchange
Discover 3D Models | NIH 3D Print Exchange
Share Model - Bacteria, Cell, Tissue, Organism | NIH 3D Print Exchange
Share Model - Custom Labware | NIH 3D Print Exchange
Share Model - Proteins, Macromolecules, Viruses | NIH 3D Print Exchange
Bio3D Technologies - Printing & Shaping the Future
3D printing: Cell Biology and Beyond! - ASCB
Animal and Plant Cell Construction Kit by mfritz - Thingiverse
"animal cell" 3D Models to Print - yeggi
"plant cell" 3D Models to Print - yeggi
Miniature to Massive: 3D Printed Cells, Viruses and Parasites Demystify Microbiology | 3DPrint.com
Biologic Models
3d biology models to make - Google Search
3d printing models cells - Google Search
virus 3d model free - Google Search
10 tabs
Copy links to clipboard
Copy
Open
HoudahSpot — Find Files by Name, Text, Date, Extension, etc.
Hey-Siri.io
Links to biotechnology, pharmaceutical & medical device companies in the Northwest
hackathon-isid-org
Fast Company | Business + Innovation
AT&T Trade-in
Dropbox Tags - Cloudfind
Jihad Intel
iPhone 7 With Trade-in Offer - Wireless Support
How Email to 2Do Has Improved My Daily Email Workflow – MacStories
SCIENCE GEEK
Copy links to clipboard
Copy
Open
www.spacecamp.com
F.W.Bell Series 620 Gaussmeter | eBay
FW Bell 610 gaussmeter
FW Bell 620RZP gaussmeter (no probe) | eBay
FW Bell 610 gaussmeter | eBay
Boonton Electronics - MODEL 71A Capacitance/Inductance Meter | eBay
Boonton Electronics 71A | eBay
Boonton Electronics - MODEL 71A Capacitance/Inductance Meter | eBay
FW Bell 610 Gaussmeter
FW Bell Gaussmeter 610 | eBay
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 | eBay
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 • CAD 301.00 - PicClick CA
HP 8640B Signal Generator Agilent - Partially Working OPT 001,002,003 • CAD 535.11 - PicClick CA
Hp 8640B Singnal Generator • CAD 334.38 - PicClick CA
HP Agilent 8640B Signal Generator Options 001 003 • CAD 535.11 - PicClick CA
Choosing an RF Signal Generator
Hewlett-Packard 8640B Signal Generator
HP Signal Sources
Portland Resources for Dorks | DorkbotPDX
SCIENCE HOBBYIST: Top Page
Science Experiments, Amateur Science demonstrations, projects: SCIENCE HOBBYIST
ELECTRONICS HOBBYIST
Infrared Goggles for $10, inexpensive IR filters, SCIENCE HOBBYIST
ELECTRONICS HOBBYIST: NEWSGROUPS
SCIENCE HOBBYIST: Ideas, additions
Electronics surplus and science catalogs list, outlet stores and surplus supply websites
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics Surplus: services and non-surplus mail order catalogs
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
OPTICS, Surplus Electronics and list of science catalogs [SITE: SCIENCE HOBBYIST]
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.