Light theme
Dark theme
Automatic (use operating system setting)
Shared: 1,501 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
1,501 tabs
Copy links to clipboard
Copy
Open
osintframework.com
Defense and Security Studies | Open Access Articles | Digital Commons Network™
Journal of Strategic Security | Vol 9 | No. 1
Technosocial Predictive Analytics
AAAI Digital Library Conference Proceedings
"TERRORISM IN PAKISTAN: INCIDENT PATTERNS, TERRORISTS’ CHARACTERISTICS," by Syed Ejaz Hussain
Defence Science Journal , Volume 66, Issue 2 | Directory of Open Access Journals
Procon Ltd. Information & Security: An International Journal
Journal of Defense Resources Management, Volume 6, Issue 2 | Directory of Open Access Journals
Military and Strategic Affairs, Volume 7, Issue 1 | Directory of Open Access Journals
I&S 12: Advances in Modeling and Simulation | Procon Ltd. Information & Security: An International Journal
Journal of Military and Information Science
Counterterrorism and Open Source Intelligence - Google Search
Consortium for Mathematical and Computational Methods in Counterterrorism :: Literature
OSINT Training by Michael Bazzell
Counterterrorism and Open Source Intelligence | Uffe Wiil | Springer
Interdiction of Plots with Multiple Operatives - Springer
dblp: Counterterrorism and Open Source Intelligence
IEDs in the dark web: Lexicon expansion and genre classification — University of Arizona
IEEE Xplore Abstract - IEDs in the dark web: Lexicon expansion and genre classification
SBP: Social Computing, Behavioral-Cultural Modeling and Prediction
BRiMS 2015 | 24th Conference on Behavior Representation in Modeling and Simulation
UZH - Institut für Betriebswirtschaftslehre - UZH Business Working Paper Series
OS X: Everything you need to use Smart Folders | Computerworld
Change Finder Search to Look In Current Folder Rather Than Everywhere in Mac OS X
Counter-terrorism | TRENDS
Simulation of ethnic conflicts | Open Agent Based Modeling Consortium
Political Participation | Open Agent Based Modeling Consortium
Frequently Asked Questions | Open Agent Based Modeling Consortium
Modeling Platforms | Open Agent Based Modeling Consortium
ACS Aims and Scope (World Scientific)
Academics - Michael Barton
Bruce Edmonds
Centre for Policy Modelling
Centre for Policy Modelling Discussion Papers
arXiv.org Search
Ctr Policy Modelling (@cfpm_org) | Twitter
Policy Practice and Digital Science - Integrating Complex | Marijn Janssen | Springer
Welcome to OpenABM & CoMSES Net | Open Agent Based Modeling Consortium
A Research Network for Computational Modeling in the Socioecological Sciences - Research - Julie Ann Wrigley Global Institute of Sustainability
Network for Computational Modeling in the Socio-Ecological Sciences · GitHub
(3) Michael Barton | Arizona State University - Academia.edu
C Michael Barton
Index of /~cmbarton/files/netlogo
Open Agent Based Modeling Consortium | ... a node in the CoMSES Network
Bruce Edmonds
Bruce Edmonds: Slides from talk on: "Possibilistic prediction and risk analyses"
The Turing Test: brain-inspired computing's multiple-path approach - E & T Magazine
Learning, Social Intelligence and the Turing Test - Springer
Bruce Edmonds: Paper and Slides: "Analysing a Complex Agent-Based Model Using Data-Mining Techniques"
Winter is coming! – how to survive the coming critical storm and demo…
Handbook on Complexity and Public Policy
Annual EA Conference 2015 – EA European Academy
The Complexity of Social Norms | Maria Xenitidou | Springer
The Conundrum of Social Norms - Springer
Search Results - Springer
Misperception Is Reality: The “Reign of Error” About Peer Risk Behaviour Norms Among Youth and Young Adults - Springer
Bruce Edmonds: @cfpm #skin3_2014 Slides of talk in Budapest on "Towards Integrating Everything..."
Manchester Metropolitan University
SKIN - Links
Linear model of innovation - Wikipedia, the free encyclopedia
Using Agent-Based Simulation to integrate micro/qualitative evidence,…
Bruce Edmonds | SlideShare
An Individual-Based Model of the Impact of Human Beings on an Ecosystem
A test-bed ecological model | Open Agent Based Modeling Consortium
Remote Sensing & Quaternary Landscapes - Google Search
Website Seeks to Make Government Data Easier to Sift Through - The New York Times
Michael Bazzell's Newsletter - April 2016
www.uk-osint.net
Data USA
The Official Social Engineering Portal - Security Through Education
The Productivity Pack
Smartphone spectroscopy kit brings blood test info home
Cor | Products
Dario turns your smartphone into a mobile diabetes monitor
Darpa Invites Techies to Turn Off-the-Shelf Products Into Weapons in New ‘Improv’ Challenge - IEEE Spectrum
Cosma's Home Page
www.stat.cmu.edu/~cshalizi/uADA/16/
Three-Toed Sloth
Cosma Shalizi
Links
How Computers Can Help Us Track Violent Conflicts - Including Right Now in Syria - The Monkey Cage
Minimal Advice to Undergrads on Programming
Introductory Agent-Based Modeling Workshop | Santa Fe Institute
ESD - Working Paper Series
On-Line Guide for Newcomers to ABM (Axelrod and Tesfatsion)
Agent-based and Individual-based Modeling: A Practical Introduction
Home | Eastern North American Region
LibraryThing | Catalog your books online
NetLogo Home Page
Frontiers | On agent-based modeling and computational social science | Theoretical and Philosophical Psychology
What levels of explanation in the behavioural sciences? | Frontiers Research Topic
Application of agent-based modeling and simulation to understanding complex management problems in CEM research - Journal of Civil Engineering and Management - Volume 21, Issue 8
Resources | Open Agent Based Modeling Consortium
Programs in Mathematics
CoMSES Digest | Open Agent Based Modeling Consortium
Education | Open Agent Based Modeling Consortium
Spatial Agent-Based Models of Human-Environment Interactions | Open Agent Based Modeling Consortium
On the probabilistic approach to heterogeneous structure interactions in agent-based computational models
Agent-based modeling of host–pathogen systems: The successes and challenges
toolkit - Agent-based modeling resources - Stack Overflow
Introduction to the special issue on agent-based modelling for policy engineering
IEEE Xplore Abstract - Nonproliferation informatics: Employing Bayesian analysis, agent based modeling, and information the...
Agent Based Modeling on Organizational Dynamics of Terrorist Network
Determining Acquisition Pathways for a Radiological Dispersal Device | Educating the Next Generation of Leaders in Nuclear Security Sciences
Zero Intelligence Agents — Drew Conway
GRIND for MATLAB - SparcS Center
Research and Publications « Systems Engineering Modelling and Simulation
UNREDACTED
The Cyber Vault
My Account
Accessing Your Facebook Data | Facebook Help Center | Facebook
WGBH Openvault
anrina - YouTube
Analysis from the Edge: Information Paralysis and Decision Making in Complexity - globalECCO
Author Page for Claudio Cioffi-Revilla :: SSRN
A dynamic model of counterinsurgency policy including the effects of intelligence, public security, popular support, and insurgent experience - Anderson - 2011 - System Dynamics Review - Wiley Online Library
Journal of Interdisciplinary Conflict Science | CAHSS Journals | Nova Southeastern University
Cioffi‐Revilla: MASON RebeLand: An Agent‐Based... - Google Scholar
Frontiers | Combining system dynamics and agent-based modeling to analyze social-ecological interactions—an example from modeling restoration of a shallow lake | Environmental Informatics
Al-Qaida in Action and Learning: A Systems Approach
System Dynamics Review - Volume 31, Issue 3 - July/September 2015 - Wiley Online Library
Agent Based Modeling on Organizational Dynamics of Terrorist Network
Live at Feinstein's/54 Below - YouTube
Page not found | Homeland Security News Wire
Why ISIS Is Building Mad Max Truck Bombs
Publications | DST Group
Burke Chair in Strategy | Center for Strategic and International Studies
Home
High-Priority Technology Needs - Google Search
Preventing Terrorism and Enhancing Security | Homeland Security
Strength, Security, and Shared Responsibility: Preventing Terrorist Attacks a Decade after 9/11 | Brennan Center for Justice
LAPD embraces 'predictive policing'
Sandia National Laboratories: News Releases : Suicide bomb detector moves forward with Sandia engineer’s help
White Papers - Disaster Recovery Journal - Dedicated to Business Continuity
Claudio Cioffi-Revilla - Google Search
Power
Mastermind: Computational Modeling and Simulation of Spatiotemporal Aspects of Crime in Urban Environments: Security & Forensic IS&T Book Chapter | IGI Global
IEEE Xplore Abstract - GENIUS: A computational modeling framework for counter-terrorism planning and response
Center for Nation Reconstruction and Capacity Development - Home
The Cordoba Foundation - Cultures in Dialogue
http://www.nps.navy.mil/gsbpp is not available
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions ... - Hussein A. Abbass - Google Books
Modeling and Simulation, Cognitive and Social Issues - Google Search
The Gulf/2000 Project - SIPA - COLUMBIA UNIVERSITY
CBRNE-Terrorism Newsletter
CBRNE-Terrorism Newsletter
CBRNE-Terrorism Newsletter
CBRNE-Terrorism Newsletter
Operations Research and Applications: An International Journal (ORAJ)
European Journal of Operational Research - Elsevier
CTX Vol. 6, No. 1, February 2016 - globalECCO
Renier van Heerden - Google Scholar Citations
Conferences • Academic Conferences and Publishing International
ICCWS Tokyo 2015: 17th International Conference on Cyber Warfare and Security
World Academy of Science, Engineering and Technology
World Academy of Science, Engineering and Technology - Google Scholar Citations
World Academy of Science, Engineering and Technology
To Inform is to Influence – IO, SC, PD, what's in a name?
ICCWS 2015 - The Proceedings of the 10th International Conference on Cyber Warfare and Security
What the Stabbings in Israel Reveal about Palestinian Society :: Middle East Forum
Homeland Security News Wire |
MIT Lincoln Laboratory: Cyber Security and Information Sciences : Human Language Technology: Publications: Cyber Security and Information Sciences - Publications
Jun Zhuang | START.umd.edu
Validating Models of Adversary Behavior - Google Search
Bier, Vicki - UW-Engineering Directory | College of Engineering @ The University of Wisconsin-Madison
Vicki Bier | DECIDE
Weapons and Tactics | START.umd.edu
Unconventional Weapons and Technology | START.umd.edu
Understanding Radiological and Nuclear Threats | START.umd.edu
Nuclear Facility Attack Database | START.umd.edu
Target-oriented utility theory for modeling the deterrent effects of counterterrorism
Jun Zhuang - Google Scholar Citations
Jun Zhuang's Homepage - Research Activities
Network Science Center - Publications
Site Pages
Survival: Global Politics and Strategy August–September 2015 | IISS
DHS Research Areas within the Science and Technology Directorate | DHS HS-STEM Summer Internship Program
MITRE's Summer Cyber Competition Teaches Interns to Think Like Adversaries | The MITRE Corporation
Paper Title (use style: paper title)
Innovative Application of Operational Research for Projects — PMWorld Library
Tutorials in OR: INFORMS
Maritime Security: Behind the Curtain – Decision Support Tools
Syria: Mapping the conflict - BBC News
Michael Izady’s Amazingly Detailed Map of Ethnicity in Syria (and the Syrian Armenians) | GeoCurrents
Studies & Analysis Solutions for Government: Mitigation Action Prioritization, Decision Support, Risk & Vulnerability Assessments and Gap Analysis - IEM Inc.
Innovative Decisions, Inc.
Syrian Civilians Take Reins in Test of Self-Government - The New York Times
ORAJ 2016 : Operations Research and Applications: An International Journal
Tutorials in Operations Research: Models, Methods, and Applications for ... - Michael P. Johnson - Google Books
New Edition of CTX - Combating Terrorism Exchange - Available for Download | GlobalNET
Environmental Tools to Support Sustainable Decision Making | Research | US EPA
Cyber Coercion: Cyber Operations Short of Cyberwar - Google Search
INTERNATIONAL SCIENTIFIC CONFERENCE - Google Search
Innovative Applications in Analytics Award - INFORMS
Renier van Heerden - Publications
Louise Leenen - Publications
The self-government revolution that’s happening under the radar in Syria - The Washington Post
Terrorism, cities, counterterrorism | Homeland Security News Wire
Tactical Approach to Counter Terrorists in Cities | RAND
Egypt's War on Terrorism Bears Fruit
The Count of Emmejihad
Age, Nationality And Education Details Of Islamists Revealed In Leaked Report
Welecome | Center for Development Studies
Sama News Agency | Palestinian news agency independent
Gaza's Tunnel Phenomenon: The Unintended Dynamics of Israel's Siege | The Institute for Palestine Studies
ISIS caves: Islamic State underground lairs in Iraq
Hamas’ Tunnel Rugrats – Biased BBC
War, the Contradictions and the Propaganda - The DENISE SIMON EXPERIENCE Blog
A trip through Gaza tunnels; how they work, how much they cost, what they bring in
The Tunnels: The only Way to revive the Gaza Strip - Google Search
Tunnels remain Hamas' most strategic asset in the Gaza Strip
Egypt-Gaza tunnels: the lifeline under threat
Egypt-Gaza Tunnels: The Lifeline Under Threat | Global Research - Centre for Research on Globalization
Hamas focuses on rebuilding tunnels as Gazans suffer - Al-Monitor: the Pulse of the Middle East
Blockade of the Gaza Strip - Wikipedia, the free encyclopedia
Gaza Strip smuggling tunnels - Wikipedia, the free encyclopedia
Gaza Tunnels Take IDF by Surprise - US News
Israel and the Gaza Strip: Why Economic Sanctions Are Not Collective Punishment
The Tunnels of Gaza - Photo Gallery - Pictures, More From National Geographic Magazine
Exclusive! Aaron Tveit & Gavin Creel Sing Rent's 'Take Me or Leave Me' at Miscast | Videos | Broadway.com
The Comparative Metrics of ISIS and "Failed State Wars" in Syria and Iraq | Center for Strategic and International Studies
nternational Workshop on Agent-based Modeling for Policy Engineering - Google Search
ABMTRANS - ANT 2016 : he 5th International Workshop on Agent-based Mobility, Traffic and Transportation Models, Methodologies and Applications
Agent Based Modeling « Systems Engineering Modelling and Simulation
Systems Engineering Modelling and Simulation
AMPLE Home
Homeland Security Digital Library (HSDL): Search Results
CHDS Theses: Executive Summaries | HOMELAND SECURITY AFFAIRS
HOMELAND SECURITY AFFAIRS | The Journal of the NPS Center for Homeland Defense and Security
Temporary TSA Pre✓® application center to open at PDX terminal | Government Security News
Turing and Anniversary Session
Draper - Engineering Possibilities
Palantir, the War on Terror's Secret Weapon - Bloomberg
Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research | HOMELAND SECURITY AFFAIRS
International Workshop on Agent-based Modelling for Policy En- gineering - Google Search
Reminders come to Google Calendar on the web | The Verge
A spiritual successor to Aaron Swartz is angering publishers all over again | Ars Technica
Full text of "Guerilla Open Access Manifesto"
Two Strategies to Surviving the Coming Mass Extinction | Motherboard
Breeding Young as a Survival Strategy during Earth’s Greatest Mass Extinction : Scientific Reports
Disaster! Curtain Call: Daphne Rubin-Vega & Adam Pascal sing 'Light My Candle' for BC/EFA - YouTube - stczztop@gmail.com - Gmail
Miscast 2016 - Google Search
Aaron Tveit Sings 'As Long As He Needs Me' From 'Oliver!' at Miscast 2016: Exclusive Video | Billboard
MISCAST / GALA :: MCC Theater at The Lucille Lortel Theatre :: New York City
Tina Fey Can Sing! Tituss Burgess and His Unbreakable Creator Have Amazing Belt-Off | Playbill
Tina Fey and Tituss Burgess sing 'You're Nothing Without Me' - YouTube
mcctheater - YouTube
MisCast 2016 - Lea Salonga - Why God Why? - YouTube
ResearchBuzz
UpFront with NGS: FREE Access -- Fold3 Civil War Collection [ends 15th April 2016]
How to Get Your Google Docs Footnotes Just Right | WIRED
How to Create Custom Functions in Google Sheets
The National Security Archive Launches the “Cyber Vault” | UNREDACTED
What does Snapchat know about you? New tool offers some answers - LA Times
Check out the new & improved Open Vault!
15 Creative Ways to Get The Most Out of Google Hangouts
Twitter for Business: 10 Case Studies and What You Can Learn From Them – Design School
The complete list of 'OK, Google' commands - CNET
EverSeller: Turn your Evernote account into an online shop - The American Genius
No unicorn zombies: Why Portland's top VC is bullish on Oregon's brand of tech - Portland Business Journal
Research and Recommendations for the EU's Foreign Fighter Epidemic - Homeland Security Digital Library Blog
Announcing: the Inaugural Class of PitchFestNW 2016! - Willamette Week
Analysis of New Drone Incident Reports – Center for the Study of the Drone
Giddy Among Fellow Nerds, Carter Pitches Pentagon Work to Techies - Defense One
ICCT | International Centre for Counter-terrorism – The Hague
iOS 9.3: Nope. iOS 9.3.1: Double Nope. | ResearchBuzz: Firehose
An introduction to Centrality measures - An Introductory Course on Network Analysis
Defense Systems Information Analysis Center (DSIAC)
MITRE Challenge Seeks Ideas to Counter Unauthorized Unmanned Aircraft | The MITRE Corporation
Search Results - Springer
Search Results - Springer
Current Addiction Reports - All Volumes & Issues - Springer
Current Addiction Reports, Topical Collection on Technology and Addiction - Springer
Robotics and Biomimetics - Springer
BMC Bioinformatics - Springer
Terror in Europe: Combating Foreign Fighters and Homegrown Networks - The Washington Institute for Near East Policy
Policy Analysis: Military and Security - The Washington Institute for Near East Policy
Week in Review: Announcing POMEPS Studies 18
UK Special Forces: Accountability in Shadow War | Oxford Research Group
The Cyber Vault
Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations | The MITRE Corporation
The Human Factor: Using Behavioral Science to Counter Insider Threats | The MITRE Corporation
Modeling and Simulation | The MITRE Corporation
Authors of New Cyber Denial & Deception Book Tell All! Or Do They? | The MITRE Corporation
National Cybersecurity FFRDC | The MITRE Corporation
Book by MITRE Researchers: Classic Tactic for Cyber Defense | The MITRE Corporation
Zika
Stuxnet Was Far More Dangerous Than Previous Thought - Business Insider
ATT&CK Helps Defenders Battle Cyber Invaders within the Perimeter | The MITRE Corporation
The MITRE Corporation 2015 Annual Report | The MITRE Corporation
Data to Decisions for Cyberspace Operations | The MITRE Corporation
Military Cyber Affairs (MCA) | University of South Florida
Gaining Advantage in a Forensic Match Game | The MITRE Corporation
Systems Engineering Guide | About the SEG | The MITRE Corporation
Yemen Strikes | The Long War Journal
National Defense University Press > JFQ > Joint Force Quarterly 81
Russia’s Choice in Syria - International Crisis Group
A Second Snowden Has Leaked a Mother Lode of Drone Docs | WIRED
Israel and Europe After Brussels: What Insights Can We Share? | Begin-Sadat Center for Strategic Studies
2016 International Narcotics Control Strategy Report
Stop the Belgian Bashing, but Face Reality
FERDI Une fondation pour des idées sur le développement
Projects - SWP
Syria after the Russian Intervention - SWP
The VICE News Guide to the Panama Papers | VICE News
The Law Firm That Works with Oligarchs, Money Launderers, and Dictators | VICE | United States
IS Central Asian Recruitment Drive A Family Affair
OnlineCensorship.Org Releases First Report | ResearchBuzz: Firehose
Gary Ackerman: An Introduction to Risk Assessment | START.umd.edu
CDC Just Launched Their Own Innovation Discovery Program - The HHS IDEA Lab
Social-Engineer Newsletter Vol 06 - Issue 79 - Security Through Education
Weekly Links | Political Violence @ a Glance
Data dustup bedevils Portland planning | InvestigateWest
Small Businesses See ‘Golden Opportunities’ in Special Operations Command - Blog
Secretive SOCOM Opens Up to Private Sector (UPDATED) - Blog
The Islamic State and Terrorist Attacks: License to Kill - Red (Team) Analysis
The Panama Papers · ICIJ
Game theory - Wikipedia, the free encyclopedia
Game Theory - Stanford University & The University of British Columbia | Coursera
game-theoretic models - Google Search
Centrality - Wikipedia, the free encyclopedia
Introduction to social network methods: Chapter 10: Centrality and power
SofWerX - Google Search
SOFWERX | OMG Robots!
Facility - Doolittle Institute
First defense-focused Hackathon underway in Tampa - Tampa Bay Business Journal
cgsmonitor Past Lessons and Future Objectives: A Preemptive Strike on Hamas Tunnels - cgsmonitor
The Phenomenon of Tunnels in The Gaza Strip: Shattered Economy, the Catholic marriage, a Bitter Harvest | Center for Development Studies
O'Connor et al. (ACL 2013), Learning to Extract International Relations from Political Context
GitHub - brendano/OConnor_IREvents_ACL2013: Replication software, data, and supplementary materials for the paper: O'Connor, Stewart and Smith, ACL-2013, "Learning to Extract International Relations from Political Context"
AMPLE'12: 2nd International Workshop on Agent-based Modeling for PoLicy Engineering | Open Agent Based Modeling Consortium
graph theory, social networks and counter terrorism. social network and counterterrorism analysis - Google Search
modeling and detection techniques for counter-terror social network analysis and intent recognition. - Google Search
IEEE Xplore Abstract - Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition
Palantir, the War on terror’s Secret Weapon - Google Search
Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research, - Google Search
Corey Lofdahl - Google Scholar Citations
the morning paper | an interesting/influential/important paper from the world of CS every weekday morning, as selected by Adrian Colyer
March | 2016 | the morning paper
End of term | the morning paper
Ryan C. Maness - Google Scholar Citations
CYBER CONFLICT DATASET
Information Systems Department
Will ISIS Ever Run Out Of Suicide Bombers? - Vocativ
ISIS By 2015’s End: Battered, But By No Means Beaten - Vocativ
Spies and Shadowy Allies Lurk in Secret Thanks to Firm’s Bag of Tricks - The Panama Papers
The Coming ISIS–al Qaeda Merger | Foreign Affairs
Facing Down the World's Deadliest Pathogens in a BSL4 Lab - Scientific American
The ISIS Program Graduate Certificates | Prof. Matthew Crosston, PhD - Academia.edu
https://scholar.google.com/scholar?start=10&q=related:tGoBnnx3zbcFNM:scholar.google.com/&hl=en&as_sdt=0,48 - stczztop@gmail.com - Gmail
Fang: Analyzing Intelligence on WMD Attacks Using... - Google Scholar
ISIS use everyday items smuggled from the US to create IEDs | Daily Mail Online
Afghan War News
George C. Marshall European Center for Security Studies | GlobalNET
Discover Weekly Archive by hansjuergenbardenhagen - IFTTT
‘J’ IN THE PRΞSS « JESTERS COURT – OFFICIAL BLOG
SUPPORT ‘J’ « JESTERS COURT – OFFICIAL BLOG
8th Day2 T Shirt | Zazzle
Patriot hacker 'The Jester' attacks nations offering Snowden help • The Register
"The Jester" Hacks Top Venezuelan Newspaper Over Snowden | Mother Jones
"Patriotic Hackers" Claim to Fight Cyber War Against Terrorists | NBC Chicago
IntelTechniques.com Blog » Blog Archive » Internet Search Links for March 2016 #OSINT
Humanitarian Cargo Delivery via Aerial Robotics is Not Science Fiction (Updated) | iRevolutions
Two Al-Qaeda Explosives Experts Released From Gitmo
Bitcoin Users Reveal More Private Information Than They Realize — Bitaccess Inc. — Medium
Science Blogs and the Power of the Grapevine › From The Lab Bench
Ryan Maness - Google Search
Ryan Maness - College of Social Sciences and Humanities
Cyber War versus Cyber Realities - Brandon Valeriano; Ryan C. Maness - Oxford University Press
Brandon Valeriano and Ryan C. Maness | The Coming Cyberpeace
The Fog of Cyberwar
(8948) Inoreader - How Reporters Pulled Off the Panama Papers, the Biggest Leak in Whistleblower History
greta's gouge: Friday's Miscellany 04-01-2016
How Reporters Pulled Off the Panama Papers, the Biggest Leak in Whistleblower History – To Inform is to Influence
How Reporters Pulled Off the Panama Papers, the Biggest Leak in Whistleblower History | WIRED
Today
BBC - Future - The detectives watching you from space
Flyover Country app tells you about the ground beneath as you fly | FlowingData
How I Went From Leading the Egyptian Revolution to Making Minimum Wage in San Francisco
Procrastinating Prime Members Can Save an Extra 20% on H&R Block Tax Software
The New Face of STEAM | Edutopia
A Jewish Mother-Daughter Relationship Like No Other | Jewniverse
US Patent # 9,177,259. Systems and methods for recognizing and reacting to spatiotemporal patterns - Patents.com
Documents citing US 6954148 B2 - Method And System For Selectively Monitoring Activities In A Tracking Environment - The Lens
APTIMA - Google Search
Patent US 20040236604A1
www.uspto.gov/web/patents/patog/week44/OG/html/1420-1/US09177259-20151103.html
United States Patent: 9177259
Patent US9177259 - Systems and methods for recognizing and reacting to spatiotemporal patterns - Google Patents
AUTONOMOUS DETECTION OF INCONGRUOUS BEHAVIORS - BAUMARD PHILIPPE
Sensors | Free Full-Text | Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks | HTML
IEEE Xplore Abstract - Risk Assessment in Social Networks based on User Anomalous Behaviour
Cogent Psychology - Volume 3, Issue 1
Information Fusion - ScienceDirect.com
Weiguo Fan - Publications
Publications « samuelfossowamba
Levchuk: Recognition of coordinated adversarial behaviors... - Google Scholar
Save $400 on Apple's 15" MacBook Pro
Today's Best Deals: Running Shoes, Outdoor Clothes, Anker Jump Starter, and More
Amazon.com: Deal of the Day: Save on Select Men's & Women's Outdoor Clothing
Corey Lofdahl - Google Scholar Citations
Google Scholar Citations
Alexis Morris - Publications
Charles River Analytics Senior Researcher Deployed to Afghanistan Using Computational Social Science to Analyze COIN Ops | Charles River Analytics
An Adaptive Human-Machine System for Supporting Intelligence Analysis - Google Search
ISIS want to attack western cities with dirty bomb dropped from drone, Western leaders fear
James Frank | LinkedIn
What are the standard Suspicious Activity video database avilablel on Net? - ResearchGate
Trying to find some research methods and methodology for terrorism studies. Any suggestions on articles or books? Thank you! - ResearchGate
Do profiling has some value in criminal investigation? - ResearchGate
How to get rid of a noise component in a data signal? - ResearchGate
Suspicious Activity at Yongbyon Radiochemical Laboratory; Progress Towards Completing the Experimental Light Water Reactor | 38 North: Informed Analysis of North Korea
Theranos Promised a Revolution, but Delivered Dangerous Errors
Siri for Business
Security Matters
ISIS Affiliate in the Philippines Is Down on Its... - Matthew Aid
Security Awareness and Adoption Surveys - The Hacker Factor Blog
Selection of different news sources reporting on the Panama Papers : Intelligence
Afghan Spy Agency Arming Villagers to Take on... - Matthew Aid
Download Stretching Exercises Encyclopedia.pdf - 1841263516 Torrent - Kickass Torrents
Portland Naturopaths Discuss 10 Acupuncture Benefits
Profile of ASTRAAA - Uploads - Kickass Torrents
The Addictive Personality Isn't What You Think It Is - Scientific American
Quick Charge All of Your Devices With These Cheap USB Power Accessories
New Book - Channelized Terrain Tactics: Basic Navigation Training | Small Wars Journal
Experts: Troops in Europe could be next terrorist target
Parag Khanna: How megacities are changing the map of the world | TED Talk | TED.com
Corey Lofdahl | LinkedIn
A system dynamics view of stress: Towards human-factor modeling with computer agents
Modelling Culture in Multi-agent Organizations
In Saudi Arabia, Sunni Militancy Claims Another Victim | Stratfor
It’s Time for Another Louisiana Maneuvers – The Angry Staff Officer
The Online Fight Against ISIS | RAND
The future of hostage rescue could be this little robot - Quartz
Isis cyber army grows in strength as caliphate hacking groups merge on Telegram
Online Film & Video / Entertainment — Webby Awards — People's Voice
What Was Aaron Tveit’s Favorite Moment of Grease: Live? | Playbill
EXCLUSIVE: Lea Salonga Sings an Unexpected Miss Saigon Tune at MCC's Miscast - TheaterMania.com
#ham4ham The Schulyer Georges - YouTube
Determination of Acetaminophen Using Functional Paper-Based Electrochemical Devices
Workshop on Reasoning in Adversarial and Noncooperative Environments (WRANE)
Dylan Schmorrow - Google Scholar Citations
Saved Session - Session Buddy
Saved Session - Session Buddy
Speak – 2016 Open Source Hardware Summit
AAMAS 2014
A Comprehensive List of All the Sports I Should Have Quit Immediately
Research Topics | Agent Technology Center
Defeating the Attempted Global Jihadist Insurgency: Forty Steps for the Next President to Pursue against al Qaeda, Like-Minded Groups, Unhelpful State Actors, and Radicalized Sympathizers
DOD invites you (well, some of you) to “Hack the Pentagon” this month | Ars Technica
arXiv.org e-Print archive
[1101.0987] Dynamic Red Queen explains patterns in fatal insurgent attacks
[1603.05691] Do Deep Convolutional Nets Really Need to be Deep (Or Even Convolutional)?
[1603.06008] What Happens in a Measurement?
[1603.07503] Quantum time mirrors
[1603.07813] Chatty Maps: Constructing sound maps of urban areas from social media data
[1604.00033] EMBERS at 4 years: Experiences operating an Open Source Indicators Forecasting System
CoRR - Computing Research Repository
CoRR - Computing Research Repository
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
Computers and Society authors/titles recent submissions
Digital Libraries authors/titles recent submissions
Information Retrieval authors/titles recent submissions
Social and Information Networks authors/titles recent submissions
Physics and Society authors/titles recent submissions
Physics authors/titles recent submissions
Preventing Nuclear Terrorism: Continuous Improvement or Dangerous Decline? - Harvard - Belfer Center for Science and International Affairs
It takes a network to defeat a network - Harvard - Belfer Center for Science and International Affairs
Russia in Review - Harvard - Belfer Center for Science and International Affairs
LookingGlass releases new threat intelligence platform
Bio-Link | Educating the Biotechnology Workforce
bioRxiv.org - the preprint server for Biology
MetaSD | Don't just do something, stand there! (Sometimes good policy in complex systems is counterintuitive)
Big data: Automation and collaboration : Naturejobs Blog
Progress and patents, a CRISPR news roundup | PLOS Synthetic Biology Community
BOTIZE - Tu Bot en Twitter
Caffeine Security: Space Weather Outlook April 03, 2016 at 11:51PM
A-WOL: Spring is IN THE AIR!
System Dynamics Case Repository
Defense « System Dynamics Case Repository
State Planning in Sarawak « System Dynamics Case Repository
System Dynamics & Agent-Based approaches to face HR constraints « System Dynamics Case Repository
Archive | 24th Conference on Behavior Representation in Modeling and Simulation
2012 BRIMS CD-ROM: Table of Contents
Welcome to Cogprints - Cogprints
The Journal of Conventional Weapons Destruction | Research Centers and Institutions | James Madison University
Journal of Conventional Weapons Destruction: Most Popular Papers
HPE Security Research OSINT (OpenSource Intelligen... - Hewlett Packard Enterprise Community
DImE, PmESII and now MIDLIFE - Small Wars Council
Rpt: ‘At Least 50’ ISIS Supporters Work at Brussels Airport | The Counter Jihad Report
The ISIS Flag and Why They Chose It #ISISlam | The Counter Jihad Report
ISIS's Hunt for WMDs: Navigating the Nuclear Underworld with C.J. Chivers | Center for Strategic and International Studies
dblp: Nicklaus A. Giacobe
dblp: Jacob R. Scanlon
Add a Dremel To Your Toolbox Starting at Just $29, Today Only
Sunday's Best Deals: 4K Samsung, Little Giant Ladder, Gummi Bears, and More
New & upcoming hackthons · Devpost
11th DIMACS Implementation Challenge
DIMACS
Center for Discrete Mathematics and Theoretical Computer Science
Center for Discrete Mathematics and Theoretical Computer Science
Center for Discrete Mathematics and Theoretical Computer Science
DIMACS Implementation Challenges
DIMACS Site Index
DIMACS PS-Future
DIMACS Workshop Proceedings
DIMACS Materials
DIMACS 2010-2013 Special Focus on Algorithmic Decision Theory
Topics of DIMACS Special Years
DIMACS Technical Reports
2004-37: Report on DIMACS Working Group Meeting: Data Mining and Epidemiology, March 18-19, 2004
DIMACS Technical Reports
DIMACS VCTAL
DIMACS/AMS Volumes: Published by the American Mathematical Society
DIMACS Workshop on Applications of Order Theory to Homeland Defense and Computer Security
DIMACS Workshop on Applications of Order Theory to Homeland Defense and Computer Security
DIMACS Working Group on Applications of Order Theory to Homeland Defense and Computer Security
DIMACS Working Group on Applications of Order Theory to Homeland Defense and Computer Security
DIMACS Working Group on Applications of Order Theory to Homeland Defense and Computer Security
Adversarial Reasoning
Mathematical description and analysis of adaptive risk choice behavior
Proceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction
Discovering Obscure Sightseeing Spots by Analysis of Geo-tagged Social Images
US Military Equipment In Afghanistan (2007): - JIEDDO TF PALADIN (W4FG08)
DIME/PMESII Modeling & Simulation
Friday Nerd Blogging: Does Cosplay at Conference Panels Render Pop-Culture Research Less Serious? | Duck of Minerva
http://dydan.rutgers.edu/Research/Nuclear/ is not available
Daina Chiba
News - Assessment of the yellow fever outbreak in...
Elsevier Editorial SystemTM
Dynamic Optimal Control Models in Advertising: a Survey : SIAM Review: Vol. 19, No. 4 (Society for Industrial and Applied Mathematics)
eScholarship | University of California
New START Data Shows Russian Increases and US Decreases - Federation Of American Scientists
People :: Sociology Department :: Duke University
Northrop Seeks to Promote STEM Education Through School Lab Makeover Contest; Sandra Evers-Manly Comments | Fed Tech Ticker
Defense-Update
Speed up your social newsgathering with these Twitter search shortcuts |
Speed up your social newsgathering with these Twitter search shortcuts |
Forio | Custom Training Simulations and Predictive Analytics Applications.
S07.E17: Express Yourself - Modern Family - Previously.TV Forums
Front for the arXiv
http://gdelt.utdallas.edu/data/gkg/?O=D is not available
Simulating social-ecological systems: the Island Digital Ecosystem Avatars (IDEA) consortium | GigaScience | Full Text
Brainhack: a collaborative workshop for the open neuroscience community | GigaScience | Full Text
Colorful Image Colorization | GitXiv
Mapping the Global Health Security Agenda
Predicting Which Viruses Will Cause Human Epidemics
MIT Hacking Medicine
IEEE Xplore Abstract - Workshop on current issues in predictive approaches to intelligence and security analytics
IEEE Xplore Abstract - Automated sensing and social network analysis in virtual worlds
IEEE Xplore Abstract - Mining social media in extreme events : Lessons learned from the DARPA network challenge
IEEE Xplore Abstract - Diplomatic, Information, Military and Economic power (DIME): An effects modeling system
IEEE Xplore Abstract - Adaptive Risk Choice Behavior Using MAS
IEEE Xplore Abstract - Forecasting Violent Extremist Cyber Recruitment
IEEE Xplore Abstract - Using Twitter for Next-Place Prediction, with an Application to Crime Prediction
Waldemar Karwowski | Industrial Engineering & Management Systems
WSC Archive
WSC 2008 Program
WSC 2010 Program
WSC 2012 Proceedings
WSC 2013 Proceedings
WSC 2014 Proceedings
WSC 2015 Proceedings
Tool set for Loop Eigenvalue Elasticity Analysis
World leaders urge action against nuclear terrorism at Nuclear Security Summit | IRIA News
ACM JEA
مرصد العدالة من أجل الحياة في ديرالزور | The Impact of International Coalition Operations on the Economy of “Islamic State” in Syria
Noise in GDELT - John Beieler
Journal of Defense Resources Management
Physical Review Letters
Seven deadly sins of contemporary quantitative political analysis
Journal of Terrorism Research
The Official Bad Religion Online Store
Tool Tip: Sticky Keyboard Cleaner | Cool Tools
An overview of forecasting for politics, conflict, and political violence - Less Wrong
Automatic Detection and Forecasting of Violent Extremist Cyber-Recruitment - University of Virginia Library - Libra
Career Spotlight: What I Do as a Private Investigator
Eight Useful Microsoft Excel Shortcuts Worth Memorizing
Everything You Need to Master Microsoft Office
Grab a Free License for CloudBerry Backup Pro for Mac or Linux, Normally $30
How Radar Detectors Work and Why They Won't Always Save You From a Ticket
How Radar Detectors Work and Why They Won't Always Save You From a Ticket
How to Master Microsoft Office OneNote
How to Master Microsoft Office Outlook
Monospace Writer Leaves Beta, Organizes and Locks Files With Hashtags
Online Backup Faceoff: CrashPlan vs. Backblaze
Pocket Paper Notebook Showdown: Moleskine vs. Field Notes
It's World Backup Day, Now's a Good Time to Check Your Backups
Remains of the Day: A Deal on Amazon Prime so Awful It Must Be an April Fool's Joke
This Week's Most Popular Posts: March 25th to April 1st
This Week's Most Popular Posts: March 25th to April 1st
This Week's Top Downloads
Top 10 Cheat Sheets to Help You Master Microsoft Office
Optimize Network Attack Detection| LightCyber
Create Line Art - Linify
Home - Springer
The influence of analysis on U.S. defense policys - Springer
Introduction to the special issue on insider threat modeling and simulation - Online First - Springer
‘Knowledge Making’: Issues in Modelling Local and Indigenous Ecological Knowledge - Springer
Computational approaches to suspicion in adversarial settings - Springer
Anatomy of a dark network: the case of the Turkish Ergenekon terrorist organization - Springer
An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea - Springer
A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment - Springer
Using publicly visible social media to build detailed forecasts of civil unrest - Springer
Automatic detection of cyber-recruitment by violent extremists - Springer
Evasion-resistant network scan detection - Springer
Social Computing, Behavioral-Cultural Modeling and Prediction - Springer
Social Computing, Behavioral-Cultural Modeling, and Prediction - Springer
Collaborative Networks and Their Breeding Environments - Springer
Conflict and Complexity - Springer
Biosensors for Security and Bioterrorism Applications - Springer
Social Computing, Behavioral-Cultural Modeling and Prediction - Springer
Quantifying Tactical Risk: A Framework for Statistical Classification Using MECH - Springer
A Very Smart Card for Fighting Against Terrorism - Springer
Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs - Springer
Cyber Maneuver Against External Adversaries and Compromised Nodes - Springer
Simulating Terrorist Cells: Experiments and Mathematical Theory - Springer
Modeling Decision-Making Outcomes in Political Elite Networks - Springer
MECH: A Model for Predictive Analysis of Human Choices in Asymmetric Conflicts - Springer
Risk Management in Asymmetric Conflict: Using Predictive Route Reconnaissance to Assess and Mitigate Threats - Springer
Small State Acquisition of Offensive Cyberwarfare Capabilities: Towards Building an Analytical Framework - Springer
Traceable Signatures - Springer
Adversarial Risk Analysis: Applications to Basic Counterterrorism Models - Springer
Using Organizational Similarity to Identify Statistical Interactions for Improving Situational Awareness of CBRN Activities - Springer
Information Systems Frontiers - Springer
Security Informatics - Springer
Search Results - Springer
Search Results - Springer
Lisa's leaks - 'Madness in the Magnolias' | Literary Agent / Investigative Journalist / Polymath. Once the truth is known, theories naturally become obsolete. | Page 69
Detecting authorship deception: a supervised machine learning approach using author writeprints
Gestimer - For those little reminders during the day
Orlando City SC vs. Portland Timbers | MatchCenter
Rogelio Oliva | Mays Business School
mdwardlab.com
mdwardlab.com
Building a better concussion test
Human Social Culture Behavior Modeling — Milcord
The Jamestown Foundation: March 2016 Brief (Free)
The DoD Is Now Taking Applications for Its First Ever Bug Bounty Program | Motherboard
Javey Research Lab @ Berkeley
Publications | Javey Group
Research | Javey Group
Do Military Leaders Deserve Our Trust? | The National Interest Blog
IEDs and Counter IED Task Force | Nautilus Institute for Security and Sustainability
Peace and Conflict Studies | Open Access Articles | Digital Commons Network™
Famous Hacker Names His Favorite OSINT Tools
Stories about The Jester
Keynotes & Invited talks
Measurement to Intelligence: Feature Extraction, Modeling and Predictive Analysis of Asymmetric Conflict Events
Principles of Optimal Control | Aeronautics and Astronautics | MIT OpenCourseWare
Download Course Materials | Principles of Optimal Control | Aeronautics and Astronautics | MIT OpenCourseWare
Principles of Optimal Control | Aeronautics and Astronautics | MIT OpenCourseWare
Readings | Principles of Optimal Control | Aeronautics and Astronautics | MIT OpenCourseWare
Syllabus | Principles of Optimal Control | Aeronautics and Astronautics | MIT OpenCourseWare
ODIN World Map - Open Data Inventory
Artificial immune system for illicit content identification in social media - Yang - 2011 - Journal of the American Society for Information Science and Technology - Wiley Online Library
Crisis Early Warning and Decision Support: Contemporary Approaches and Thoughts on Future Research - O’Brien - 2010 - International Studies Review - Wiley Online Library
Adversarial Risk Analysis for Counterterrorism Modeling - Rios - 2011 - Risk Analysis - Wiley Online Library
Modeling Intelligent Adversaries for Terrorism Risk Assessment: Some Necessary Conditions for Adversary Models - Guikema - 2011 - Risk Analysis - Wiley Online Library
Groupthink, Iraq, and the War on Terror: Explaining US Policy Shift toward Iraq - Badie - 2010 - Foreign Policy Analysis - Wiley Online Library
Modeling Opponents in Adversarial Risk Analysis - Rios Insua - 2015 - Risk Analysis - Wiley Online Library
Optimal Control Applications and Methods - Wiley Online Library
System Dynamics Review - - Wiley Online Library
Journal of Open Research Software
5 Top Spring Cleaning tips from Gracies Wrench : ORbike: FIND ADVENTURE – Bicycle Events and Cycling Tips
Terror and Beauty - The European Institute for Mathematical Methods in Counterterrorism
Russians honour Ottawa physicist Paul Corkum | Ottawa Citizen
Panama Papers - All articles by Süddeutsche Zeitung
How to (Make Chemical Weapons) Disappear Completely | The Pandora Report
Pandora Report 4.1.2016 | The Pandora Report
Author Page for Peter Borm :: SSRN
Author Page for Herbert Hamers :: SSRN
Parus Analytical Systems
Parus Analytics | About
What does swarm robotics have to do with synthetic biology, and why does it matter?
Philip Schrodt — Department of Political Science
GDELT and ICEWS, a short comparison | Predictive Heuristics
Prediction and Good Judgment: Can ICEWS Inform Forecasts? | Predictive Heuristics
Matthew Gerber | Predictive Technology Laboratory @ University of Virginia
Forecasting Violent Extremist Cyber-Recruitment | Predictive Technology Laboratory @ University of Virginia
Decision Analysis: INFORMS
Decision Analysis: INFORMS
Decision Analysis: INFORMS
realitycommons.media.mit.edu
Papers
Sabinet - Understanding the rise of Boko Haram and its discontents
RePEc: Research Papers in Economics
Qatar Schools, Pinterest, Snapchat, More: Friday Buzz, April 1, 2016 | ResearchBuzz
Jesus Maria Rios Aliaga - Publications
DIMACS REU: 2010 Participants
DIMACS REU: Research Experience for Undergraduates
DIMACS 2010: Christopher Kleven
SBP: Social Computing, Behavioral-Cultural Modeling and Prediction
SBP: Social Computing, Behavioral-Cultural Modeling and Prediction
SBP: Social Computing, Behavioral-Cultural Modeling and Prediction
SBP: Social Computing, Behavioral-Cultural Modeling and Prediction
SBP-BRiMS 2016
SBP-BRiMS 2016
SBP-BRiMS 2016
SBP-BRiMS 2016
SBP-BRiMS 2016
SBP-BRiMS 2016
SBP-BRiMS 2016
SBP 2014
SBP 2015
SBP 2015
SBP 2015
SBP-BRiMS 2016
SBP: Social Computing, Behavioral Modeling and Prediction
SBP: Social Computing, Behavioral Modeling and Prediction
New Genome-Wide Analysis Links Marijuana Dependence and Major Depression
The economics of terrorist behaviour - Securipedia
Knowledge encapsulation framework for technosocial predictive modeling | Security Informatics | Full Text
An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea | Security Informatics | Full Text
Harvesting and analysis of weak signals for detecting lone wolf terrorists | Security Informatics | Full Text
Using publicly visible social media to build detailed forecasts of civil unrest | Security Informatics | Full Text
Evasion-resistant network scan detection | Security Informatics | Full Text
8 February 2011 - APAN Community SharePoint
Latest Issue of Parameters Now Online | Small Wars Journal
Dedication | Small Wars Journal
The Boko Haram Insurgency: Applying the FID Model? | Small Wars Journal
The Strategic Civilian: Challenges for Non-Combatants in 21st Century Warfare | Small Wars Journal
MIT's Smartphone Laser Scanner Is Totally Decent and Costs $49 - IEEE Spectrum
MIT turns Wi-Fi Into Indoor GPS - IEEE Spectrum
Startup Stash - Curated resources and tools for startups
STEM Week Oregon, May 1 - May 8 | STEM Oregon
STOP: SOMA Terror Organization Portal
Strategic and Competitive Intelligence Professionals: Intelligence Starts With “I” But I Wish It Started With “We”
SSI Publications - Military Strategy, National Security, and Regional Security
Annual Conference | UK Chapter of the System Dynamics Society
Links | UK Chapter of the System Dynamics Society
Past Event: 2014 Annual Conference | UK Chapter of the System Dynamics Society
Security - Teamcore Research Group
Documents leaked from a Panamanian law firm reveal a global web of corruption | TechCrunch
The Breakthrough Institute - Publications
Hacker Hijacks a Police Drone from 2 Km Away with $40 Kit
The Monkey Cage - Democracy is the art of running the circus from the monkey cage. - H.L. Mencken
11 of the best new and updated iPhone apps from March 2016
Chainsaw-wielding drone is the kind of horror Leatherface dreams of
The nuances of intelligence: How programmed beliefs and disturbing rebellions shape AI bots - The Tartan Online
The Wirecutter
The Best Tech Deals We Can Find | The Wirecutter
Daesh Using Decoys – To Inform is to Influence
Tools for System Dynamics
: Subject: Terrorist decision-making
FCJ-200 When Memes Go to War: Viral Propaganda in the 2014 Gaza-Israel Conflict | The Fibreculture Journal : 27
Computational Epidemiology Lab | Unraveling the Complexity of Health
Publications
http://ucsu.colorado.edu/~xu/software.html#summary is not available
Sniffing out a dangerous vapor | UNews
Jamestown Strategic Digest Vol. 2, Issue 6
Terrorism Monitor - Volume XIV, Issue 7
Causal Tracing™ | Vensim
Resources | Vensim
viXra.org open e-Print archive
VOX – Pol | On social media, ISIS uses modern cultural images to spread anti-modern values
War News Updates: Panama Papers: Biggest Leak In History Reveals How The Rich And Powerful Hide Their Money
War News Updates: Syrian War News Updates -- April 3, 2016
Beyond Brussels: Turning the Tide against ISIL in Europe
“Despite the Handicap of Her Sex”: Dr. Cora Du Bois, American Bad-Ass of the OSS in Southeast Asia
Adam Elkus, Author at War on the Rocks
web.mit.edu/jsterman/www/DID.html
MIT SDEP: What is System Dynamics?
About WordNet - WordNet - About WordNet
Astronomy & Astrophysics (A&A)
AGI - software to model, analyze and visualize space, defense and intelligence systems
Amazon.com: adidas Performance Men's Adissage Sandal: Clothing
Amazon.com: Gigastone PhotoFast 128GB U3 Memory Cable (PF-MCU3128GB-R): Computers & Accessories
Amazon.com: Silicon Power 128GB xDrive L13 Storage Expansion Card for 13" MacBook Air(SP128GBSAXGU3V10): Computers & Accessories
Amazon.com: Game Changers: Going Local to Defeat Violent Extremists eBook: Scott Mann, R. Keene, Mark Tompkins, Steven Pressfield: Books
Gold Box Deals | Today's Deals - Amazon.com
American Mathematical Society :: Homepage
Multimethod Simulation Software and Solutions
Army taking apps to the tactical edge
Syria: Next Steps
Did a Self-Identified Spy Hunter Leak an NSA Secret on LinkedIn? | Atlas Obscura
behavioral influences analysis and assessment research and theory
influence operations ops, propaganda, deception, counterpropaganda
Reddit kills snooping 'warrant canary' - BBC News
Panama Papers: Mossack Fonseca leak reveals elite's tax havens - BBC News
Best Buy Outlet: Refurbished and Clearance Electronics
Best Buy Deal of the Day: Today's Deals on Electronics
Bio-Link | Current and Upcoming Events
OHSU, Intel sign up 2 major cancer centers for ambitious cloud project - Portland Business Journal
Nike, Amazon and Google head list of companies for which tech workers would move to Portland - Portland Business Journal
Why investors increasingly flock to Portland - Portland Business Journal
Portland TechFlash - Portland Business Journal
How to Hack an Election
How to Hack an Election
U.S. Commandos Trained to Stop Terrorists With `Dirty Bombs' - Bloomberg
ISIS' offline propaganda strategy | Brookings Institution
Structural Analysis in the Social Sciences | Cambridge University Press
10th DIMACS Implementation Challenge
10th DIMACS Implementation Challenge
2016 Nuclear Security Summit Resources - Council on Foreign Relations
News Scan for Mar 31, 2016 | CIDRAP
JoSS: Journal of Social Structure
JoSS: Index of Volumes
The Fifth DIMACS Challenge
Useful Pages
DIMACS Challenge Project Ideas
Simple iPhone trick frees up storage space you didn't know you had | Cult of Mac
Panama Papers reveal how TWELVE world leaders hide their millions in tax havens | Daily Mail Online
www.darpa.mil/staff/dr-jonathan-pfautz
How Should the World Respond to Terrorism? - Defense One
ISIS’ bomb college; Carter in Boston; China may put nukes on a hair trigger; Jeep hits F/A-18; and a bit more. - Defense One
How Bad Would A Radiological Terror Attack Be? - Defense One
How Propaganda (Actually) Works | DeSmogBlog
9th DIMACS Implementation Challenge: Shortest Paths
Defence Technology -- 防务技术
Human Performance, Training & Biosystems Office, ASD(R&E)
HSCB - Human Social Culture Behavior Modeling Program
HSCB - Human Social Culture Behavior Modeling Program
HSCB - Human Social Culture Behavior Modeling Program
HSCB - Human Social Culture Behavior Modeling Program
http://www.dydan.rutgers.edu/ is not available
Are Military Interventions Inevitably Doomed to Backfire?
Jun Zhuang's Homepage
Conference on Validating Models of Adversary Behaviors - Homepage
Mitch
Maker culture: junk robots, DIY tablets, 3D-printed dice, and more | ExtremeTech
Darpa - News & Rumors | ExtremeTech
National Preparedness Directorate | FEMA.gov
Apple Used Loopholes To Skip Paying U.S. Taxes On $44 Billion In Offshore Income, Senate Committee Claims - Forbes
Home
Introduction to Modeling Techniques in Predictive Analytics: Business Problems and Solutions with R | Analytics and Data Science | FT Press
GameSec 2016 - Conference on Decision and Game Theory for Security
GameSec 2016 - Conference on Decision and Game Theory for Security
The Middle East Big Game: Forecasting the Conflict | Global Research - Centre for Research on Globalization
Monte Carlo Simulation Software - GoldSim
Patent US8892484 - System and method for predicting events - Google Patents
GoPubMed® - Transinsight's semantic search for the life sciences
Northrop Seeks to Promote STEM Education Through School Lab Makeover Contest; Sandra Evers-Manly Comments
How to Use Apple’s New Notes App to Organize Your Thoughts
How to Free Up Space Used By Your iPhone or iPad’s Messages App
Mastermind of Ankara blast escaped due to delayed intelligence: Report - CRIME
IAVO Research and Scientific: Products
IAVO Research and Scientific: Products
IAVO Research and Scientific: Webpage Site Map
IEEE - Proceedings of the IEEE
World’s Biggest Data Breaches & Hacks | Information is Beautiful
INFORMED LIBRARIAN ONLINE - Guest Forum
Laura McLay — Innovative Decisions, Inc.
(5033) Inoreader - Channels
International Network for Social Network Analysis - INSNA
Sunbelt Archives
INSS Institute for National Security Studies
Optimal Control | Optimization Model | InTechOpen
Crime Hot Spots: Behavioral, Computational and Mathematical Models
isee systems - The World Leader in Systems Thinking Software
ISIS's Hunt for WMDs: Navigating the Nuclear Underworld
Terrorism Monitor | The Jamestown Foundation
http://www.jfsc.ndu.edu/library/publications/bibliography/Elements_of_National_Power.pdf is not available
Defence Technology - Journal - Elsevier
News | NASA Satellite Images Uncover Underground Forest Fungi
Analytics, Data Mining, and Data Science
An astounding nanoscale magnified view of bacterial ‘motors’ | KurzweilAI
Craig Venter’s team designs, builds first minimal synthetic bacterial cell | KurzweilAI
Creating custom drugs on a portable refrigerator-size device | KurzweilAI
How to use laser cloaking to hide from remote detection by aliens | KurzweilAI
Obama: Vast parts of the world off-limits for nukes | Politics - KXLY.com
Data Mining
List.js - Search, sort, filters, flexibility to tables, list and more!
Living Reviews - Portal
Introducing a New Success Framework for Information Professionals | LLRX.com
World-Wide Integrated Crisis Early Warning System · Lockheed Martin
MapEquation
24th Cumberland Conference: Abstract: Lynne L. Doty
MathPages
MathPages Combined Contents List
The SCARAB Subs and Underwater Fiber-Optic Cable... - Matthew Aid
The SCARAB Subs and Underwater Fiber-Optic Cable... - Matthew Aid
What Are We Fighting For? The Forlorn Confessions... - Matthew Aid
Breaking Cover: New Book on the CIA's Secret... - Matthew Aid
New Deputy Director of NSA's SIGINT Directorate... - Matthew Aid
Military Operations Research Society > Events
M&S Library - Glossary - AMSO
Using Multi-Theoretical Multi-Level (MTML) Models to Study Adversarial Networks | Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers | The National Academies Press
Appendix C: Candidate DIME/PMESII Modeling Paradigms | Behavioral Modeling and Simulation: From Individuals to Societies | The National Academies Press
3 Challenges to Risk Analysis for Homeland Security | Review of the Department of Homeland Security's Approach to Risk Analysis | The National Academies Press
2 Analytic Issues and Factors Affecting Deterrence and Assurance | U.S. Air Force Strategic Deterrence Analytic Capabilities: An Assessment of Tools, Methods, and Approaches for the 21st Century Security Environment | The National Academies Press
3 Selected Discussion of Tools, Methods, and Approaches for Deterrence and Assurance | U.S. Air Force Strategic Deterrence Analytic Capabilities: An Assessment of Tools, Methods, and Approaches for the 21st Century Security Environment | The National Academies Press
New Research Holds Promise for Lighter, Tougher Vehicle Armor (UPDATED)
Pentagon Coming to Terms With Technological Realities - Blog
TechConnect World 2016
Current Issue : Nature
Mobile data: Made to measure : Nature : Nature Publishing Group
Bioanalytical devices: Technological leap for sweat sensing : Nature : Nature Publishing Group
Epigenetics: An elusive DNA base in mammals : Nature : Nature Publishing Group
Microbiology: Fungus produces a toxic surprise : Nature : Nature Publishing Group
Home : Nature podcast
Research by subject : Nature
Technology: Smartphone science : Naturejobs
24 hours at the X-ray factory : Nature News & Comment
Liars caught red-faced : Nature News
Radio sweat gland - 90 GHz : Nature News
Nature News & Comment
Biology software promises easier way to program living cells : Nature News & Comment
Can a video game company tame toxic behaviour? : Nature News & Comment
Electroceuticals spark interest : Nature News & Comment
Flagship brain project releases neuro-computing tools : Nature News & Comment
Nanotube implants show diagnostic potential : Nature News & Comment
The inside story on wearable electronics : Nature News & Comment
Wearable sweat sensor paves way for real-time analysis of body chemistry : Nature News & Comment
What could derail the wearables revolution? : Nature News & Comment
The scientist and the smartphone : Article : Nature Methods
Rehabilitation: Smartphone-based cardiac rehabilitation[mdash]a first RCT : Nature Reviews Cardiology : Nature Publishing Group
Spy Kid: A Young CIA Officer Breaks Cover and Spills Secrets - NBC News
6720 - 17th Annual Science & Engineering Technology Conference
On the American Front Line Against ISIS - The New Yorker
Chemical Weapon Munitions Dumped at Sea: An Interactive Map | James Martin Center for Nonproliferation Studies
Noodlesoft | Hazel
ISIS Is Trying To Create A Doomsday Bomb, But Is The Key Ingredient A Myth? : NPR
How College Students Battled Textbook Publishers To A Draw, In 3 Graphs : Planet Money : NPR
U.S. Naval Research Laboratory (NRL)
| NSF - National Science Foundation
SupraSensor - Science Nation | NSF - National Science Foundation
With Afghan Buildup, U.S. Expands Effort Against Roadside Bombs - The New York Times
No Business Too Small to Be Hacked - The New York Times
As Nuclear Security Summit Begins, Materials Remain Vulnerable to Theft - The New York Times
A C.I.A. Grunt’s Tale of the Fog of Secret War - The New York Times
The Dirty Old Men of Pakistan - The New York Times
Simulation and Interpretation: A Research Note on Utilizing Qualitative Research in Agent-Based Simulation | Open Access | OMICS International
Swarm Intelligence Journals | High Impact Articles list
The Latest Intelligence from Brussels | Overt Action | Research, analysis, & debate on critical intelligence challenges
About — Perceptronics Solutions
Nick Giacobe's Homepage
Chen Zhong's Homepage
www.physicscentral.com
Players in Eve Online are at war, here's what we know | Polygon
Portland News - Portland News, City & State Coverage | Portland News.Net
Powersim Studio | Powersim Software
SBP08: Workshop on Social Computing, Behavioral Modeling, and Prediction
SBP08:Workshop on Social Computing, Behavioral Modeliing, and Prediction
SBP09: Second Workshop on Social Computing, Behavioral Modeling, and Prediction
SBP09: Second Workshop on Social Computing, Behavioral Modeling, and Prediction
SBP09: Second Workshop on Social Computing, Behavioral Modeliing, and Prediction
New Research Finds Counter-Terrorism TACTICS for European Cities | RAND
Intelligence for an Age of Terror | RAND
RAND Arroyo Center Annual Report 2015 | RAND
Confessions of a Hybrid Warfare Skeptic | RAND
Do Significant Terrorist Attacks Increase the Risk of Further Attacks? Initial Observations from a Statistical Analysis of Terrorist Attacks in the United States and Europe from 1970 to 2013 | RAND
TACTICS: Policy and strategic impacts, implications and recommendations | RAND
After Brussels, far-right Islamophobes are doing exactly what ISIS wants them to do: threatening the “gray zone” - Salon.com
SBP: Social Computing, Behavioral-Cultural Modeling and Prediction
Encyclopedia:Computational intelligence - Scholarpedia
Encyclopedia:Dynamical systems - Scholarpedia
Scholarpedia
Futures signals sense-making framework (FSSF): A start-up tool to analyse and categorise weak signals, wild cards, drivers, trends and other types of information
The Big Picture – trends, drivers, wild cards, discontinuities and weak signals
Integrating organizational networks, weak signals, strategic radars and scenario planning
Weak signals and damage scenarios — Systematics to identify weak signals and their sources related to mass transport attacks
Integrating multicriteria decision analysis and scenario planning—Review and extension
The SEXTANT software: A tool for automating the comparative analysis of mental models of dynamic systems
Sentiment detection in social networks and in collaborative learning environments
Semantic weak signal tracing
Future Generation Computer Systems - ScienceDirect.com
Social Networks - ScienceDirect.com
Expert Systems with Applications - ScienceDirect.com
Digital Investigation - ScienceDirect.com
Defence Technology | Vol 12, Iss 2, Pgs 59-224, (April 2016) | ScienceDirect.com
Science Dynamics
The Top Science Communication Stories from March 2016 › The Leap
SCIP
Scopus preview - Scopus - Document details
Scopus preview - Scopus - Document details
Home | The Society for Modeling & Simulation International
Resource Links | The Society for Modeling & Simulation International
Archive of Proceedings of Conferences and Meetings
Publications
Publications | The Society for Modeling & Simulation International
ESE-680 Fall'11: Optimal Control Theory
Securboration, Inc.
Projects : Securboration, Inc.
Pentagon Invites Hackers to Attack its Websites | SecurityWeek.Com
The case for torture: Ex-CIA officials explain “enhanced” interrogations.
Rethinking the language of ‘offshore’: Secrecy Jurisdiction
SoarTech - Knowledge Center - Publications
SoarTech - Knowledge Center - Publications - A Framework For Modeling Social Power Structures
SoarTech - Knowledge Center - Publications - A Hands-off Multi-robot Display For Communicating Situation Awareness
SoarTech - Knowledge Center - Publications - A Multi-modal Intelligent User Interface For Supervisory Control Of Un
SoarTech - Knowledge Center - Publications - Acquiring Agent-based Models Of Conflict From Event Data
SoarTech - Knowledge Center - Publications - Agent-based Simulation Of Geo-political Conflict
SoarTech - Knowledge Center - Publications - Automating Battlefield Event Reporting
SoarTech - Knowledge Center - Publications - Behaviors That Emerge From Emotion And Cognition
SoarTech - Knowledge Center - Publications - Comparative Analysis Of Frameworks For Knowledge-intensive Intelligent
SoarTech - Knowledge Center - Publications - Enabling Battlefield Visualization
SoarTech - Knowledge Center - Publications - Pstk A Toolkit For Modeling Dynamic Power Structures
SoarTech - Knowledge Center - Publications - Soartech Autonomous Platforms Overview
SoarTech - Knowledge Center - Publications - Top-down Abduction For Behavior Detection In Gmti Data
Lecture Notes in Computer Science (LNCS)
Social Computing, Behavioral-Cultural Modeling and | William G. Kennedy | Springer
Change the World
Complex Decision Making - Theory and Practice | Hassan Qudrat-Ullah | Springer
Springer Nature
Collections Page
Technosocial predictive analytics for security informatics
Best Paper and Reviewer Awards : SRA
Stewart Robinson's Home Page
Stilwell Center Selected Publications
Free materials from Strategy Dynamics Ltd
The Official String Theory Web Site
System Dynamics Society
Conference Proceedings
2015 Conference
U.S. Department of Energy's Introduction to System Dynamics
U.S. Department of Energy's Introduction to System Dynamics
System Dynamics Discussion Forum • Index page
System Dynamics Review Articles
Systems Thinking World - SystemsWiki
Small State Intelligence Dilemmas: Struggling between Common Threat Perceptions and National Priorities - International Journal of Intelligence and CounterIntelligence - Volume 28, Issue 2
Does Terrorism Really Work? Evolution in the Conventional Wisdom since 9/11 - Defence and Peace Economics - Volume 22, Issue 6
The Modeler Meets the SME: The Challenge of Integrating Quantitative and Qualitative Models of Terrorist Decision Making - Democracy and Security - Volume 8, Issue 3
The Fourth Wave in Deterrence Research - Contemporary Security Policy - Volume 31, Issue 1
DARPA Project List (Defense Advanced Research Projects Agency)
Terrorist Decision-Making: Insights from Economics and Political Science | Shapiro | Perspectives on Terrorism
Analysing Terrorism from a Systems Thinking Perspective | Schoenenberger | Perspectives on Terrorism
What Are the Panama Papers? - The Atlantic
The 8-Bit Game That Makes Statistics Addictive - The Atlantic
Intel Analysts: We Were Forced Out for Telling the Truth About Obama’s ISIS War - The Daily Beast
Nancy A. Youssef - The Daily Beast
Shane Harris - The Daily Beast
The top 10 sources of data for international development research | Global Development Professionals Network | The Guardian
A world of hidden wealth: why we are shining a light offshore | News | The Guardian
The Panama Papers: what you need to know | News | The Guardian
The Whole Systems Partnership | Strategic Solutions in Health & Social Care
Think Tank Watch
Nils W. Metternich
SBP: Social Computing, Behavioral-Cultural Modeling and Prediction
SBP: Social Computing, Behavioral-Cultural Modeling and Prediction
LCCD Project: STOP
Systems Analysis Interesting Web Sites List
Cooley | The Ineffectiveness of American Covert Regime Change Operations During the Struggle Against Islamist Terrorism
VELOXITI, Inc. - Formerly Applied Systems Intelligence, Inc.
Left of Boom: The Struggle to Defeat Roadside Bombs (washingtonpost.com)
What Is Analytics? | Dedicated to Data Science, Analytics and Operational Research in Business and Education
BRIMS 2015 : Conference on Behavior Representation in Modeling and Simulation
MakerHealth is helping nurses prototype and innovate (Wired UK)
There might be a vegetarian gene (Wired UK)
Underground 'forest of fungi' discovered from space by Nasa (Wired UK)
WIRED Awake: 10 must-read articles for 1 April (Wired UK)
Review: Mota's JetJat Nano-C tiny camera drone (Wired UK)
Noah Shachtman | WIRED
THE IMPACT OF ANALYTICAL SUPPORT AND PREFERENCE DETERMINATION ON CONSISTENCY IN E-NEGOTIATIONS — A NEW METHOD AND PRELIMINARY RESULTS (World Scientific)
Wright-Patterson Air Force Base - AFRL
Wright-Patterson Air Force Base - AF Office of Scientific Research
Some “new” links for the Human Terrain System – ZERO ANTHROPOLOGY
Did the Belgian Authorities Purposely Trigger the Brussels Attacks? – ZERO ANTHROPOLOGY
Home | 2015 SpaceApps Challenge
Space Apps
Sysdea
Archive-It - Wikileaks 2010 Document Release Collection
Going Feral! Or “So long, and thanks for all the fish…” | asecondmouse
About… | asecondmouse
'Places & Spaces: Mapping Science' Exhibit Blends Big Data with Visualization | Infogr.am
System Simulation and Scientific Computing, Part II: International ... - Google Books
Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers - Committee on Human Factors, Board on Human-Systems Integration, Division of Behavioral and Social Sciences and Education, National Research Council - Google Books
U.S. Air Force Strategic Deterrence Capabilities in the 21st Century ... - Committee on U.S. Air Force Strategic Deterrence Capabilities in the 21st Century Security Environment: A Workshop, Air Force Studies Board, Division on Engineering and Physical Sciences, National Research Council - Google Books
Comparative Analysis of Technological and Intelligent Terrorism Impacts on ... - N.A. Makhutov - Google Books
Behavioral Modeling and Simulation: From Individuals to Societies - Committee on Organizational Modeling: From Individuals to Societies, Board on Behavioral, Cognitive, and Sensory Sciences, Division of Behavioral and Social Sciences and Education, National Research Council - Google Books
Advances in Design for Cross-Cultural Activities - Google Books
PRIMA 2013: Principles and Practice of Multi-Agent Systems: 16th ... - Google Books
Why Are Some Academics So Unprofessional? | Vitae
A systemic approach to heritage decision making? Not so much ‘complex’ as ‘dysfunctional’ and ‘cluttered’! | How should decisions about heritage be made?
Computer Crime Info » Blog Archive » Internet Search Links for April 2016 #OSINT
Should Cable, Internet Companies Be Required To Let You Cancel Service Online? – Consumerist
Maybe Pattern Recognition Will Work Better Than I Thought | Dart-Throwing Chimp
Yes, Forecasting Conflict Can Help Make Better Foreign Policy Decisions | Dart-Throwing Chimp
Pentagon names 8 companies to support $7.2B electronics program -- Defense Systems
DIYbio events for the week of April 4 | DIYbio
Directory of Open Access Journals
DARPA’s Crisis Early Warning and Decision Support System | Conflict Early Warning and Early Response
Digital signaling decouples activation probability and population heterogeneity | eLife
Scriptapedia - Wikibooks, open books for an open world
Dylan Schmorrow - Wikipedia, the free encyclopedia
Global Database of Events, Language, and Tone - Wikipedia, the free encyclopedia
Integrated Conflict Early Warning System - Wikipedia, the free encyclopedia
Philip Schrodt - Wikipedia, the free encyclopedia
System dynamics - Wikipedia, the free encyclopedia
The Good Judgment Project - Wikipedia, the free encyclopedia
New committee looks to elevate electronic warfare -- FCW
Carter sizes up emerging technology in Silicon Valley visit -- FCW
The 2016 Federal 100: Profiles of all this year's winners -- FCW
Making social media monitoring matter -- FCW
DOD unveils manufacturing center at MIT -- FCW
iOS
MIT Technology Review
OSINT
The Sweet Setup
2014-15 academic
Home - FOIA Mapper
Army describes future enterprise network -- GCN
philip-schrodt (Philip Schrodt ) · GitHub
Blackstone's Counter-Terrorism Handbook - Andrew Staniforth; Police National Legal Database (PNLD) - Oxford University Press
iBRABO | "BEFORE YOU SLAY THE GIANT YOU MUST FIND HIM"
The Economics of Terrorism and Counter-Terrorism: A Survey (Part I)
Society for Terrorism Research - Academia.edu
Insight Maker | Free Simulation and Modeling in your Browser
Milind Tambe on game theory in security applications - Machine Intelligence Research Institute
Artificial Intelligence @ MIRI
Nicklaus A. Giacobe Ph.D. | College of Information Sciences and Technology
IT (Information Technology) Tutorials
Duplicate File Finders - Freeware and Open Source
Il-Chul Moon | KAIST - Academia.edu
Download Academic Torrents - Kickass Torrents
Download Astronomy & Cosmos Origin Book Collection 2 of 3 118 Books Torrent - Kickass Torrents
Download Biology General Book collection 78 books Torrent - Kickass Torrents
Dr.Soc's Awesome Book Uploads - Page 153 - Community - Kickass Torrents
Download Ecology Book collection 56 books Torrent - Kickass Torrents
Download insurgency Books Torrents - Kickass Torrents
Download optimal control Books Torrents - Kickass Torrents
Profile of alotofthings - Uploads - Kickass Torrents
Profile of Dr.Soc. - Uploads - Kickass Torrents
Profile of LeipzigMRD - Uploads - Kickass Torrents
Profile of Mr.Gooner - Uploads - Kickass Torrents
Profile of quadrivium - Uploads - Kickass Torrents
Profile of Seduction28 - Uploads - Kickass Torrents
Profile of ssitimefill - Uploads - Kickass Torrents
Download Zoology-Unclassified Book Collection 50 books Torrent - Kickass Torrents
Download Zoology-Veterinary Resources Book Collection 35 books Torrent - Kickass Torrents
Daniel Kirkpatrick | University of Kent - Academia.edu
Inbox (197) - scitrenbaum@gmail.com - Gmail
Terrorism Monitor - Volume XIV, Issue 7 - scitrenbaum@gmail.com - Gmail
IT IS IMPORTANT TO LOOK AT & DOWNLOAD ME ASAP - stczztop@gmail.com - Gmail
10 Mac Menu Bar Apps You Can’t Live Without — Medium
mHealthHUB - Grand Data Challenge at SBP-BRiMs 2016
Analytical Methods for Dynamic Modelers | The MIT Press
Sellwood Bridge closed April 16-17 weekend for construction | Multnomah County
Using Drafts As A Main Text Editor – Tim Nahumck
Researchers develop new lens for terahertz radiation | News from Brown
The Panama Papers: Massive Leak Reveals the Global Elite's Secret Cash Havens | VICE News
NodeXL Graph Gallery
ISIS Europe bombers explode ‘lone wolf’ fallacy
CfKr4spWQAADBa8.jpg (600×600)
Nicklaus Giacobe | Penn State University - Academia.edu
Nation-State Cyber Actors Focused on “Maintaining Persistent Access” to U.S. Energy Infrastructure | Public Intelligence
Boston Fusion Center Bulletin: Terror Attacks on Entertainment Venues | Public Intelligence
U.S. State Department Iraq-Syria Refugee Crisis in Europe Map March 2016 | Public Intelligence
FBI Cyber Bulletin: Global Extremists Conducting Cyber Activity in Support of ISIL | Public Intelligence
Research portal
Inspiring Bodies: Military Technology from Nature | RUSI
Defeating Emplaced Improvised Explosive Devices (IED) Using Fusion Algorithms - SBIR Source
Benjamin Ducol - Google Scholar Citations
Philip A. Schrodt - Google Scholar Citations
Saad Khan - Google Scholar Citations
Matthew Gerber - Google Scholar Citations
Samuel Huddleston - Google Scholar Citations
Samuel Huddleston - Google Scholar Citations
Deniz Erdogmus - Google Scholar Citations
Stephen M. George - Google Scholar Citations
Gahangir Hossain - Google Scholar Citations
Dylan Schmorrow - Google Scholar Citations
Matthew Gerber - Google Scholar Citations
Samuel Huddleston - Google Scholar Citations
Daniel Meierrieks - Google Scholar Citations
Hyun-Woo "Anthony" Kim - Google Scholar Citations
Rong Jin - Google Scholar Citations
Waldemar Karwowski - Google Scholar Citations
Jonathan Pfautz - Google Scholar Citations
Chen Zhong - Google Scholar Citations
Nicklaus A. Giacobe - Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
MODELING HUMAN TEAM AND CULTURAL BEHAVIOR - Google Scholar
MacArthur: Information Operations as a Deterrent... - Google Scholar
McKay: A process for anticipating and shaping adversarial... - Google Scholar
McKay: A process for anticipating and shaping adversarial... - Google Scholar
Levchuk: Identifying the Enemy–Part I: Automated... - Google Scholar
Rios: Adversarial risk analysis for counterterrorism... - Google Scholar
Lindelauf: The influence of secrecy on the communication... - Google Scholar
Giacobe: Mining social media in extreme events: Lessons... - Google Scholar
Lathrop: The Modeler Meets the SME: The Challenge... - Google Scholar
Orendovici: Social Network Analysis and Simulation... - Google Scholar
Guikema: Modeling intelligent adversaries for terrorism... - Google Scholar
Sanfilippo: Technosocial predictive analytics for... - Google Scholar
Bernard: Modeling the interaction between leaders... - Google Scholar
Hartley: Vv&A for DIME-PMESII Models - Google Scholar
Bernica: Analysis and prediction of insurgent influence... - Google Scholar
Scanlon: Automatic detection of cyber-recruitment... - Google Scholar
Asman: Methodology for analyzing the compromise of... - Google Scholar
Lin: Risk management in asymmetric conflict: using... - Google Scholar
Automated Discovery and Prediction of Insurgent Behavior - Google Scholar
bryson and ho applied optimal control - Google Scholar
Computational Multilevel Structural Equations Model - Google Scholar
Crisis Early Warning and Decision Support: Contemporary Ap- proaches and Thoughts on Future Research - Google Scholar
Developing early warning systems: a checklist - Google Scholar
Leaderless Jihad: Terror Networks in the Twenty-First Century - Google Scholar
Managing strategic surprise by response to weak signals - Google Scholar
MODELING HUMAN TEAM AND CULTURAL BEHAVIOR - Google Scholar
Novel Methods to Detect Deception - Google Scholar
optimal control modeling - Google Scholar
optimal control theory - Google Scholar
Pre-incident indicators of terrorist incidents: the identification of behavioral, geographic, and temporal patterns of preparatory conduct - Google Scholar
Carter: Pre-Incident Indicators of Terrorist Attacks:... - Google Scholar
George: MECH: A model for predictive analysis of... - Google Scholar
Levey: Countering the Adversary - Google Scholar
Walden: Comparison of the STEEPLE Strategy Methodology... - Google Scholar
Grasso: Early warning systems: State-of-art analysis... - Google Scholar
Howard: Diplomatic, Information, Military and Economic... - Google Scholar
Research for Deterrence and Strategic Influence Analysis - Google Scholar
system dynamics hybrid warfare - Google Scholar
Hillson: The DIME/PMESII model suite requirements project - Google Scholar
Top arXiv papers
Inside Search: Easily save the images you love...now on desktop
Google Online Security Blog: More Encryption, More Notifications, More Email Security
1. Decision Making Analysis (DIME Model) - NSC Decision Making and Operation Allied Force
iOS 9.3.1 is out, with bug fix - Six Colors
Colouring flow networks | Systo
http://cns.iu.edu/docs/presentations/2016-borner-loc.pdf
Maman Abdurohman | Telkom University - Academia.edu
(45) Twitter
Alie Ward (@alieward) | Twitter
GW Cyber & Homeland (@gwcchs) | Twitter
Katy Borner (@katycns) | Twitter
SBP BRiMS Conference (@SBP_BRiMS) | Twitter
Syria Source on Twitter: "#ISIS European bombers defy ‘lone wolf’ fallacy https://t.co/fGSvk4dZpT @NOW_eng @disgraceofgod https://t.co/ZE9hAVoYWt"
Robert T Osborne | University of Denver - Academia.edu
JIEDDO TF PALADIN (W4FG08) - WikiLeaks
24 Hour Fitness: Free Pass
Twenty-Second IAAI Conference
Mining social media in extreme events: Lessons learned from the DARPA network challenge | Nicklaus Giacobe - Academia.edu
Academia.edu | Documents in Darpa - Academia.edu
Academia.edu | Documents in Forecasting and Prediction Tools - Academia.edu
It takes a network to defeat a network - The Boston Globe
Center for Homeland Defense and Security – The Nation's Homeland Security Educator
Center for the Study of Intelligence — Central Intelligence Agency
Getting to Know the President — Central Intelligence Agency
Studies in Intelligence — Central Intelligence Agency
Vol. 60 No. 1 — Central Intelligence Agency
In-Q-Tel — Central Intelligence Agency
Adversarial Risk Analysis - CRC Press Book
The Counterterrorism Handbook: Tactics, Procedures, and Techniques, Fourth Edition - CRC Press Book
Policy Considerations in Combating Terrorism: Decision-Making Under Conditions of Risk and Uncertainty | Combating Terrorism Center at West Point
Global Data Protection Handbook
Biology General - Dropbox
The Rise and Fall of the Cocaine High | National Institute on Drug Abuse (NIDA)
Edge Master Class 2015: Philip Tetlock: A Short Course in Superforecasting | Edge.org
Application of Optimal Control Theory to Enhanced Oil Recovery - Elsevier
How the UN's Office for the Coordination of Humanitarian Affairs Helped Assad and Hurt Syrians in Need | Foreign Affairs
Patent US8892484 - Related Art - Google Patents
applied optimal control bryson pdf - Google Search
applied optimal control optimization estimation and control - Google Search
applied optimal control pdf - Google Search
darpa projects list - Google Search
2015 NDIA Human-Systems Integration Conference - Google Search
A Class of Hybrid Algorithms for Optimizing Outcomes in High-Risk Dynamical Problems characterized by Variable Levels of Uncertainty among Key Parameters - Google Search
A Model for Predictive Analysis of Human Choices in Asymmetric Conflicts - Google Search
A new generation of conflict forecasting models. - Google Search
ADA549230 - Google Search
Adversarial Reasoning: Com putational Approaches to Reading the Opponent’s Mind. - Google Search
Adversarial Reasoning: Computational Approaches to Reading the Opponent’s Mind. - Google Search
AdversarialRiskAnalysiswith Incomplete Information - Google Search
Analytical Methods for Dynamic Modelers - Google Search
Automated Discovery and Prediction of Insurgent Behavior - Google Search
Behavior Representation in Modeling & Simulation - Google Search
Behavioral Operational Research - Google Search
Clandestine Explosive Laboratories - Google Search
Conference on Behavior Representation in Modeling and Simulation proceedings - Google Search
Conference on Computer Generated Forces and Behavioral Representation - Google Search
Countering Denial and Deception - Google Search
Counterterrorism Modeling - Google Search
Crisis Early Warning and Decision Support: Contemporary Ap- proaches and Thoughts on Future Research - Google Search
Cyber Maneuver Against External Adversaries and Compromised Nodes - Google Search
Design Tools Enabling Mission-Speci c Sensor Fields - Google Search
DIMACS 2010 - Google Search
dimacs workshop on information-theoretic network security - Google Search
Dr. Michael L. Bernard sandia - Google Search
Dylan Schmorrow - Google Search
Federating geovisual analytic tools for cyber security analysis - Google Search
Flexible Models to Analyze Opponent Behavior - Google Search
Forecasting Conflict - Google Search
Good sources of weak signals: A global study of where futurists look for weak signals - Google Search
H. Van Dyke Parunak - Google Search
Ian Lustick - Google Search
Influence Diagram of Red’s Decision - Google Search
International Security and Intelligence Studies Program - Google Search
Islamic State Hijacks Mosul University Chemistry Lab for Making Bombs - Google Search
Jesus Rios IBM research - Google Search
Jonathan Pfautz - Google Search
Learning & Prediction in Relational Time Serie - Google Search
measurement to intelligence: feature extraction, modeling and predictive analysis of asymmetric conflict events authors - Google Search
Feature Extraction, Modeling and Predictive Analysis of Asymmetric Conflict Events pdf - Google Search
Mining social media in extreme events : Lessons learned from the DARPA network challenge - Google Search
Modeling intelligent adversaries - Google Search
Modeling Populations of Interest to Simulate cultural responses to shaping activities - Google Search
Nicklaus Giacobe - Google Search
NormanGeddes - Google Search
Novel Approach for Generating Early Warnings to Prevent Terrorist Attacks - Google Search
nsupervised Spatial Event Detection in Targeted Domains with Applications to Civil Unrest Modeling - Google Search
Optimal Control Theory - Google Search
Philip A. Schrodt - Google Search
Predicting and Analyzing PMESII Effects of DIME Actions - Google Search
Predicting Crime Patterns with Behaviorally Grounded Mathematical Models - Google Search
Predictive Modeling - Google Search
Probabilistic modeling or terrorist threats: a systematic analysis approach to setting priorities among countermeasures - Google Search
RobustAdversarialRiskAnalysis - Google Search
Shawn C. McKay Adversarial Behavior - Google Search
Social Network Analysis and Simulation of the Development of Adversarial Networks - Google Search
SOMA Terror Organization Portal - Google Search
Statistical Methods in Counterterrorism - Google Search
Terrorist Decision Making - Google Search
The Balancing Act of Post-Conflict Reconstruction and the Need to Involve Local Groups, - Google Search
The Complex Event Modeling, Simulation, and Analysis - Google Search
The Cultural Order of Battle: Analysis and Decision-Making Over the Human Terrain - Google Search
The Economics of Terrorism and Counter-Terrorism: A Survey - Google Search
time to get real in sociocultural behavioral research and engineering: the rubber is hitting the road across the dod - Google Search
Turning Text into Behavioral Processes and Public Support - Google Search
Using Real-Time Decision Tools to Improve Distributed Decision-Making Capabilities in High-Magnitude Crisis Situations - Google Search
Workshop on Adversarial Decision Making - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0ahUKEwjigbqpuvTLAhWLxIMKHe65CkEQFgg-MAU&url=http%3A%2F%2Fwww.iscramlive.org%2FISCRAM2013%2Ffiles%2F130.pdf&usg=AFQjCNH0d2nQZ9q4iAsmsAbJf1_2hI-aiQ&sig2=cg_g9LXZkw1b62_4YEDF6Q&cad=rja
bryson and ho applied optimal control - Google Search
DIME PMESII system dynamics - Google Search
optimal control theory - Google Search
social computing behavioral-cultural modeling and prediction - Google Search
system dynamics hybrid warfare - Google Search
GrantForward Search Engine | Search for federal grants, foundation grants, and limited submission opportunities
Operation Predator App | ICE
BOM - INFORMS
Simulation Society - INFORMS
Detecting the Movement of Soils (Internal Erosion) Within Earthen Dams, Canals, Levees, and their Foundations | InnoCentive Challenge
Retiring professor says he's ready to leave academe and others should, too
Intelligence Careers | Jobs in the U.S. Intelligence Community
Recap of Recent Posts at Just Security (March 26–April 1) | Just Security
Lingo
Anthony Kim | LinkedIn
Dylan Schmorrow | LinkedIn
John Lathrop | LinkedIn
Shawn McKay PhD | LinkedIn
HUMAN - DNA Checks Itself Before It Wrecks Itself - Clothing | Tee
GLOBAL DIPLOMACY INDEX
Capture Ideas Quickly and Easily With Yeti – MacStories
Various Ways to Play Audiobooks On iOS Devices
April 30, 2015 MORS Wargaming Community of Practice Webinar — Adjudication
SBP and BRiMS 2016 | Open Agent Based Modeling Consortium
CoMSES Computational Model Library | Open Agent Based Modeling Consortium
OpenSesame Announces Training Jam in Portland, Oregon April 22-24, 2016 | OpenSesame
Conflict Prediction - PRIO
Menubar Apps - Apps that live in the OS X Menubar. Shoot me a note @dustin on Twitter for any apps I'm missing. by dustin senos
Product Hunt - Topics
The Online Fight Against ISIS by Colin P. Clarke and Isaac R. Porche III - Project Syndicate
Red (Team) Analysis - The Islamic State and Terrorist Attacks: License to Kill
Alexander Kott - Publications
Alok R Chaturvedi - Publications
Amos Freedy - Publications
Clifford Shearing
Ewart de Visser
Frank Stech - Publications
Gershon Weltman - Publications
Milind Tambe - Publications
Nasrullah Memon - Publications
Nicklaus A. Giacobe - Publications
Sarita Azad - Publications
William M. Mceneaney - Publications
An economy of choice Terrorist decision-making and criminological rational choice theories reconsidered
A multi-agent architecture for modelling and simulation of small military unit combat in asymmetric warfare
Mining social media in extreme events : Lessons learned from the DARPA network challenge
"Detecting Deception" in Alexander Kott and William M. McEneaney (eds.) ADVERSARIAL REASONING: COMPUTATIONAL APPROACHES TO READING THE OPPONENT’S MIND
Mining open source text documents for intelligence gathering
Using Real-Time Decision Tools to Improve Distributed Decision-Making Capabilities in High-Magnitude Crisis Situations
Good Enough is Good Enough: Overcoming Disaster Response Organizations’ Slow Social Media Data Adoption
A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement
Lessons from a Large-Scale Deployment of SEAS in Afghanistan
ISIS Encryption Opsec - Schneier on Security
Reddit's Warrant Canary Just Died - Schneier on Security
Smart Essay on the Limitations of Anti-Terrorism Security - Schneier on Security
Essays: Refuse to be Terrorized - Schneier on Security
Simulation Interoperability Standards Organization - SISO > Home
My Springer Journals, Academic Books & Online Media
US Competitiveness in Synthetic Biology | START.umd.edu
Data-Mining Algorithm Reveals the Stormy Evolution of Mathematics over 700 Years
The Best of the Physics arXiv (week ending April 2, 2016)
Resources - Toddington
U.S. Naval War College | Mahan Scholars
How the CIA managed to leave explosives on a special-needs school bus — without noticing - The Washington Post
U.S. Special Operations units are using faulty rifle sights - The Washington Post
7 million Americans at risk of man-made earthquakes, USGS says - The Washington Post
Nigeria’s missing children - The Washington Post
SecureNinjaTV th3j35t3r Laptop @ International Spy Museum - YouTube
Zotero | Home
Zotero | People > Spencer L Willardson > Library
Zotero | People > Spencer L Willardson > Library > Papers
Zotero | People > Spencer L Willardson > Library > Roles and Networks - with Cameron
Zotero | People > Spencer L Willardson > Library > FPA - Surge Article
Zotero | People
Zotero | People > Information Science and Technology
Zotero | People > Military Sciences
Zotero | People > Political Science
The best apps. Better together. - Zapier
Il-Chul Moon | KAIST - Academia.edu
: Subject: Terrorist decision-making
"Detecting Deception" in Alexander Kott and William M. McEneaney (eds.) ADVERSARIAL REASONING: COMPUTATIONAL APPROACHES TO READING THE OPPONENT’S MIND
Laura McLay — Innovative Decisions, Inc.
IAVO Research and Scientific: Products
Mitch
Human Social Culture Behavior Modeling — Milcord
Military Operations Research Society > Events
Dylan Schmorrow | LinkedIn
Future Generation Computer Systems - ScienceDirect.com
April 30, 2015 MORS Wargaming Community of Practice Webinar — Adjudication
A world of hidden wealth: why we are shining a light offshore | News | The Guardian
Government Surplus Auctions - GovDeals.com
t2/250 d fuse - Google Search
fisher micro-centrifuge 235 - Google Search
eBay Auction Management, eBay Templates, eBay Tools, and Image Hosting
Excel Add-In - Octopart
Datasheets, Electronic Parts, Components, Search - Octopart
Selling on eBay: Myths and Facts
VETCO.NET
Marketplace for Used measurement and test equipment at Used-Line
Tube 4-65A / 8165 / QB3/200
77 Tips and Tools for Selling on The New eBay
Sell Online with eBay or Amazon - Tool, Tips, Resources
hamspeak by QRZ.COM
Search T2 5 250V GLASS FUSE | Maplin
LabWrench | Lab Equipment Forums | Questions | Answers | Discussions
Jameco Electronics - Electronic Components Distributor
Test Equipment for Sale - Government Liquidation
GIXEN - Free eBay Auction Sniper
Free Auction Templates | eBay Auction Template | Auction Tips & Software
Service Manual free download,schematics,datasheets,eeprom bins,pcb,repair info for test equipment and electronics
www.ebay.tv/sch/Business-Industrial-/12576/i.html?_sop=12&_nkw=tektronix+pg502&_frs=1
Ham and Amateur Radio Transceivers | eBay
Ham and Amateur Radio Electronics | eBay
Your Guide to Buying a Cheap Digital Radio | eBay
Heathkit Power Supply | eBay
DMOZ - Science: Instruments and Supplies
Test Equipment and Electronics Information
Test Equipment and Electronics Information
Test Equipment and Electronics Information
Electronic Test Equipment Model Numbers
Optical Tables, Used Lab Equipment, Scientific Equipment
TechLinks...
The Wonderful World of Scrounging!
So you want to be a Scrounger
Oregon Swaps and Stores
The Technoid's Code
(Sunny) California Swaps and Stores
Used Test, Lab, Semiconductor Production Equipment Dealers
Tektronix TM-500 Series
Tektronix SG503 250kHz-250MHz Leveled Sine Wave Gen
323 RMS AC Voltmeter
Ham Radio Glossary
Antique Radio Forums • View topic - Heathkit IP-27 Low voltage DC power supply.
Vacuum Tube Superstore
The Electrostore.com - Electronic Surplus Parts & Equipment
The Best Amateur Radio and Shortwave Apps for iOS, Android and Windows smart phones | The SWLing Post
Items in Laboratory Stuff and Fishy Things shop on eBay.
Useful Links | Sonoma County Radio Amateurs
2500+ Auction Templates, Image Hosting & Listing Tools - SellerSourcebook.com
Using eBay to set up a molecular biology lab: costs less than $1000! – World's Fair
Selling Manager Pro: Creating products and listing templates
SORVALL "Porter-Blum" MT-2
resources:surplus [MightyOhm Wiki]
Links - Hacked Gadgets – DIY Tech Blog
Portland Resources for Dorks | DorkbotPDX
The OctoMY™ Blog: CNC Cheat Sheet
Anatomy Of A Perfect EBay Listing!
c.top4top.net/p_81xj2c1.jpg
Index of /
SCIENCE HOBBYIST: Top Page
Electronics surplus and science catalogs list, outlet stores and surplus supply websites
Electronics surplus and science catalogs list, outlet stores and surplus supply websites
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics Surplus: services and non-surplus mail order catalogs
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Refurbished, science equipment, reconditioned lab equipment – Atlantic Lab Equipment Inc.
TELEQUIPMENT CT71 Service Manual free download, schematics, eeprom, repair info for electronics
New and Used Laboratory Equipment for Sale, Auctions, Wanted | LabX
Low-Cost Audio Delay Line Uses 1-Bit ADC | Analog content from Electronic Design
Home - Sci-bay
Used Lab Equipment | Biodirect Pre-Owned Lab Equipment
Used Data Generators | Used Test Equipment | BMI Surplus
Sam's Laser FAQ - Laser Instruments and Applications
Used Oscilloscopes | Used Test Equipment | BMI Surplus
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab.