Light theme
Dark theme
Automatic (use operating system setting)
Shared: 306 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
01-02 All the LOVELY OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
01-03
Copy links to clipboard
Copy
Open
Laura R. Marusich - Google Scholar Citations
Frontiers | Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness | Cognitive Science
Access denied | MEMRI - The Middle East Media Research Institute
Sean M. Fitzhugh - Google Scholar Citations
Google Scholar Citations
Candescent Health
Homeland Security’s VACCINE Center pdf - Google Search
VACCINE - Purdue University
Investigative Analysis and Anomaly Detection - VACCINE - Purdue University
Resources - VACCINE - Purdue University
Cooperative Agreement No. 2009-ST-061-CI0001 - Google Search
VACCINE - Purdue University
Annual Reports - VACCINE - Purdue University
HICSS – HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES
⭐Predictive Interactive Visual Analytics for CCI: Planning, Response, and Resiliency
⭐Visualization and Analytics Centers
CiteSeerX — Analogy, Intelligent IR, and Knowledge Integration for Intelligence Analysis: Situation Tracking and the Whodunit problem
CVADA - CVADA
The Guidance on Conflict Analysis | DME for Peace
⭐VACCINE ANNUAL REPORT YEAR 3 April 1, 2011 March 31, Cooperative Agreement No ST-061-CI0001
Behavioral Profiling and the Biometrics of Intent - Harvard International ReviewHarvard International Review
Adapting strategies to dynamic environments in controllable stackelberg security games - IEEE Xplore Document
Perceptual Stability Analysis of a Graph Model System - IEEE Xplore Document
Hierarchical DSmP transformation for decision-making under uncertainty - IEEE Xplore Document
[COMM]gregater: A toolset for temporal communication patterns and dynamic network structure - IEEE Xplore Document
Do Good Fences Make Good Neighbors? Border Barriers and the Transnational Flow of Terrorist Violence | International Studies Quarterly
Research Outline for China’s Cultural Soft Power - Springer
Connecting Aged Parents with Their Adult Children Over Long Distances: Challenges and a Solution - Springer
Designing a Smart Scarf to Influence Group Members’ Emotions in Ambience: Design Process and User Experience - Springer
Chapter 11 | Russia > National Defense University Press > Charting a Course: Strategic Choices for a New Administration
Vapor Growth and Tunable Lasing of Band Gap Engineered Cesium Lead Halide Perovskite Micro/Nanorods with Triangular Cross Section - ACS Nano (ACS Publications)
scholar.google.com/scholar_url?url=http://homepages.uc.edu/~weix2/nspw2016Final.pdf&hl=en&sa=X&scisig=AAGBfm3ZMANhPKPRqPDAO6LKJE6kdpCXTQ&nossl=1&oi=scholaralrt
Can Civil Society Tame Violent Extremism in Pakistan? - ProQuest
Aid as a Tool against Insurgency: Evidence from Contested and Controlled Territory in Afghanistan - ProQuest
INEE Toolkit - Implementation Tools - Conflict Analysis
Cell Press: Cell Press
The Stroz Friedberg Cyber Brief — Center on National Security
Informatics | Free Full-Text | Designing a Situational Awareness Information Display: Adopting an Affordance-Based Framework to Amplify User Experience in Environmental Interaction Design | HTML
Multi-stakeholder processes - Peace Portal
Publications - VACCINE - Purdue University
Research Overview - VACCINE - Purdue University
DIUx: Capturing Technological Innovation | RAND
Research — Renard Sexton
Rocket Dog Women's Shoes - Trends - Rocket Dog
Counterplanning: A strategy-based model of adversary planning in real-world situations
Handbook on Securing Cyber-Physical Critical Infrastructure - ScienceDirect
A Utility-based Link Prediction Method in Social Networks
GeoHumanities, GIScience and Smart City Lifeworld approaches to geography and the new human condition
The true accessibility of mountaineering: The case of the High Himalaya
The Role of Aesthetics and Perception in Raising Situation Awareness: Lessons from SpringRain: International Journal of Human–Computer Interaction: Vol 32, No 4
List of Frameworks for Conflict Analysis / Articles - The Broker
The Washington Institute for Near East Policy - The Washington Institute for Near East Policy
Today’s Apps Gone Free: Fractal Space, Change, Terrain Radar and More
25th Annual Computational Neuroscience Meeting: CNS-2016 | BMC Neuroscience | Full Text
Group Decision and Negotiation 2014 GDN 2014: Proceedings of the Joint ... - Google Books
Cases on Research and Knowledge Discovery: Homeland Security Centers of ... - Google Books
Replication Data for: Aid as a Tool against Insurgency: Evidence from Contested and Controlled Territory in Afghanistan - Harvard Dataverse
NOTE: How to Train a Criminal: Making Fully Autonomous Vehicles Safe for Humans
"Google Scholar" (3) - scitrenbaum@gmail.com - Gmail
Inbox (1,267) - stczztop@gmail.com - Gmail
The “X” Is for Experimental – Medium
Jesus Garcia Herrero - Google Scholar Citations
Zhigang Zhu - Google Scholar Citations
Earl J. Wagner - Google Scholar Citations
Lauro Snidaro - Google Scholar Citations
Alex Aved - Google Scholar Citations
Kenneth D. Forbus - Google Scholar Citations
Erik Blasch - Google Scholar Citations
Zhenyu Cheryl Qian - Google Scholar Citations
Bingwei Liu - Google Scholar Citations
Yu Chen - Google Scholar Citations
Eloi Bosse - Google Scholar Citations
Haibin Ling (凌海滨) - Google Scholar Citations
Larry Birnbaum - Google Scholar Citations
Zhang: Real-time identification and monitoring of... - Google Scholar
Garcia: A Proposed Methodology for Predicting Opponent... - Google Scholar
Thoms: Situation awareness-a commander's view - Google Scholar
Centers of Excellence | Homeland Security
A Proposed Methodology for Predicting Opponent Behaviour in Conflict Analysis - Google Search
Command, Control, and Interoperability Center for Advanced Data Analysis - Google Search
Manual for Conflict Analysis - Google Search
Predictive Interactive Visual Analytics for CCI: Planning, Response, and Resiliency - Google Search
DHS VACCINE ANNUAL REPORT addendum - Google Search
Home
Saved Session - Session Buddy
01-02
Copy links to clipboard
Copy
Open
Twenty-First Century Information Warfare and the Third Offset Strategy > National Defense University Press > News
Biographies of keynote speakers, panelists and conference committee members
Modeling and Simulation, Wargames, Wargaming, Military Simulations and Exercises
DSpace@MIT: Defeat in victory : organizational learning dysfunction in counterinsurgency
Thoughts on the DoD wargaming workshop at the Army War College | PAXsims
JDMS | PAXsims
PSOM | PAXsims
US Army War College | PAXsims
Zones of Control: Perspectives on Wargaming (Game Histories): Pat Harrigan, Matthew G. Kirschenbaum, James F. Dunnigan: 9780262033992: AmazonSmile: Books
Hans Steensma on Twitter: "Thoughts on the DoD wargaming workshop at the Army War College https://t.co/ZWURQQghJ4 via #PeterPerla"
Revitalizing Wargaming is Necessary to Be Prepared for Future Wars
(17) Modeling Information Operations in a Tactical-level Stabilization Environment | Helen Gaffney - Academia.edu
Decision Support for Complex Systems-of-Systems - Google Search
Information Operations Team Training & Information Operations Training Aid, Information Warfare Effectiveness (IWE) Program, Delivery Order 8 - Google Search
Modeling and Simulation, Wargames, Wargaming, Military Simulations and Exercises - Google Search
Thoughts on the DoD wargaming workshop at the Army War College - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwi7-o7Vh6XRAhUW22MKHUpHArgQFgg0MAQ&url=http%3A%2F%2Fwww.strategicstudiesinstitute.army.mil%2FPDFfiles%2FPCorner%2FWargameHandbook.pdf&usg=AFQjCNGlwAgKcICITpIdI8uAmOACqQXIJg&sig2=lLlX5CQfKScLVcEzj123oA
OpenAIRE - Publication: Unilateral Exceptions to Inter...
Nicolas Sabouret
The Use of Information Operations (IO) in Immersive Virtual Environments (IVE)
Applying the Domains of Conflict to Information Operations
Information Operations Team Training & Information Operations Training Aid, Information Warfare Effectiveness (IWE) Program, Delivery Order 8
Influencing Friends and Allies: Information Operations Doctrine and the Role of the Combatant Commander
Modeling Information Operations in a Tactical-level Stabilization Environment
The Peace Support Operations Model: Modeling Techniques Present and Future
Understanding Strategic Information Manoeuvres in Network Media to Advance Cyber Operations: A Case Study Analysing pro-Russian Separatists’ Cyber Information Operations in Crimean Water Crisis
Joseph V. Benson - ResearchGate
R.J. Staker - ResearchGate
François Prenot-Guinard - ResearchGate
Unilateral Exceptions to International Law: Systematic Legal Analysis and Critique of Doctrines that Seek to Deny or Reduce the Applicability of Human Rights Norms in the Fight against Terrorism
European Commission : CORDIS : Projects & Results Service : "Detection Technologies, Terrorism, Ethics and Human Rights"
European Commission : CORDIS : Projects & Results Service : SEC-2012.1.3.2- Homemade explosives (HMEs) and recipes characterisation- Capability
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Bridging human rights and the fight against terrorism
European Commission : CORDIS : Projects & Results Service : Final Report Summary - DETECTER (Detection Technologies, Terrorism, Ethics and Human Rights)
European Commission : CORDIS : Search : Results page
Datasets | European Union Open Data Portal
Home | HOMER Project
DETECTER Home
www.detecter.bham.ac.uk/documents.shtml
FORTRESS- Foresight tools for responding to cascading effects
OpenAIRE - Project: Detection Technologies, Terror...
Multimedia Knowledge and Social Media Analytics Laboratory
PLOS Currents Disasters
Europe PMC
Publications | Santa Fe Institute
Swedish Defence Research Agency - Totalförsvarets forskningsinstitut
MEMRI - The Middle East Media Research Institute |
greta's gouge: Friday's Miscellany 12-30-2016
BizMo Diaries: Wanderers 2017.12.27
Reporting Behind Enemy Lines in Mosul | Foreign Policy
Problems and Prospects of Defense COIN Wargaming | Small Wars Journal
Refining the MDMP for Operational Adaptability | Small Wars Journal
Wargaming Courses of Action During Other-Than-Major Combat Operations | Small Wars Journal
Monthly Newsletter
Resources | Unconstrained Analytics
Search Results
Homepage - CSS – Center for Security Studies | ETH Zurich
Datasets – Center for Security Studies | ETH Zurich
Digital Library – Center for Security Studies | ETH Zurich
The Ten Most Popular DARPA Stories of 2016
Defense Technical Information Center
Preventive Policing, Surveillance, and European Counter-Terrorism: Criminal Justice Ethics: Vol 30, No 1
Weekly Updates
Welcome to searx — searx 0.10.0 documentation
Pocket Explore
Terrorism: Commentary on Security Documents - Oxford University Press
Home - InformNapalm.org (English)
Drafts TapCellar – nahumck.me
Brousmiche: Modeling the Impact of Combat and Influence... - Google Scholar
(17) Effectiveness in Active Adaptation Planning for the Contemporary Operational Environment: from Influence to Change | Fodé Beaudet - Academia.edu
(17) Strategy (Military Science) Research Papers - Academia.edu
NATO Guest Lecture Part 3: We asked Juliette: How do information operations / public affairs offices figure into NATO’s operations? How does NATO manage its media relations? - University of Maryland, College Park | Coursera
NATO Science and Technology Organization Publications
SAS-105 Information Operations for Influence
SAS-117 Information Operations for Influence (IOI)
SAS-105 Symposium on "Information Operations for Influence “
STO-MP-SAS-105
Information Operations for Influence nato - Google Search
SAS-105 NATO - Google Search
STO-MP-SAS-105 - Information Operations for Influence - Google Search
STO Information Operations for Influence - Google Search
Symposium on "Information Operations for Influence - Google Search
: NATO STO System Analysis and Studies Panel ( - Google Search
NATO Psychological Operations (PSYOP) to Influence Emotions and Sway Public Opinion | Global Research - Centre for Research on Globalization
Modeling the impact of combat and influence actions on population attitudes towards forces: An agent-based approach
Deciphering Competition Between al-Qa`ida and the Islamic State | Combating Terrorism Center at West Point
the dimension of the information environment is composed of c2 systems - Google Search
Ccaps Conflict Dashboard - Google Search
DASW01-04-C-0003, Task AI-1-2810 - Google Search
Disinformation in Hybrid Warfare - Google Search
2 tabs
Copy links to clipboard
Copy
Open
email checker: discover social networks from an email address |ManyContacts
Inoreader How-to: Save time with Rules | The Inoreader blog
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.