Light theme
Dark theme
Automatic (use operating system setting)
Shared: 113 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
Day 01
Copy links to clipboard
Copy
Open
Home | CEPA
CrisisNET
dblp: ISCRAM-med 2015
The Writer Who Was Too Strong To Live
TraffTrend
Adversarial Data Mining
Acing the IOC Game
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
From Cybersecurity to Collaborative Resiliency
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers
Data Resources: Conflicts, Wars, Terrorism
Everhelper - Authorization
Foreign Military Studies Office
Information Warfare in the Second (1999-Present) Chechen War: Motivator for Military Reform?
Free GIS Datasets - Categorised List
Your Pick For Best Kitchen Trash Can: Simplehuman
IEEE Xplore Document - Smartphone based car-searching system for large parking lot
IEEE Xplore Document - Towards a General Architecture for Social Media Data Capture from a Multi-Domain Perspective
Internet of Things (IoT) Scanner - BullGuard
ISW Blog: The Campaign for Mosul: October 25-28, 2016
PLOS ONE: Search Results
Lifehacker - Tips and downloads for getting things done
App directory News, Videos, Reviews and Gossip - Lifehacker
The Calendar Service in macOS Server Is a Surprisingly Robust Alternative to Commercial Apps
This Week's Top Downloads
Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection - Springer
Sensing Social Media: A Range of Approaches for Sentiment Analysis - Springer
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats - Springer
Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Springer
Research of Conventional Data Mining Tools for Big Data Handling in Finance Institutions - Springer
AI & SOCIETY - Springer
European View - All Volumes & Issues - Springer
Social Media and the Diffusion of Information: A Computational Experiment on the Emergence of Food Scares - Desmarchelier - 2016 - Kyklos - Wiley Online Library
DARPA - Open Catalog
Open Data Barometer
A support vector machine approach to the automatic identification of fluorescence spectra emitted by biological agents | Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII | ESD16 | SPIE Proceedings | SPIE
Enhancing Capillary-Driven Flow for Paper-Based Microfluidic Channels - ACS Applied Materials & Interfaces (ACS Publications)
The Effect of Category Spanning on the Lethality and Longevity of Terrorist Organizations
ISIS: An Adaptive Hybrid Threat in Transition | Small Wars Journal
Analytics and Predictive Models for Social Media
Threat Knowledge Group
Addicaid Is an App and Social Network to Help You Find Treatment and Recover from Addiction
ISIL driven out of Bartella, fighting continues elsewhere near Mosul | CCTV America
Hallmark Envisions Real-Time Space Command and Control
Social Media in Strategic Communication (SMISC)
Data Science Toolkit
Tektronix P6015 High Voltage Oscilloscope Probe | eBay
Political Finance Database | International IDEA
Rolopanel: Tracking Game Behaviour through Mobile Analytics: Media and Communication IS&T Journal Article | IGI Global
Information Operations Matters - University of Nebraska Press
A simple analytical platform based on thin-layer chromatography coupled with paper-based analytical device for determination of total capsaicinoids in chilli samples
Smartphone-based personalized blood glucose prediction
Steve Blank presentations channel
Steve Blank presentations channel
SPIEGEL ONLINE - Aktuelle Nachrichten
StratCom | NATO Strategic Communications Centre of Excellence Riga, Latvia
Academic journal “Defence Strategic Communications” | StratCom
Social media’s role in ‘Hybrid Strategies’. Author: Thomas Elkjer Nissen | StratCom
Job Details
Social Media Listening and Monitoring for Business Applications - Google Books
Reflections: Guy Julier, From shanzhai to social innovation via makerspaces? – China's Creative Communities: Making Value and The Value(s) of Making
Peek - Chrome Web Store
Data catalog - NASA
Google Sheets
GitHub - hasherezade/ViDi: ViDi Visual Disassembler (experimental)
ViDi | hasherezade's 1001 nights
SurkovLeaks: 1GB mail cache retrieved by Ukrainian hacktivists - InformNapalm.org (English)
This American Life by WBEZ on iTunes
What The Hell Are We Doing? – Medium
Insulinomics – Medium
Keeping nuclear materials secure in an uncertain world – Medium
Pushing the envelope: The World Cup and Arab revolts drive change – Medium
A Field Guide for Online Reading Material – The Mission – Medium
Alfresco » Login
UBC Theses and Dissertations - UBC Library Open Collections
Corsar: Social Media Data in Research: Provenance Challenges - Google Scholar
JIHADISMSTUDIES.NET
Steve BlankSecret History
Steve BlankSlides/Videos
Exposing Russian Trolling and Information Warfare Tactics – Do NOT Take Boris Word for It
Bomb A Head Girl! - Creators' Stickers
WTF is machine learning? | TechCrunch
Other > E-books - TPB
The Pirate Bay - The galaxy's most resilient bittorrent site
NoctDeath - TPB
Judd Legum on Twitter: "I fixed Comey's letter https://t.co/caQpqXfoPM"
Your Guide to a Stress-free Bedroom - LuxPad
Personal - Dropbox
Personal - Dropbox
DARPA Social Media in Strategic Communication - Google Search
Defence Strategic Communications - Google Search
Finding Needles in a Haystack: The Eastern Bloc's Counterintelligence Capabilities, - Google Search
KANAME Co.,Ltd Bomb A Head Girl! - Google Search
Krueger and Malecková - Google Search
Laying the Groundwork for the Successful Deployment of Communication Interception Technology - Google Search
Modeling position selection by individuals during information warfare in society - Google Search
Social Media as a Tool for Information Warfare pdf - Google Search
"Killing Lists" – The Evolution of Cyber Terrorism?
Links | Infinity Journal | Strategy | Analysis
Readings | Infinity Journal | Strategy | Analysis
Instapaper
Edwin ‘Leigh’ Armistead | Journal of Information Warfare
Hackers reverse-engineer NSA's leaked bugging devices | New Scientist
[DEV] Peek, a Chrome extension to preview files before you download them : chrome
Information Warfare: Fighting Back Through the Matrix (PDF Download Available)
Innovator Under 35: Nora Ayanian
The World as Free-Fire Zone
Agricultural Drones
AI Body Scanners Could Solve the Worst Thing About Airports
IBM’s Watson Is Everywhere—But What Is it?
US military studied how to influence Twitter users in Darpa-funded research | World news | The Guardian
Why ISIS Is Winning the Social Media War | WIRED
onthestreetwhereyoulive - YouTube
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.