Light theme
Dark theme
Automatic (use operating system setting)
Shared: 152 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
12-26
Copy links to clipboard
Copy
Open
Jianbo Gao - Google Search
Computational modeling of brain pathologies: the case of multiple sclerosis
Best Of 2016: Rise Of The Robots « Breaking Defense - Defense industry news, analysis and commentary
Syria in 2016 (October onwards) - Page 128 - Small Wars Council
Police Discretion in the 21st Century Surveillance State Policing the Police 2016 University of Chicago Legal Forum 2016
Multi image integration and Encryption Algorithm for security applications - IEEE Xplore Document
Terrorism, Radicalisation, Extremism, Authoritarianism and Fundamentalism: A Systematic Review of the Quality and Psychometric Properties of Assessments
Measuring Emotion in Parliamentary Debates with Automated Textual Analysis
PLOS ONE: Search Results
202.174.84.89
Building the Multi-Modal Storytelling of Urban Emergency Events Based on Crowdsensing of Social Media Analytics | SpringerLink
The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps | SpringerLink
Semantic event fusion of computer vision and ambient sensor data for activity recognition to support dementia care | SpringerLink
Advances in Complex Societal, Environmental and Engineered Systems - Springer
Physics Notebook — Physics Notes
Small Wars Journal
A Tale of Two Design Efforts (and why they both failed in Afghanistan) | Small Wars Journal
Does Design Help or Hurt Military Planning: How NTM-A Designed a Plausible Afghan Security Force in an Uncertain Future - Part II | Small Wars Journal
Does Design Help or Hurt Military Planning: How NTM-A Designed a Plausible Afghan Security Force in an Uncertain Future, Part I | Small Wars Journal
The Spatial Diffusion of Counterterrorist Legislation, 1970-2011 | Social Problems
Islamic State group: The full story - BBC News
Centre of Excellence Defence Against Terrorism
Centre of Excellence Defence Against Terrorism
Defence Research and Development Canada | Publications
Analysis | Hoover Institution
The Story of the Tunisian Revolution | Hoover Institution
Vol 5, No 3 (2016)
Welcome to the United Nations
Filmmaker Installed Security Software On a Decoy Phone To Spy On Smartphone Thieves - Slashdot
Advances in Complex Societal, Environmental and Engineered Systems - Google Books
Data Science for Suicide Bombings: Can You Predict the Next Attack? - Sana Rasheed - Google Books
US Assistance, Development, and Hierarchy in the Middle East: Aid for Allies - Anne Mariel Zimmermann - Google Books
"Google Scholar" (5) - scitrenbaum@gmail.com - Gmail
CEEOL - Browse by Subjects
Início
Terrorism | Crime areas | Europol
Crime Areas | Europol
Publications & Documents | Europol
ProtestLab: A Computational Laboratory for Studying Street Protests - Google Search
The Islamic State statehood and the concept of state in the Middle East - Google Search
Prof. Alain Bauer – ICT16
ICT's Publications
CoMSES Computational Model Library | Open Agent Based Modeling Consortium
Huan Liu
Janusz Wojtusiak - Publications
Kashif Zia - Publications
William George Kennedy - Publications
Individual and social response to a nuclear WMD event by William George Kennedy - Research Project on ResearchGate
agent-based modeling of complex crises by Claudio Cioffi - Research Project on ResearchGate
William George Kennedy
Mark Coletti - Publications
Jeffrey K Bassett - Publications
Jianbo Gao - ResearchGate
ResearchGate
Data Science for Suicide Bombings: Can You Predict the Next Attack? - Sana Rasheed - Google Books
Sana Rasheed - Google Scholar
Sci-Hub: removing barriers in the way of science
The ‘app of choice’ for jihadists: ISIS seizes on Internet tool to promote terror - The Washington Post
Santifort-Jordan: An empirical study of suicide terrorism... - Google Scholar
UChicago CPOST
The Islamic State statehood and the concept of state in the Middle East
First Steps in Resolving the Prevention Paradox: Adding Command Responsibility to the Uniform Code of Military Justice to Make Never Again a Reality 5 Homeland & National Security Law Review 2016
The Islamic State, an Unidentified Terrorist Object 25 Polish Quarterly of International Affairs 2016
Human Trafficking Waivers 101 Women Lawyers Journal 2016
New paradigms of cognitive management extending computational intelligence approaches | SpringerLink
US Assistance, Development, and Hierarchy in the Middle East - Springer
The Human Use of Human Beings: A Brief History of Suicide Bombing | Origins: Current Events in Historical Perspective
INFORMS Journal on Computing: INFORMS
sci-hub.cc/donate
Review on JSTOR
Nature’s 10 : Nature News & Comment
Photo Forensics - Hany Farid - Google Books
Data Science for Suicide Bombings: Can You Predict the Next Attack? - Sana Rasheed - Google Books
Feedly
Sana-Rasheed · GitHub
Scholar Alert - [ terror attack indicators ] - scitrenbaum@gmail.com - Gmail
Bart Schuurman - Google Scholar Citations
Science Huβ Publishing – Leading the Information Highway
Sci Hub (@Sci_Hub) | Twitter
Sci-Hub | Open access to scientific information | VK
Changes in Modus Operandi of Islamic State (IS) revisited | Europol
Europol joins forces with counter-terrorism experts to undermine online terrorist propaganda | Europol
Data Science for Suicide Bombings: - Google Search
image of publication citation only bookmark and share more information about this publication syria: with isis on back foot, turkey moves against the kurds - Google Search
sci-hub - Google Search
OSA | Colorimetric analysis of saliva–alcohol test strips by smartphone-based instruments using machine-learning algorithms
Russian Military Using Smartphones to Track Troop Movements - Schneier on Security
Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units
Smartphone Spying as Art - Schneier on Security
Jonathan Nichols | LinkedIn
17 | August | 2016 | The Cold War Daily
Jonathan Nichols (@FutureofID2015) | Twitter
Art Event Coordinator Job at Jordan Schnitzer Family Foundation in Portland, Oregon Area | LinkedIn
Overview of the DNC Hack attribution spectacle: Was it Russian Hackers or Guccifer 2.0 by NewsWatcher - company, breach, website on Peerlyst
Sean Everton - Publications
A letter to historians of the future — the 2016 election really was dominated by a controversy over emails - Vox
The ‘app of choice’ for jihadists: ISIS seizes on Internet tool to promote terror - The Washington Post
Islamic State changing terror tactics to maintain threat in Europe | Europol
Inbox (716) - scitrenbaum@gmail.com - Gmail
Speed and Urgency in Silicon Valley | USAASC
http://go.newsfusion.com/security/item/803253
Vision and Modeling Technical Reports
Isenberg Institute of Strategic Satire
Military Wiki | Fandom powered by Wikia
War Books: Lt. Gen. (Ret) Daniel Bolger's Top 5 Books on War and Strategy - Modern War Institute
Down the Security Rabbithole Podast
Down the Security Rabbithole Podast
Critical evaluation of reverse engineering tool Imagix 4D! | SpringerPlus | Full Text
2016 Terrorist Attacks
Influence Modeling of System Interactions
War News Updates: A Look At Russian, U.S., And Islamic State/Al Qaeda Styles Of Urban Warfare
The Stroz Friedberg Cyber Brief — Center on National Security
Why President-Elect Donald Trump Stopped Taking CIA Security Briefings
Terrorist attacks and related incidents in the United States
Sensors | Free Full-Text | Indoor-Outdoor Detection Using a Smart Phone Sensor
Sensors | Special Issue : New Generation Sensors Enabling and Fostering IoT
Healthcare Startup Society Conference and Awards Ceremony in London | Medgadget
Medgadget's Best Medical Technologies of 2016 | Medgadget
Portable Antibiotic Resistance Detector Developed | Medgadget
Weakened Militarily, ISIS Still Has Power to Sow Deadly Mayhem - The New York Times
Every Brilliant Thing Broadcast on HBO December 26 | Playbill
Trump: 'No way' he would have lost to Obama - POLITICO
IS's Looming Death Could Be Hiding Bad News
NIST Cybersecurity Framework - Mindmap
SpringerOpen
The Future of Jihadism in Europe: A Pessimistic View | Hegghammer | Perspectives on Terrorism
Top U.S. General: Two More Years to Beat ISIS - The Daily Beast
Jupiter's throwing a firework party for Juno – and Hubble's peeking in • The Register
List of Islamic Terror Attacks
Fears Growing Islamic State Successfully Weaponizing Refugees
ISIS arrests in Northern Virginia reveal jihadi threat near seat of U.S. government - Washington Times
Aptonic - Dropzone 3 Actions
Feedly
Health Emergency Readiness, Biodefense S&T, CDC Quarantine - Biodefense Headlines
Fake News Report prompts confrontation between Pakistan and Israel. Who hides behind AWD News? | GOSINT
Watch: Carbon Fiber Ventilator Pen | The Loadout Room
Improvised Weapons – The UST Spork Multi-Tool | The Loadout Room
Improvised weapons – The UST Spork Multi-Tool | SOFREP
The ‘app of choice’ for jihadists: ISIS seizes on Internet tool to promote terror | SOFREP
JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
(6) Jon Nichols ☕ (@wvualphasoldier) | Twitter
Doing Threat Intel the Hard Way - Part 3: Processing Threat Intelligence | Anomali
What’s new and what’s not in the U.N. resolution on Israeli settlements | Brookings Institution
Global research funders launch World Report tool to aid funding analysis - Fogarty International Center @ NIH
Jonathan Nichols infosec - Google Search
Romanian Intelligence Studies Review - Google Search
terror events - Google Search
List of terrorist incidents, 2016 - Wikipedia
what do i need to control a country - Google Search
systems of government and types of government - synonyms and related words | Macmillan Dictionary
Search | LinkedIn
Peerlyst - a community of security professionals. Share knowledge. Build your reputation
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.