Light theme
Dark theme
Automatic (use operating system setting)
Shared: 246 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
PApers TO DOWNLOAD
Copy links to clipboard
Copy
Open
Online Social Networks Event Detection: A Survey - Springer
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
ProQuest Document View - Homo informaticus intelligens: Building a theory of intelligence analysts as information foragers
管理科学学报(英文)
Identifying Human Capital Externality: Evidence from China
"The Non-Economic Functions of Insurgent Taxation: Evidence from the Is" by Mara Revkin
Instagram Use, Loneliness, and Social Comparison Orientation: Interact and Browse on Social Media, But Don't Compare | Abstract
Social Media account linkage using user-generated geo-location data - IEEE Xplore Document
Mapping the Impact of Social Media for Innovation: The Role of Social Media in Explaining Innovation Performance in the PDMA Comparative Performance Assessment Study - Roberts - 2016 - Journal of Product Innovation Management - Wiley Online Library
Using Product Variables of Business- to-Business (B2B) Media to Assess the Impacts of Social Media
Agent based simulation on the process of human flesh search—From perspective of knowledge and emotion
Explaining Donald Trump via communication style: Grandiosity, informality, and dynamism
A personal knowledge management metamodel based on semantic analysis and social information | SpringerLink
Multi-agent and Complex Systems - Springer
Games on Large Networks: Information and Complexity. - IEEE Xplore Document
How the government’s punishment and individual’s sensitivity affect the rumor spreading in online social networks
Relative Neighborhood Graphs Uncover the Dynamics of Social Media Engagement - Springer
Data-driven system identification of the social network dynamics in online postings of an extremist group - IEEE Xplore Document
Exploring tensions in knowledge networks: Convergences and divergences from social capital, actor-network theory and sociologies of the south
CEEOL - Article Detail
A survey of event detection techniques in online social networks | SpringerLink
A computational intelligence decision-support environment for architectural and building design: CIDEA - IEEE Xplore Document
Multisensor data fusion for an autonomous ground vehicle - IEEE Xplore Document
Distributed secondary control for isolated microgrids under malicious attacks - IEEE Xplore Document
Frame-based analysis of knee extension exercises using a smartphone accelerometer - IEEE Xplore Document
Smartphone-based transport mode detection for elderly care - IEEE Xplore Document
Smartphone based automatic abnormality detection of kidney in ultrasound images - IEEE Xplore Document
Smartphone-based arrhythmia monitoring. : Current Opinion in Cardiology
NFD: Non-Technical Loss Fraud Detection in Smart Grid
A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks
Game Theoretic Path Selection to Support Security in Device-to-Device Communications
OSA | Optical Fiber Spectrometer based on Smartphone Platform for Refractive Index Sensing Application
Application of the U - He chronometer to the analysis of nuclear forensic materials - Analytical Chemistry (ACS Publications)
Aryya Gangopadhyay - Publications
Complex Event Recognition from Open Source Social Media - Google Search
O'Reilly Discounts Every eBook By 50% - Slashdot
The Best Cyber Monday Deals Available Right Now
isayeret.com | The Israeli Special Forces Database
Social media and prediction: crime sensing, Data integration and statistical modelling. Using the Collaborative Online Social Media Observatory (COSMOS) to link police incident, Census 2011 and Twitter data - NCRM EPrints Repository
Welcome to the NCRM EPrints Repository - NCRM EPrints Repository
Resources
CounterStrikeMedia - CounterStrikeTV Home
Project Descriptions | kno.e.sis
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: UR SMART: Social Media Analysis Research Toolkit
VACCINE ANNUAL REPORT Visual analytics - Google Search
Counter-Terrorism Strategic Communications (CTSC) | ICCT
Publications | ICCT
Lighting the Path: the Evolution of the Islamic State Media Enterprise (2003-2016) | ICCT
Semantic Complex Event Processing for Decision Support - Springer
complex event processing open source - Google Search
Social Media and Digital Collaboration | ICIS 2016 Proceedings
"Google Scholar" (52) - scitrenbaum@gmail.com - Gmail
Iranian and Hezbollah Hybrid Warfare Activities: A Small Wars Journal Anthology - Dave Dilegge, Rubert J. Bunker, Alma Keshavarz - Google Books
Saved Session - Session Buddy
NOT-OD-17-015: NIH Request for Information (RFI) on Strategies for NIH Data Management, Sharing, and Citation
Russian Influence Operations – Damn, They Suck – To Inform is to Influence
Today’s Apps Gone Free: Escape from the Pyramid, Translator Widget, Nighty Night and More
The Dilemma of Defense Innovation and Adaptation (Part II) | Small Wars Journal
The Costs of War with Iran: An Intelligence Preparation of the Battlefield | Small Wars Journal
What Does Donald Trump's Victory Mean for Asia?
Watch Out for Terror's First Incubators - by Husain Haqqani
Publications - Institute for Security and Development Policy
cognitive | Public Intelligence
Cultural Intelligence | Public Intelligence
Joint Chiefs of Staff | Public Intelligence
Joint Staff Strategic Multi-Layer Assessment on Bio-Psycho-Social Applications to Cognitive Engagement | Public Intelligence
Joint Operating Environment 2035: The Joint Force in a Contested and Disordered World | Public Intelligence
U.K. Ministry of Defence Future Operating Environment 2035 | Public Intelligence
(U//FOUO) Joint Center for International Security Force Assistance Guide: Roles and Functions of Senior Advisors | Public Intelligence
Joint Staff Strategic Assessment: Counter-Da’esh Influence Operations Cognitive Space Narrative Simulation Insights | Public Intelligence
surrender | Public Intelligence
DHS NCCIC Report on the Art of Social Engineering | Public Intelligence
smartcard | Public Intelligence
How to Conduct Psychological Operations | Public Intelligence
U.S. Army Special Operations Command Presentation: Concept for Cognitive Joint Force Entry | Public Intelligence
DHS Geospatial Concept of Operations (GeoCONOPS) Version 6 | Public Intelligence
Joint Chiefs of Staff Guide Offers Blunt Assessment of Afghan National Police | Public Intelligence
Resources | 2017 Index of U.S. Military Strength
Fragile and Conflict-Affected Situations | Asian Development Bank
Center for a New American Security
Download the 2017 Index | 2017 Index of U.S. Military Strength
ONR Complex Event Recognition from Open Source Social Media Award | Contract Research and Development
A--Award - - Federal Business Opportunities: Opportunities
Army Systems Adaptive Red Team /Technical Support and Operational Analysis (ART/TSOA) RFI | Contract Research and Development
Home | SRI International
Open Source Software | The Ames Laboratory
SSRN Electronic Library
Knowledge Discovery Laboratory - UMass Amherst
CiteSeerX — EVOLVABLE SIMULATIONS APPLIED TO AUTOMATED RED TEAMING: A PRELIMINARY STUDY
Library | kno.e.sis
A co-evolutionary approach for military operational analysis - Semantic Scholar
A co-evolutionary approach for military operational analysis - Semantic Scholar
Amit Sheth: Educator, Researcher, Entrepreneur
Amit Sheth - Google Scholar Citations
Amit Sheth: Educator, Researcher, Entrepreneur
Advanced Analytic Techniques
dblp: Fanchao Zeng
rakunde - TPB
Amit Sheth: Educator, Researcher, Entrepreneur
Knowledge Enabled Approach to Predict the Location of Twitter Users | kno.e.sis
Library | kno.e.sis
Library | kno.e.sis
Library | kno.e.sis
An Information Filtering and Management Model for Twitter Traffic to Assist Crises Response Coordination | kno.e.sis
Library | kno.e.sis
A Hybrid Approach to Finding Relevant Social Media Content for Complex Domain Specific Information Needs | kno.e.sis
Perceptual Computing and the Human Experience - DATAVERSITY
evolving optimal and diversified military operational plans for computational red teaming - Google Search
eva nozableeda - Google Search
Saved Session - Session Buddy
Ismailcem Budak Arpinar - ResearchGate
Amit Sheth
ACE Framework - Semantic Scholar
Amit Sheth - Publications
Automated modeling and analysis of agent-based simulations using the CASE framework - IEEE Xplore Document
Computational Red Teaming - Springer
Publications | Complexica
www.isvg.org
Axioms | Free Full-Text | Summary of Data Farming | HTML
Perspectives on Culture and Agent-based Simulations: Integrating Cultures - Google Books
Alfresco » Document Library
Alessandro Farinelli - Google Scholar Citations
Mahinthan Chandramohan - Google Scholar Citations
Malcolm Yoke Hean Low - Google Scholar Citations
Jesus Cerquides - Google Scholar Citations
Google Scholar Citations
Baldwin: Simulation Approaches for System of Systems:... - Google Scholar
Red teaming with - Google Search
rox- imity, an open-source software environment developed by the Knowledge Discovery Laboratory - Google Search
Mei-Po Kwan - Publications
Automated modeling and analysis of agent-based simulations using the CASE framework - Semantic Scholar
Giving meaning to tweets in emergency situations: a semantic approach for filtering and visualizing social data | SpringerPlus | Full Text
Amadou Gning - ResearchGate
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis
dblp: Karl Granström
dblp: Hossam S. Hassanein
dblp: Sharief M. A. Oteafy
domingo mery :: Material
domingo mery :: Publications
DOD/IC Problems - Stanford H4D - Spring 2016
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis - IEEE Xplore Document
Tiered Data Integration for Mobile Health Systems - IEEE Xplore Document
Detectability prediction of hidden Markov models with cluttered observation sequences - IEEE Xplore Document
iniwall.com
PLOS ONE: Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya
Hierarchical abnormal event detection by real time and semi-real time multi-tasking video surveillance system | SpringerLink
Which Centrality Metric for Which Terrorist Network Topology? - Springer
List of Publications of T. Kirubarajan (Kiruba)
JMIR-Review of Extracting Information From the Social Web for Health Personalization | Fernandez-Luque | Journal of Medical Internet Research
Big Data and Data Science for Security and Fraud Detection
Sensors | Free Full-Text | Multi-Target Tracking Based on Multi-Bernoulli Filter with Amplitude for Unknown Clutter Rate
Sensors | Free Full-Text | Analysis of Android Device-Based Solutions for Fall Detection
Sensors | Free Full-Text | Full On-Device Stay Points Detection in Smartphones for Location-Based Mobile Applications
Sensors | Free Full-Text | BlueDetect: An iBeacon-Enabled Scheme for Accurate and Energy-Efficient Indoor-Outdoor Detection and Seamless Location-Based Service
Sensors | Free Full-Text | myBlackBox: Blackbox Mobile Cloud Systems for Personalized Unusual Event Detection
Physical Sensors - A section of Sensors
Sensor Networks - A section of Sensors
Sensors | Special Issue : Data in the IoT: from Sensing to Meaning
www.mdpi.com/journal/sensors/special_issues/algorithms_mobile_sensing
Big Data Helping to Pinpoint Terrorist Activities, Attacks (UPDATED)
BioMedical Engineering OnLine | Home page
Datafloq - How Big Data is Aiding in the Fight Against Terrorism
DSpace@MIT: Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition
Erik Blasch - Google Scholar Citations
Mervat Abu-Elkheir - Google Scholar Citations
Karthika: A comparative study of social networking... - Google Scholar
Granström: Asymmetric Threat Modeling Using HMMs:... - Google Scholar
Granström: Asymmetric Threat Modeling Using HMMs:... - Google Scholar
Detectability prediction of hidden Markov models with cluttered observation sequences. - Google Scholar
Choudhary: A Survey on Social Network Analysis for... - Google Scholar
Yang: Covert nodes mining in social networks based... - Google Scholar
Campbell: Social network analysis with content and graphs - Google Scholar
Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis - Google Search
Automated Detection of Threat Objects Using Adapted Implicit Shape Model - Google Search
Big Data for Remote Sensing: Challenges and Opportunities - Google Search
Detectability prediction of hidden Markov models with cluttered observation sequences - Google Search
Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition - Google Search
Multitasking intelligent surveillance and first response system - Google Search
Real time big data analytics for predicting terrorist incidents - Google Search
Tracking Small UAVs Using a Bernoulli Filter - Google Search
Review of extracting information from the Social Web for health personalization. - PubMed - NCBI
How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX. - PubMed - NCBI
Crowdsourcing, citizen sensing and sensor web technologies for public and environmental health surveillance and crisis management: trends, OGC stan... - PubMed - NCBI
A survey of online activity recognition using mobile phones. - PubMed - NCBI
Giving meaning to tweets in emergency situations: a semantic approach for filtering and visualizing social data. - PubMed - NCBI
Branko Ristic - Publications
Lyudmila Mihaylova - Publications
Bernoulli Particle/Box-Particle Filters for Detection and Tracking in the Presence of Triple Measurement Uncertainty
State estimation and fault detection using box particle filtering with stochastic measurements
Portland State University Library
ICIS 2016 Proceedings | International Conference on Information Systems (ICIS) | Association for Information Systems
International Conference on Information Systems (ICIS) | Association for Information Systems Research | AIS Electronic Library (AISeL)
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Understanding Moderators of Peer Influence for Engineering Viral Marketing Seeding Simulations and Strategies
Human-Computer Interaction | ICIS 2016 Proceedings
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Empirical Evaluation of Automated Sentiment Analysis as a Decision Aid
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Predicting Medication Prescription Rankings with Medication Relation Network
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Self-determination theory as an explaining mechanism for the effects of patient’s social media use
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Social Connectedness and Leadership in Online Communities
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Reputation, User Feedback, and Perceived Information Quality in Social Internet Media: An Empirical Study
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Momentum in Social Media and Offline Car Sales after Automobile Recalls
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: How Far We Can Go: A Model of Online Activism, Enabling Dynamics, and Social Change
AIS Electronic Library (AISeL) - ICIS 2016 Proceedings: Analysis of Executive Reputation in Social Media Networks
Social Media and Their Affordances for Organizing: A Review and Agenda for Research | Academy of Management Annals
Email communications analysis: how to use computational intelligence methods and tools? - IEEE Xplore Document
Predicting the Future with Social Media - IEEE Xplore Document
Visual investigation of similarities in Global Terrorism Database by means of synthetic social networks - IEEE Xplore Document
A tool-target based approach for simulating a terrorist attack - IEEE Xplore Document
On the Design of a System for Airport Protection against Terrorist Attacks Using MANPADs - IEEE Xplore Document
Susceptibility to URL-based Internet attacks: Facebook vs. email - IEEE Xplore Document
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications - IEEE Xplore Document
The economic costs of natural disasters, terrorist attacks, and other calamities: An analysis of economic models that quantify the losses caused by disruptions - IEEE Xplore Document
GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits - IEEE Xplore Document
Toward Predicting Susceptibility to Phishing Victimization on Facebook - IEEE Xplore Document
IEEE Xplore Full-Text PDF:
IEEE Xplore Full-Text PDF:
IEEE Xplore: IET Microwaves, Antennas & Propagation - (Current Issue)
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
An open letter to Mr. Secretary general of the united nations to propose setting up global standards for conquering growth limits of capitalism | Journal of Open Innovation: Technology, Market, and Complexity | Full Text
Asymptotic Analysis for Functional Stochastic Differential Equations - Springer
Deep Bi-directional Long Short-Term Memory Neural Networks for Sentiment Analysis of Social Data - Springer
An Evidential Method for Multi-relational Link Prediction in Uncertain Social Networks - Springer
A Qualitative Analysis on Facilitating... - 교보문고 스콜라
Proceedings of the International Conference on Interdisciplinary Studies (ICIS 2016) - Interdisciplinarity and Creativity in the Knowledge Society | InTechOpen
Resources | Free Full-Text | System Dynamics Modeling for Agricultural and Natural Resource Management Issues: Review of Some Past Cases and Forecasting Future Roles | HTML
Physica A: Statistical Mechanics and its Applications | Articles in Press | ScienceDirect.com
A social media text analytics framework for double-loop learning for citizen-centric public services: A case study of a local government Facebook use
kurt godel - Wolfram|Alpha
Defence Science and Technology Laboratory - Wikipedia
Welcome - ICIS 2016
Resnik: SCALABLE MULTIDIMENSIONAL RESPONSE MEASUREMENT... - Google Scholar
Sirois: Potential and limits of numerical modelling... - Google Scholar
Civil Unrest Event Data - Google Search
Potential uses of Numerical Simulation for the Modelling of Civil Conflict - Google Search
Predicting Medication Prescription Rankings with Medication Relation Network - Google Search
Usage Behavior of Social Network Sites in the Aftermath of Terrorist Attacks - Google Search
defense and technology laboratory - Google Search
Defence Science and Technology Laboratory - GOV.UK
Working for Dstl - Defence Science and Technology Laboratory - GOV.UK
IEEE - 2016 International Conference in Information Science (ICIS)
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.